Skip to main content
Top
Published in: Journal of Electronic Testing 1/2021

24-05-2021

High Resolution Pulse Propagation Driven Trojan Detection in Digital Systems

Authors: Sabyasachi Deyati, Barry J. Muldrey, Adit D. Singh, Abhijit Chatterjee

Published in: Journal of Electronic Testing | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Outsourcing of IC manufacturing has opened the possibility of intentionally modifying the operation of the IC in a subtle way so that it is extremely difficult to detect, in conventional functional testing. Security in computation is no longer a software only issue, the underlying computing hardware may also be compromised. As occurrence of Trojan activation is rare event, it needs to be detected without actually activating it. In digital systems Trojan payload takes input from low activity nodes of the original circuit. Even when the Trojan is not activated, these tapings of original circuit nodes exhibit extra capacitive load. This work is geared towards detecting these extra capacitances with unprecedented accuracy to uncover malicious Trojans in the circuit. We have shown that pulse propagation in logic circuit can be used to detect any extra stray capacitance at any circuit node with 20-25X better diagnostic resolution than that of any other delay and frequency measurement based techniques. We have developed a current sensor that monitors supply currents at predetermined low activity gates. If any one of these nodes are tapped for Trojan, then due to extra capacitive load the applied pulse gets killed and the difference maximum current (before and after pulse) indicate Trojan occurrence. While majority of the Trojan detection techniques loose diagnostic accuracy with the size of the circuit and amount of process variation, diagnostic capability of the proposed pulse based technique is independent of size of the circuit. The proposed scheme can be integrated into JTAG boundary scan to provide a complete solution for hardware Trojan detection in digital systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
3.
go back to reference Becker GT, Regazzoni F, Paar C, Burleson WP (2013) Stealthy dopant-level hardware Trojans. In Proc. 15th International Workshop on Cryptographic Hardware Embedded Systems (CHES), Santa Barbara, CA, USA, August 20–23, 2013. G. Bertoni and J.-S. Coron Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp 197–214 Becker GT, Regazzoni F, Paar C, Burleson WP (2013) Stealthy dopant-level hardware Trojans. In Proc. 15th International Workshop on Cryptographic Hardware Embedded Systems (CHES), Santa Barbara, CA, USA, August 20–23, 2013. G. Bertoni and J.-S. Coron Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, pp 197–214
4.
go back to reference Bisdounis L, Nikolaidis S, Koufopavlou O (1998) Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices. IEEE Journal of Solid-State Circuits 33(2):302–306. https://doi.org/10.1109/4.658636 Bisdounis L, Nikolaidis S, Koufopavlou O (1998) Analytical transient response and propagation delay evaluation of the CMOS inverter for short-channel devices. IEEE Journal of Solid-State Circuits 33(2):302–306. https://​doi.​org/​10.​1109/​4.​658636
7.
go back to reference Cha B, Gupta SK (2013, 18–22 March 2013, 2013) Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost. In Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE), pp 1265–1270. https://doi.org/10.7873/DATE.2013.262 Cha B, Gupta SK (2013, 18–22 March 2013, 2013) Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost. In Proc. Design, Automation & Test in Europe Conference & Exhibition (DATE), pp 1265–1270. https://​doi.​org/​10.​7873/​DATE.​2013.​262
9.
go back to reference Deyati S, Muldrey BJ, Singh A, Chatterjee A (2014) High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure. In Proc. IEEE 23rd Asian Test Symposium (ATS), 16–19 Nov. 2014, pp 200–205. https://doi.org/10.1109/ATS.2014.45 Deyati S, Muldrey BJ, Singh A, Chatterjee A (2014) High resolution pulse propagation driven Trojan detection in digital logic: optimization algorithms and infrastructure. In Proc. IEEE 23rd Asian Test Symposium (ATS), 16–19 Nov. 2014, pp 200–205. https://​doi.​org/​10.​1109/​ATS.​2014.​45
10.
go back to reference Ferlet-Cavrois V, Pouget V, McMorrow D, Schwank JR, Fel N, Essely F, Flores RS, Paillet P, Gaillardin M, Kobayashi D, Melinger JS, Duhamel O, Dodd PE, Shaneyfelt MR (2008) Investigation of the propagation induced pulse broadening (PIPB) effect on single event transients in SOI and bulk inverter chains. IEEE Trans Nucl Sci 55(6):2842–2853. https://doi.org/10.1109/TNS.2008.2007724CrossRef Ferlet-Cavrois V, Pouget V, McMorrow D, Schwank JR, Fel N, Essely F, Flores RS, Paillet P, Gaillardin M, Kobayashi D, Melinger JS, Duhamel O, Dodd PE, Shaneyfelt MR (2008) Investigation of the propagation induced pulse broadening (PIPB) effect on single event transients in SOI and bulk inverter chains. IEEE Trans Nucl Sci 55(6):2842–2853. https://​doi.​org/​10.​1109/​TNS.​2008.​2007724CrossRef
17.
go back to reference http://www.trust-hub.org/ [ Accessed on Jun-06-2018] http://www.trust-hub.org/ [ Accessed on Jun-06-2018]
23.
27.
go back to reference Deyati S, Muldrey BJ, Chatterjee A (2016) Trojan detection in digital systems using current sensing of pulse propagation in logic gates. In Proc. 17th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, pp 350–355 Deyati S, Muldrey BJ, Chatterjee A (2016) Trojan detection in digital systems using current sensing of pulse propagation in logic gates. In Proc. 17th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, pp 350–355
28.
go back to reference Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). 27–27 July 2009, pp 66–73. https://doi.org/10.1109/HST.2009.5224968 Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In Proc. IEEE International Workshop on Hardware-Oriented Security and Trust (HOST). 27–27 July 2009, pp 66–73. https://​doi.​org/​10.​1109/​HST.​2009.​5224968
30.
go back to reference Song P, Stellari F, Pfeiffer D, Culp J, Weger A, Bonnoit A, Wisnieff B, Taubenblatt M (2011) MARVEL: Malicious alteration recognition and verification by emission of light. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5–6 June 2011, pp 117–121. https://doi.org/10.1109/HST.2011.5955007 Song P, Stellari F, Pfeiffer D, Culp J, Weger A, Bonnoit A, Wisnieff B, Taubenblatt M (2011) MARVEL: Malicious alteration recognition and verification by emission of light. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 5–6 June 2011, pp 117–121. https://​doi.​org/​10.​1109/​HST.​2011.​5955007
31.
go back to reference Sutherland I, Sproull B, Harris D (1999) Logical effort: designing fast CMOS circuits. Morgan Kaufmann Publishers Inc., p. 240 Sutherland I, Sproull B, Harris D (1999) Logical effort: designing fast CMOS circuits. Morgan Kaufmann Publishers Inc., p. 240
33.
Metadata
Title
High Resolution Pulse Propagation Driven Trojan Detection in Digital Systems
Authors
Sabyasachi Deyati
Barry J. Muldrey
Adit D. Singh
Abhijit Chatterjee
Publication date
24-05-2021
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 1/2021
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-021-05926-4

Other articles of this Issue 1/2021

Journal of Electronic Testing 1/2021 Go to the issue

EditorialNotes

Editorial