Skip to main content
Top
Published in: Journal of Electronic Testing 3/2019

20-05-2019

Activity Factor Based Hardware Trojan Detection and Localization

Authors: Yongkang Tang, Liang Fang, Shaoqing Li

Published in: Journal of Electronic Testing | Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the globalization of integrated circuit design and manufacturing, hardware Trojan has become a serious security threat. In this paper, we decompose redundant thermal maps to extract Trojan activity factor using factor analysis to implement hardware Trojan detection and location. Xilinx FPGAs configured with the benchmark circuits from Trust-hub are utilized to evaluate our proposed countermeasure. The results indicate that hardware Trojans with less than 20 gates can be detected.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy, Berkeley, pp 296–310 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy, Berkeley, pp 296–310
3.
go back to reference Cha B, Gupta SK (2012) Efficient Trojan detection via calibration of process variation. In: 2012 IEEE 21st Asian test symposium, Niigata, pp 355–361 Cha B, Gupta SK (2012) Efficient Trojan detection via calibration of process variation. In: 2012 IEEE 21st Asian test symposium, Niigata, pp 355–361
4.
go back to reference Chakraborty RS, Wolff F, Paul S (2009) MERO: a statistical approach for hardware Trojan detection. Lect Notes Comput Sci 5747:396–410CrossRef Chakraborty RS, Wolff F, Paul S (2009) MERO: a statistical approach for hardware Trojan detection. Lect Notes Comput Sci 5747:396–410CrossRef
5.
go back to reference He JJ, Zhao YQ, Guo XL, Jin Y (2017) Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration Systems 25:2939–2948CrossRef He JJ, Zhao YQ, Guo XL, Jin Y (2017) Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration Systems 25:2939–2948CrossRef
6.
go back to reference Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust, Anaheim, pp 51–57 Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust, Anaheim, pp 51–57
7.
go back to reference Li J, Lach J (2008) At-speed delay characterization for ic authentication and Trojan horse detection. In: IEEE international workshop on hardware-oriented security and trust, Anaheim, pp 8–14 Li J, Lach J (2008) At-speed delay characterization for ic authentication and Trojan horse detection. In: IEEE international workshop on hardware-oriented security and trust, Anaheim, pp 8–14
8.
go back to reference Lin N, Li SQ, Chen JH, Wei P, Zhao ZX (2014) The influence on sensitivity of hardware Trojan detection by test vector. In: 2014 communications security conference, Bejing, pp 1–6 Lin N, Li SQ, Chen JH, Wei P, Zhao ZX (2014) The influence on sensitivity of hardware Trojan detection by test vector. In: 2014 communications security conference, Bejing, pp 1–6
9.
go back to reference Liu Y, Jin Y, Makris Y (2013) Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation. In: 2013 IEEE/ACM international conference on computer-aided design, San Jose, pp 399–404 Liu Y, Jin Y, Makris Y (2013) Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation. In: 2013 IEEE/ACM international conference on computer-aided design, San Jose, pp 399–404
10.
go back to reference Liu Y, Volanis G, Huang K, Makris Y (2015) Concurrent hardware Trojan detection in wireless cryptographic ICs. In: 2015 IEEE test conference, Anaheim, pp 1–8 Liu Y, Volanis G, Huang K, Makris Y (2015) Concurrent hardware Trojan detection in wireless cryptographic ICs. In: 2015 IEEE test conference, Anaheim, pp 1–8
11.
go back to reference Liu C, Patrick C, Yang CG (2016) A mutual auditing framework to protect IoT against hardware Trojans. In: 2016 21st Asia and South Pacific design automation conference, pp 69–74 Liu C, Patrick C, Yang CG (2016) A mutual auditing framework to protect IoT against hardware Trojans. In: 2016 21st Asia and South Pacific design automation conference, pp 69–74
12.
go back to reference Nowroz AN, Hu KQ, Koushanfar F, et al. (2014) Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans Comput Aided Des Integr Circuits Syst 33:1792–1805CrossRef Nowroz AN, Hu KQ, Koushanfar F, et al. (2014) Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans Comput Aided Des Integr Circuits Syst 33:1792–1805CrossRef
13.
go back to reference Salmani H, Tehranipoor M (2012) Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Trans Inf Forensics Secur 7:76–87CrossRef Salmani H, Tehranipoor M (2012) Layout-aware switching activity localization to enhance hardware Trojan detection. IEEE Trans Inf Forensics Secur 7:76–87CrossRef
15.
go back to reference Shen G, Tang YK, Li SQ, Chen JH, Yang BB (2017) A general framework of hardware Trojan detection: two-level temperature difference based thermal map analysis. In: 2017 11th IEEE international conference on anti-counterfeiting, security and identification, Xiamen, pp 172–178 Shen G, Tang YK, Li SQ, Chen JH, Yang BB (2017) A general framework of hardware Trojan detection: two-level temperature difference based thermal map analysis. In: 2017 11th IEEE international conference on anti-counterfeiting, security and identification, Xiamen, pp 172–178
16.
go back to reference Soll O, Korak T, Muehlberghuber M, Hutter M (2014) EM-based detection of hardware Trojans on FPGAs. In: 2014 IEEE international symposium on hardware-oriented security and trust, Arlington, pp 84–87 Soll O, Korak T, Muehlberghuber M, Hutter M (2014) EM-based detection of hardware Trojans on FPGAs. In: 2014 IEEE international symposium on hardware-oriented security and trust, Arlington, pp 84–87
17.
go back to reference Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Design & Test of Computers Magnetism 27:10–25CrossRef Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Design & Test of Computers Magnetism 27:10–25CrossRef
18.
go back to reference Wang RX (1986) Mathematical statistics. Xi’an Jiaotong University Press, Xi’an, pp 32–109 Wang RX (1986) Mathematical statistics. Xi’an Jiaotong University Press, Xi’an, pp 32–109
19.
go back to reference Zhang JL, Fang L, Li L, Zhang ZX (2015) A novel approach to detecting hardware Trojan horses. In: 2015 8th international symposium on computational intelligence and design, Hangzhou, pp 43–46 Zhang JL, Fang L, Li L, Zhang ZX (2015) A novel approach to detecting hardware Trojan horses. In: 2015 8th international symposium on computational intelligence and design, Hangzhou, pp 43–46
20.
go back to reference Zhao ZX, Ni L, Li SQ, Shi YB (2015) A feature extraction method for hardware Trojan detection. In: 2015 international conference on automation, mechanical control and computational engineering, Jinan, pp 1726–1731 Zhao ZX, Ni L, Li SQ, Shi YB (2015) A feature extraction method for hardware Trojan detection. In: 2015 international conference on automation, mechanical control and computational engineering, Jinan, pp 1726–1731
21.
go back to reference Zhou B, Zhang W, Thambipilai S (2016) Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE Trans Comput Aided Des Integr Circuits Syst 35:792–805CrossRef Zhou B, Zhang W, Thambipilai S (2016) Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique. IEEE Trans Comput Aided Des Integr Circuits Syst 35:792–805CrossRef
22.
Metadata
Title
Activity Factor Based Hardware Trojan Detection and Localization
Authors
Yongkang Tang
Liang Fang
Shaoqing Li
Publication date
20-05-2019
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 3/2019
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-019-05803-1

Other articles of this Issue 3/2019

Journal of Electronic Testing 3/2019 Go to the issue