Skip to main content

2021 | OriginalPaper | Buchkapitel

A Survey on Hardware Trojan Detection: Alternatives to Destructive Reverse Engineering

verfasst von : Archit Saini, Gahan Kundra, Shruti Kalra

Erschienen in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

System security has always been associated with the software being used on it. The hardware has been by default considered trusted. This root of trust for hardware has been violated after the emergence of Hardware Trojan (HT) attacks. Such attacks can be used by an adversary to leak important or secret information or to conduct a system failure. This paper gives a broad overview on different techniques that can be used to detect HT inside a circuit in place of destructive reverse engineering. Further a detailed literature survey has been presented which gives an overview of the efficiency of the detection techniques used in the literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247CrossRef Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247CrossRef
2.
Zurück zum Zitat Ngo XT, Hoang VP, Le Duc H (2018, November) Hardware trojan threat and its countermeasures. In: 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 35–40 Ngo XT, Hoang VP, Le Duc H (2018, November) Hardware trojan threat and its countermeasures. In: 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 35–40
3.
Zurück zum Zitat Wang SJ, Wei JY, Huang SH, Li KSM (2016, December) Test generation for combinational hardware trojans. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6 Wang SJ, Wei JY, Huang SH, Li KSM (2016, December) Test generation for combinational hardware trojans. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6
4.
Zurück zum Zitat Shende R, Ambawade DD (2016, July) A side channel based power analysis technique for hardware trojan detection using statistical learning approach. In: 2016 Thirteenth international conference on wireless and optical communications networks (WOCN). IEEE, pp 1–4 Shende R, Ambawade DD (2016, July) A side channel based power analysis technique for hardware trojan detection using statistical learning approach. In: 2016 Thirteenth international conference on wireless and optical communications networks (WOCN). IEEE, pp 1–4
5.
Zurück zum Zitat Sharifi E, Mohammadiasl K, Havasi M, Yazdani A (2015) Performance analysis of hardware trojan detection methods. Int J Open Inf Technol 3(5) Sharifi E, Mohammadiasl K, Havasi M, Yazdani A (2015) Performance analysis of hardware trojan detection methods. Int J Open Inf Technol 3(5)
6.
Zurück zum Zitat Cornell N, Nepal K (2017, August) Combinational hardware trojan detection using logic implications. In: 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 571–574 Cornell N, Nepal K (2017, August) Combinational hardware trojan detection using logic implications. In: 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 571–574
7.
Zurück zum Zitat Kumar P, Srinivasan R (2014, March) Detection of hardware trojan in SEA using path delay. In: 2014 IEEE students’ conference on electrical, electronics and computer science. IEEE, pp 1–6 Kumar P, Srinivasan R (2014, March) Detection of hardware trojan in SEA using path delay. In: 2014 IEEE students’ conference on electrical, electronics and computer science. IEEE, pp 1–6
8.
Zurück zum Zitat Hou B, He C, Wang L, En Y, Xie S (2014, August) Hardware trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International conference on reliability, maintainability and safety (ICRMS). IEEE, pp 1039–1042 Hou B, He C, Wang L, En Y, Xie S (2014, August) Hardware trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International conference on reliability, maintainability and safety (ICRMS). IEEE, pp 1039–1042
9.
Zurück zum Zitat Exurville I, Zussa L, Rigaud JB, Robisson B (2015, May) Resilient hardware trojans detection based on path delay measurements. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 151–156 Exurville I, Zussa L, Rigaud JB, Robisson B (2015, May) Resilient hardware trojans detection based on path delay measurements. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 151–156
10.
Zurück zum Zitat Li J, Lach J (2008, June) At-speed delay characterization for IC authentication and trojan horse detection. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 8–14 Li J, Lach J (2008, June) At-speed delay characterization for IC authentication and trojan horse detection. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 8–14
11.
Zurück zum Zitat Potkonjak M, Nahapetian A, Nelson M, Massey T (2009, July) Hardware trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE design automation conference. IEEE, pp 688–693 Potkonjak M, Nahapetian A, Nelson M, Massey T (2009, July) Hardware trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE design automation conference. IEEE, pp 688–693
12.
Zurück zum Zitat Jin Y, Makris Y (2008, June) Hardware trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 51–57 Jin Y, Makris Y (2008, June) Hardware trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 51–57
13.
Zurück zum Zitat Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39 Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39
14.
Zurück zum Zitat Kumagai J (2000) Chip detectives [reverse engineering]. IEEE Spectr 37(11):43–48CrossRef Kumagai J (2000) Chip detectives [reverse engineering]. IEEE Spectr 37(11):43–48CrossRef
15.
Zurück zum Zitat Collins DR (2008) Trust in integrated circuits. Defense advanced research projects agency Arlington VA microsystems technology office Collins DR (2008) Trust in integrated circuits. Defense advanced research projects agency Arlington VA microsystems technology office
16.
Zurück zum Zitat Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007, May) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 296–310 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007, May) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 296–310
17.
Zurück zum Zitat Tehranipoor M, Koushanfar F (1900) A survey of hardware trojan taxonomy and detection. IEEE Ann Hist Comput 01:1 Tehranipoor M, Koushanfar F (1900) A survey of hardware trojan taxonomy and detection. IEEE Ann Hist Comput 01:1
18.
Zurück zum Zitat Chakraborty RS, Narasimhan S, Bhunia S (2009, November) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop. IEEE, pp 166–171 Chakraborty RS, Narasimhan S, Bhunia S (2009, November) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop. IEEE, pp 166–171
19.
Zurück zum Zitat Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009, September) MERO: a statistical approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 396–410 Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009, September) MERO: a statistical approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 396–410
20.
Zurück zum Zitat Alkabani Y, Koushanfar F (2009, November) Consistency-based characterization for IC trojan detection. In: Proceedings of the 2009 international conference on computer-aided design, pp 123–127 Alkabani Y, Koushanfar F (2009, November) Consistency-based characterization for IC trojan detection. In: Proceedings of the 2009 international conference on computer-aided design, pp 123–127
21.
Zurück zum Zitat Banga M, Hsiao MS (2009, July) VITAMIN: voltage inversion technique to ascertain malicious insertions in ICs. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 104–107 Banga M, Hsiao MS (2009, July) VITAMIN: voltage inversion technique to ascertain malicious insertions in ICs. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 104–107
22.
Zurück zum Zitat Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008, November) Power supply signal calibration techniques for improving detection resolution to hardware trojans. In: 2008 IEEE/ACM international conference on computer-aided design. IEEE, pp 632–639 Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008, November) Power supply signal calibration techniques for improving detection resolution to hardware trojans. In: 2008 IEEE/ACM international conference on computer-aided design. IEEE, pp 632–639
23.
Zurück zum Zitat Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008, October) Hardware trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE international symposium on defect and fault tolerance of VLSI systems. IEEE, pp 87–95 Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008, October) Hardware trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE international symposium on defect and fault tolerance of VLSI systems. IEEE, pp 87–95
24.
Zurück zum Zitat Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008, March) Towards trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, automation and test in Europe. IEEE, pp 1362–1365 Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008, March) Towards trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, automation and test in Europe. IEEE, pp 1362–1365
25.
Zurück zum Zitat Banga M, Hsiao MS (2008, June) A region based approach for the identification of hardware trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 40–47 Banga M, Hsiao MS (2008, June) A region based approach for the identification of hardware trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 40–47
26.
Zurück zum Zitat Banga M, Hsiao MS (2009, January) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International conference on VLSI design. IEEE, pp 327–332 Banga M, Hsiao MS (2009, January) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International conference on VLSI design. IEEE, pp 327–332
27.
Zurück zum Zitat Karunakaran DK, Mohankumar N (2014, July) Malicious combinational hardware trojan detection by gate level characterization in 90 nm technology. In: Fifth international conference on computing, communications and networking technologies (ICCCNT). IEEE, pp 1–7 Karunakaran DK, Mohankumar N (2014, July) Malicious combinational hardware trojan detection by gate level characterization in 90 nm technology. In: Fifth international conference on computing, communications and networking technologies (ICCCNT). IEEE, pp 1–7
29.
Zurück zum Zitat Lin L, Kasper M, Gneysu T, Paar C, Burleson W (2009, September) Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 382–395 Lin L, Kasper M, Gneysu T, Paar C, Burleson W (2009, September) Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 382–395
30.
Zurück zum Zitat Qin Y, Xia T (2017, October) Sensitivity analysis of ring oscillator based hardware trojan detection. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1979–1983 Qin Y, Xia T (2017, October) Sensitivity analysis of ring oscillator based hardware trojan detection. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1979–1983
31.
Zurück zum Zitat Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011, June) TeSR: a robust temporal self-referencing approach for hardware trojan detection. In: 2011 IEEE international symposium on hardware-oriented security and trust. IEEE, pp 71–74 Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011, June) TeSR: a robust temporal self-referencing approach for hardware trojan detection. In: 2011 IEEE international symposium on hardware-oriented security and trust. IEEE, pp 71–74
32.
Zurück zum Zitat Lin L, Burleson W, Paar C (2009, November) MOLES: malicious off-chip leakage enabled by side-channels. In: 2009 IEEE/ACM international conference on computer-aided design-digest of technical papers. IEEE, pp 117–122 Lin L, Burleson W, Paar C (2009, November) MOLES: malicious off-chip leakage enabled by side-channels. In: 2009 IEEE/ACM international conference on computer-aided design-digest of technical papers. IEEE, pp 117–122
33.
Zurück zum Zitat Courbon F, Loubet-Moundi P, Fournier JJ, Tria A (2015, August) SEMBA: a SEM based acquisition technique for fast invasive hardware trojan detection. In: 2015 European conference on circuit theory and design (ECCTD). IEEE, pp 1–4 Courbon F, Loubet-Moundi P, Fournier JJ, Tria A (2015, August) SEMBA: a SEM based acquisition technique for fast invasive hardware trojan detection. In: 2015 European conference on circuit theory and design (ECCTD). IEEE, pp 1–4
34.
Zurück zum Zitat Vaikuntapu R, Bhargava L, Sahula V (2016, May) Golden IC free methodology for hardware trojan detection using symmetric path delays. In: 2016 20th International symposium on VLSI design and test (VDAT). IEEE, pp 1–2 Vaikuntapu R, Bhargava L, Sahula V (2016, May) Golden IC free methodology for hardware trojan detection using symmetric path delays. In: 2016 20th International symposium on VLSI design and test (VDAT). IEEE, pp 1–2
35.
Zurück zum Zitat Xia D, Zhu YF (2012, November) A research on detection algorithm of failure-type hardware trojan. In: 2012 Fourth international conference on multimedia information networking and security. IEEE, pp 918–921 Xia D, Zhu YF (2012, November) A research on detection algorithm of failure-type hardware trojan. In: 2012 Fourth international conference on multimedia information networking and security. IEEE, pp 918–921
36.
Zurück zum Zitat Dhar T, Roy SK, Giri C (2019, January) Hardware trojan detection by stimulating transitions in rare nets. In: 2019 32nd international conference on VLSI design and 2019 18th international conference on embedded systems (VLSID). IEEE, pp 537–538 Dhar T, Roy SK, Giri C (2019, January) Hardware trojan detection by stimulating transitions in rare nets. In: 2019 32nd international conference on VLSI design and 2019 18th international conference on embedded systems (VLSID). IEEE, pp 537–538
37.
Zurück zum Zitat Salmani H, Tehranipoor M, Plusquellic J (2011) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(1):112–125 Salmani H, Tehranipoor M, Plusquellic J (2011) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(1):112–125
38.
Zurück zum Zitat Qu K, Wu L, Zhang X (2015, December) A novel detection algorithm for ring oscillator network based hardware Trojan detection with tactful FPGA implementation. In: 2015 11th International conference on computational intelligence and security (CIS). IEEE, pp 299–302 Qu K, Wu L, Zhang X (2015, December) A novel detection algorithm for ring oscillator network based hardware Trojan detection with tactful FPGA implementation. In: 2015 11th International conference on computational intelligence and security (CIS). IEEE, pp 299–302
39.
Zurück zum Zitat Rad R, Plusquellic J, Tehranipoor M (2008, June) Sensitivity analysis to hard-ware trojans using power supply transient signals. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 3–7 Rad R, Plusquellic J, Tehranipoor M (2008, June) Sensitivity analysis to hard-ware trojans using power supply transient signals. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 3–7
41.
Zurück zum Zitat Kash JA, Tsang JC, Knebel DR (2002) US Patent No 6,496,022. Washington, DC, US Patent and Trademark Office Kash JA, Tsang JC, Knebel DR (2002) US Patent No 6,496,022. Washington, DC, US Patent and Trademark Office
42.
Zurück zum Zitat Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, … Bhunia S (2012) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62(11):2183–2195 Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, … Bhunia S (2012) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62(11):2183–2195
43.
Zurück zum Zitat Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf forensics and Secur 5(4):893–904CrossRef Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf forensics and Secur 5(4):893–904CrossRef
44.
Zurück zum Zitat Du D, Narasimhan S, Chakraborty RS, Bhunia S (2010, August) Self-referencing: a scalable side-channel approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 173–187 Du D, Narasimhan S, Chakraborty RS, Bhunia S (2010, August) Self-referencing: a scalable side-channel approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 173–187
45.
Zurück zum Zitat Rai D, Lach J (2009, July) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 58–65 Rai D, Lach J (2009, July) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 58–65
Metadaten
Titel
A Survey on Hardware Trojan Detection: Alternatives to Destructive Reverse Engineering
verfasst von
Archit Saini
Gahan Kundra
Shruti Kalra
Copyright-Jahr
2021
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_63

Neuer Inhalt