Trojan Detection using IC Fingerprinting
Citations
1,227 citations
Cites background from "Trojan Detection using IC Fingerpri..."
...Except for the work by Agrawal et al.,13 where the authors had access to test chips and did noninvasive measurements, all methods were based on noninvasive simulations....
[...]
...Agrawal et al. were the first to use side-channel information to detect Trojan contributions to circuit power consumption.13 To obtain the power signature of Trojan-free (i.e., genuine) 13January/February 2010 ICs, random patterns are applied and power measurement is performed....
[...]
...D. Agrawal et al., ‘‘Trojan Detection Using IC Fingerprinting,’’ Proc....
[...]
...Agrawal et al.(13) Transient power Counter: 16-bit...
[...]
...were the first to use side-channel information to detect Trojan contributions to circuit power consumption.(13) To obtain the power signature of Trojan-free (i....
[...]
611 citations
Cites background or methods from "Trojan Detection using IC Fingerpri..."
...The basic procedure of our Trojan detection method is similar to that in [1]....
[...]
...Although the destructive reverseengineering to check the integrity and genuineness of manufactured chips is a useful method to deal with any types of Trojan circuits, it can’t guarantee those untested to be Trojan free [1]....
[...]
...In [6], the author proposed the concept that manufacturing process could be unsafe but unable to give efficient methods to solve it except for the destructive way....
[...]
588 citations
Cites background or methods from "Trojan Detection using IC Fingerpri..."
...The IC fingerprinting technique [4] uses signal processing techniques such as the Karhunen–Loeve...
[...]
...The act of monitoring consumes power, even if the change in power consumption is minimal; indeed that would be the goal of an adversary [4]....
[...]
...Post-silicon, the design can be verified either through destructive depackaging and reverse engineering of the IC [3], or by comparing its functionality or circuit characteristics with a golden version of the IC [4], [7], [8]....
[...]
...(b) Side-channel transient current signal from a Trojan can be separated and identified from the statistical distribution of process noise using Karhunen–Loeve expansion [4]....
[...]
514 citations
Cites methods from "Trojan Detection using IC Fingerpri..."
...This work was supported in part by the U.S. Office of Naval Research (ONR) under Grant R17460 and the National Science Foundation (NSF) under Grants to Rice University (CNS-1059416) and NYU (CNS-1059328 and CCF-1319841), NYU/NYU-AD Center for Research in Information Security Studies and Privacy…...
[...]
...Digital Object Identifier: 10.1109/JPROC.2014.2335155 0018-9219 2014 IEEE....
[...]
424 citations
Cites methods from "Trojan Detection using IC Fingerpri..."
...In [57], advanced signal processing techniques based on Karhunen–Loève expansion are used to find a signal subspace from which the process noise is absent in order to identify Trojans that are well hidden within the variations of the signals generated by the process noise....
[...]
References
14,659 citations
10,526 citations
6,757 citations
3,989 citations
3,526 citations