Hardware Trojan detection and localization based on local detectors
Hardware Trojan detection and localization based on local detectors
Hardware Trojans are one of the serious threats with detrimental, irreparable effects on the functionality, security, and performance of digital integrated circuits. It is difficult to detect Trojans because of their diversity in size and performance. While the majority of current methods focus on Trojan detection during chip testing, run-time techniques can be employed to gain unique advantages. This paper proposes a method based on the online scalable detection technique, which eliminates the need for a reference chip. Involving local detectors, this technique assesses the variations in the logical values of each node to find out whether there are Trojans. This method excludes time and power measurements, which are common parameters in most conventional methods. The detectors provide Trojanlocalization capability in our proposed technique. Two remarkable features of this technique are low power and low area overhead. The results are reported by simulation and implementation of common benchmarks, which show the high Trojan detection rate of the proposed method.
___
- Zhou B, Zhang W, Thambipillai S, Jin JTK, Chaturvedi V, Luo T. Cost-efficient acceleration of hardware trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE T Comp Aid D 2016; 35:792-805.
- Zhou B, Zhang W, Thambipillai S, Teo J. A low cost acceleration method for hardware Trojan detection based on fan-out cone analysis. In: International Conference on Hardware/Software Codesign and System Synthesis; 2014. New York, NY, USA: ACM. p. 28.
- Wu TF, Ganesan K, Hu YA, Wong HSP, Wong S, Mitra S. Tpad: Hardware Trojan prevention and detection for trusted integrated circuits. IEEE T Compu Aid D 2016; 35: 521-534.
- Rajendran J, Sam M, Sinanoglu O, Karri R. Security analysis of integrated circuit camouflaging. In: SIGSAC Conference on Computer & Communications Security; 2013. New York, NY, USA: ACM. pp. 709-720.
- Nejat A, Shekarian SMH, Zamani MS. A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting. Microprocess Microsy 2014; 38: 246-252.
- Wei S, Potkonjak M. Scalable hardware Trojan diagnosis. IEEE T VLSI Syst 2012; 20: 1049-1057.
- K¨ose S, Wang L, DeMara RF. On-chip sensor circle distribution technique for real-time hardware Trojan detection. In: Government Microcircuit Applications & Critical Technology Conference; 2017.
- Cao Y, Chang CH, Chen S. A cluster-based distributed active current sensing circuit for hardware Trojan detection. IEEE T Inf Foren Sec 2014; 9: 2220-2231.
- Veeranna N, Schafer BC. Trust filter: runtime hardware trojan detection in behavioral MPSoCs. J Hardw Syst Secur 2017; 1: 56-67.
- Rajendran J, Sinanoglu O, Karri R. Building trustworthy systems using untrusted components: a high-level synthesis approach. IEEE T VLSI Syst 2016; 24: 2946-2959.
- Waksman A, Suozzo M, Sethumadhavan S. FANCI: Identification of stealthy malicious logic using Boolean functional analysis. In: SIGSAC Conference on Computer & Communications Security; 2013. New York, NY, USA: ACM. pp.697-708.
- Oya M, Shi Y, Yanagisawa M, Togawa N. A score-based classification method for identifying hardware-Trojans at gate-level netlists. In: Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition; 2015. pp. 465-470.
- Hicks M, Finnicum M, King ST, Martin MM, Smith JM. Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: IEEE 2010 Symposium on Security and Privacy; 2010. New York, NY, USA: IEEE. pp. 159-172.
- Zhang J, Yuan F, Wei L, Liu Y, Xu Q. VeriTrust: Verification for hardware trust. IEEE T Comput Aid D 2015; 34: 1148-1161.
- Bao C, Forte D, Srivastava A. Temperature tracking: toward robust run-time detection of hardware Trojans. IEEE T Comput Aid D 2014; 34: 1577-1585.
- Li M, Davoodi A, Tehranipoor M. A sensor-assisted self-authentication framework for hardware Trojan detection. In: Conference on Design, Automation and Test in Europe; 2012. pp. 1331-1336.
- Bazzazi A, Manzuri Shalmani MT, Hemmatyar AMA. Trojan counteraction in hardware: a survey and new
taxonomy. Indian Journal of Science and Technology 2016; 9: 93764.
- Xiao K, Forte D, Tehranipoor M. A novel built-in self-authentication technique to prevent inserting hardware Trojans. IEEE T Compu Aid D 2014; 33: 1778-1791.