Skip to main content
Top

2015 | OriginalPaper | Chapter

Detection and Diagnosis of Hardware Trojan Using Power Analysis

Authors : Eknadh Vaddi, Karthik Gaddam, Rahul Karthik Maniam, Sai Abhishek Mallavajjala, Srinivasulu Dasari, Nirmala Devi M.

Published in: Security in Computing and Communications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Intended malicious modification in the integrated circuits is referred to as Hardware Trojans, which has emerged as major security threat. The earlier approach, to keep check to these threats, like logic testing also known as functional testing is proved to be no longer effective for detecting large sequential Trojans which are very rarely triggered. Side channel analysis has been an effective approach for detection of such large sequential Trojans but the increasing process variations and decreasing Trojan size resulted in the reduction of Trojan detection sensitivity using this approach. All these approaches also require golden IC. In this paper, we propose leakage power analysis approach which does not require golden IC and the issue of process variations does not affect the detection sensitivity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Narasimhan, S., et al.: Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183–2195 (2013)MathSciNetCrossRef Narasimhan, S., et al.: Hardware Trojan detection by multiple-parameter side-channel analysis. IEEE Trans. Comput. 62(11), 2183–2195 (2013)MathSciNetCrossRef
2.
go back to reference Mukhopadhyay, D., Chakraborty, R.S.: Hardware Trojans. In: Hardware Security: Design, Threats and Safeguards, 4th edn., Chap. 5, Sect. 1, pp. 341–345. CRC Press (2014) Mukhopadhyay, D., Chakraborty, R.S.: Hardware Trojans. In: Hardware Security: Design, Threats and Safeguards, 4th edn., Chap. 5, Sect. 1, pp. 341–345. CRC Press (2014)
3.
go back to reference Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. 27(1), 10–25 (2010)CrossRef
4.
go back to reference Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: Proceedings of the IEEE International High Level Design Validation Test Workshop, pp. 166–171 (2009) Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: Proceedings of the IEEE International High Level Design Validation Test Workshop, pp. 166–171 (2009)
5.
go back to reference Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE TVLSI (2010) Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE TVLSI (2010)
6.
go back to reference Bhunia, S., et al.: Hardware Trojan attacks: threat analysis and countermeasures. IEEE Des. Test Comput. 102, 1229–1247 (2014). Version 8 Bhunia, S., et al.: Hardware Trojan attacks: threat analysis and countermeasures. IEEE Des. Test Comput. 102, 1229–1247 (2014). Version 8
7.
go back to reference Banga, M., Hsiao, M.: A novel sustained vector technique for the detection of hardware Trojans. In: Proceedings of the 22nd International Conference on VLSI Design, pp. 327–332 (2009) Banga, M., Hsiao, M.: A novel sustained vector technique for the detection of hardware Trojans. In: Proceedings of the 22nd International Conference on VLSI Design, pp. 327–332 (2009)
8.
go back to reference Dinesh Kumar, K., Mohan Kumar, N.: Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology. In: Proceedings of 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT), China (2014) Dinesh Kumar, K., Mohan Kumar, N.: Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology. In: Proceedings of 5th International Conference on Computing, Communication and Networking Technologies (ICCCNT), China (2014)
9.
go back to reference Du, D., Narasimhan, S., Chakraborty, R.S., Bhunia, S.: Self-referencing: a scalable side-channel approach for hardware Trojan detection. In: Proceedings of the 12th International Conference on Cryptographic Hardware Embedded Systems Workshop, pp. 173–187 (2010) Du, D., Narasimhan, S., Chakraborty, R.S., Bhunia, S.: Self-referencing: a scalable side-channel approach for hardware Trojan detection. In: Proceedings of the 12th International Conference on Cryptographic Hardware Embedded Systems Workshop, pp. 173–187 (2010)
Metadata
Title
Detection and Diagnosis of Hardware Trojan Using Power Analysis
Authors
Eknadh Vaddi
Karthik Gaddam
Rahul Karthik Maniam
Sai Abhishek Mallavajjala
Srinivasulu Dasari
Nirmala Devi M.
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-22915-7_47

Premium Partner