scispace - formally typeset
Proceedings ArticleDOI

A region based approach for the identification of hardware Trojans

Mainak Banga, +1 more
- pp 40-47
Reads0
Chats0
TLDR
This work proposes a circuit partition based approach to detect and locate the embedded Trojan and provides a power profile based method for refining the candidate regions that may contain a Trojan.
Abstract
Outsourcing of SoC fabrication units has created the potential threat of design tampering using hardware Trojans. Methods based on side-channel analysis exist to differentiate such maligned ICs from the genuine ones but process variation in the foundries limit the effectiveness of such approaches. In this work, we propose a circuit partition based approach to detect and locate the embedded Trojan. Results show that our approach is effective in separating out candidate Trojans in the circuit. In addition, we provide a power profile based method for refining the candidate regions that may contain a Trojan. In many cases, such an isolation method leads to noticeable manifestation of the anomalous behavior of the circuit due to the presence of the Trojan thereby enhancing chances of their detection.

read more

Citations
More filters
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Book ChapterDOI

MERO: A Statistical Approach for Hardware Trojan Detection

TL;DR: A test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes that maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation.
Proceedings ArticleDOI

Hardware Trojan: Threats and emerging solutions

TL;DR: The threat posed by hardware Trojans and the methods of deterring them are analyzed, a Trojan taxonomy, models of Trojan operations and a review of the state-of-the-art Trojan prevention and detection techniques are presented.
Proceedings ArticleDOI

FANCI: identification of stealthy malicious logic using boolean functional analysis

TL;DR: FANCI is a tool that flags suspicious wires, in a design, which have the potential to be malicious, which FANCI uses scalable, approximate, boolean functional analysis to detect these wires.
Book ChapterDOI

Breakthrough silicon scanning discovers backdoor in military chip

TL;DR: Using an innovative patented technique, Pipeline Emission Analysis (PEA) was able to extract the secret key to activate the backdoor, as well as other security keys such as the AES and the Passkey, which means the device is wide open to intellectual property (IP) theft, fraud, re-programming, and reverse engineering of the design.
References
More filters
Book ChapterDOI

The EM Side-Channel(s)

TL;DR: It is shown that not only can EM emanations be used to attack cryptographic devices where the power side-channel is unavailable, they can even beused to break power analysis countermeasures.
Proceedings ArticleDOI

Trojan Detection using IC Fingerprinting

TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Journal ArticleDOI

Transition density: a new measure of activity in digital circuits

TL;DR: It is shown how the density values at internal nodes can be used to study circuit reliability by estimating theaverage power and ground currents; the average power dissipation; the susceptibility to electromigration failures; and the extent of hot-electron degradation.
Proceedings ArticleDOI

Logic BIST for large industrial designs: real issues and case studies

TL;DR: The experimental results demonstrate that with automation of the proposed solutions, logic BIST can achieve test quality approaching that of ATPG with minimal area overhead and few changes to the design flow.
Journal ArticleDOI

An Overview of Power Analysis Attacks Against Field Programmable Gate Arrays

TL;DR: This paper presents recent results of attacks attempted against standard encryption algorithms, provides a theoretical estimation of these attacks based on simple statistical parameters and evaluates the cost and security of different possible countermeasures.
Related Papers (5)