Hardware Trojan Detection Method Based on Time Feature of Chip Temperature

被引:0
作者
Yang, Lian [1 ]
Li, Xiong [1 ]
Li, Huan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu, Peoples R China
来源
2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC) | 2020年
关键词
IC; hardware Trojan detection; thermal map; power; temperature; time feature;
D O I
10.1109/ccwc47524.2020.9031281
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware security has become a security issue that cannot be ignored in the world. Academia's research on hardware Trojan detection at IC (Integrated Circuit) has been ongoing and has achieved many achievements. At present, some scholars are exploring hardware Trojan detection based on chip power and temperature. In this paper, we also use the temperature information of the chip to carry out hardware Trojan detection, but the difference is that the existing methods directly used the difference of steady-state temperature after the chip reaches steady state as the detection basis, and our method is to use the arrival time difference in the temperature rising phase of the chips before reaching the steady state as the detection basis, then extract the feature to obtain the characteristic value of each chip, and finally use them to perform classification and identification of infected chips. Our basis could show larger difference for the infected chips under the same conditions, which makes the detection data have better accommodation for measurement noise and process variation (PV) and improves the detection accuracy. Through the relevant experimental verification, the proposed method is completely feasible, and still has high detection accuracy with measurement noise and PV. The proposed method can be used in the case of Trojan detection for a certain number of chips without golden chip.
引用
收藏
页码:1029 / 1032
页数:4
相关论文
共 17 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]   Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans [J].
Bao, Chongxi ;
Forte, Domenic ;
Srivastava, Ankur .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (10) :1577-1585
[3]   A case study in hardware Trojan design and implementation [J].
Baumgarten, Alex ;
Steffen, Michael ;
Clausman, Matthew ;
Zambreno, Joseph .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) :1-14
[4]   Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution [J].
Bhunia, Swarup ;
Abramovici, Miron ;
Agrawal, Dakshi ;
Bradley, Paul ;
Hsiao, Michael S. ;
Plusquellic, Jim ;
Tehranipoor, Mohammad .
IEEE DESIGN & TEST, 2013, 30 (03) :6-17
[5]   Fixing design errors with counterexamples and resynthesis [J].
Chang, Kai-Hui ;
Markov, Igor L. ;
Bertacco, Valeria .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2008, 27 (01) :184-188
[6]   Hardware Trojan Detection using ATPG and Model Checking [J].
Cruz, Jonathan ;
Farahmandi, Farimah ;
Ahmed, Alif ;
Mishra, Prabhat .
2018 31ST INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2018 17TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID & ES), 2018, :91-96
[7]  
Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
[8]   HotSpot: A compact thermal modeling methodology for early-stage VLSI design [J].
Huang, Wei ;
Ghosh, Shougata ;
Velusamy, Siva ;
Sankaranarayanan, Karthik ;
Skadron, Kevin ;
Stan, Mircea R. .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2006, 14 (05) :501-513
[9]  
Kahng AB, 2012, DES AUT CON, P392
[10]   Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps [J].
Nowroz, Abdullah Nazma ;
Hu, Kangqiao ;
Koushanfar, Farinaz ;
Reda, Sherief .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (12) :1792-1805