Hardware Trojan detection method based on the frequency domain characteristics of power consumption

被引:1
作者
Tang, Nan [1 ]
Zhou, Wanting [1 ]
Li, Lei [1 ]
Yang, Ji [2 ]
Li, Rui [3 ]
He, Yuanhang [4 ]
机构
[1] Univ Elect Sci & Technol China, Chengdu, Peoples R China
[2] Chinese Peoples Liberat Army, Unit 78102, Chengdu, Peoples R China
[3] Shandong Kerui Machinery Mfg Co Ltd, Dongying, Shandong, Peoples R China
[4] Inst Southwest Commun, Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
来源
2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020) | 2020年
关键词
AES encryption circuit; Fourier transform; hardware Trojan; Mahalanobis distance; Power analysis;
D O I
10.1109/ISCID51228.2020.00099
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hardware security has long been an important issue in the current IC design. In this paper, a hardware Trojan detection method based on frequency domain characteristics of power consumption is proposed. For some HTs, it is difficult to detect based on the time domain characteristics, these types of hardware Trojan can be analyzed in the frequency domain, and Mahalanobis distance is used to classify designs with or without HTs. The experimental results demonstrate that taking 10% distance as the criterion, the hardware Trojan detection results in the frequency domain have almost no failure cases in all the tested designs.
引用
收藏
页码:410 / 413
页数:4
相关论文
共 8 条
[1]  
Dofe J, 2016, IEEE INT SYMP CIRC S, P2050, DOI 10.1109/ISCAS.2016.7538981
[2]   MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection [J].
Huang, Yuanwen ;
Bhunia, Swarup ;
Mishra, Prabhat .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :130-141
[3]   A rapid advice guideline for the diagnosis and treatment of 2019 novel coronavirus (2019-nCoV) infected pneumonia (standard version) [J].
Jin, Ying-Hui ;
Cai, Lin ;
Cheng, Zhen-Shun ;
Cheng, Hong ;
Deng, Tong ;
Fan, Yi-Pin ;
Fang, Cheng ;
Huang, Di ;
Huang, Lu-Qi ;
Huang, Qiao ;
Han, Yong ;
Hu, Bo ;
Hu, Fen ;
Li, Bing-Hui ;
Li, Yi-Rong ;
Liang, Ke ;
Lin, Li-Kai ;
Luo, Li-Sha ;
Ma, Jing ;
Ma, Lin-Lu ;
Peng, Zhi-Yong ;
Pan, Yun-Bao ;
Pan, Zhen-Yu ;
Ren, Xue-Qun ;
Sun, Hui-Min ;
Wang, Ying ;
Wang, Yun-Yun ;
Weng, Hong ;
Wei, Chao-Jie ;
Wu, Dong-Fang ;
Xia, Jian ;
Xiong, Yong ;
Xu, Hai-Bo ;
Yao, Xiao-Mei ;
Yuan, Yu-Feng ;
Ye, Tai-Sheng ;
Zhang, Xiao-Chun ;
Zhang, Ying-Wen ;
Zhang, Yin-Gao ;
Zhang, Hua-Min ;
Zhao, Yan ;
Zhao, Ming-Juan ;
Zi, Hao ;
Zeng, Xian-Tao ;
Wang, Yong-Yan ;
Wang, Xing-Huan .
MILITARY MEDICAL RESEARCH, 2020, 7 (01)
[4]  
Saheb Zamani M., 2016, IEEE T COMPUT, P1
[5]  
Wang Chenxu, 2012, Semiconductor Technology, V37, P341, DOI 10.3969/j.issn.1003-353x.2012.05.003
[6]   ResNet-based Trojan detection methodology for protected ICs [J].
Yu, Weize ;
Wen, Yiming ;
Huang, Xueqing .
ELECTRONICS LETTERS, 2019, 55 (21) :1116-1118
[7]   Latch-Based Structure: A High Resolution and Self-Reference Technique for Hardware Trojan Detection [J].
Zarrinchian, Ghobad ;
Zamani, Morteza Saheb .
IEEE TRANSACTIONS ON COMPUTERS, 2017, 66 (01) :100-113
[8]   Temperature-variation-based hardware Trojan detection through ring oscillator [J].
Zhong, Jingxin ;
Wang, Jianye ;
Ding, Hao .
ELECTRONICS LETTERS, 2016, 52 (15) :1302-1303