Skip to main content
Top

2020 | OriginalPaper | Chapter

5. Methods of Detecting Hardware Trojans in Microcircuits

Authors : Anatoly Belous, Vitali Saladukha

Published in: Viruses, Hardware and Software Trojans

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In previous section, we performed a detailed examination of classification of Trojans in microcircuits, their design principles, functioning mechanisms, and masking methods. This chapter is dedicated to identification of the most effective means to identify hardware Trojans in microcircuits.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference C. Krieg, E. Weippl, Malware in Hardware Infrastructure Components. SBA Research, Favoritenstrasse 16, 1040, Vienna {ckrieg, eweippl}@sba- research.org C. Krieg, E. Weippl, Malware in Hardware Infrastructure Components. SBA Research, Favoritenstrasse 16, 1040, Vienna {ckrieg, eweippl}@sba- research.org
5.
go back to reference M.S. Anderson, C.J.G. North, K.K. Yiu, Towards Countering the Rise of the Silicon Trojan. Technical Report 12 (2008). 20PR.pdf M.S. Anderson, C.J.G. North, K.K. Yiu, Towards Countering the Rise of the Silicon Trojan. Technical Report 12 (2008). 20PR.​pdf
12.
go back to reference M. Banga, M. Chandrasekar, L. Fang, M.S. Hsiao, Guided test generation for isolation and detection of embedded Trojans in ICs, in GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI. New York, NY, USA (ACM, 2008), pp. 363–366. ISBN 978-1-59593-999-9. http://doi.acm.org/10.1145/1366110.1366196 M. Banga, M. Chandrasekar, L. Fang, M.S. Hsiao, Guided test generation for isolation and detection of embedded Trojans in ICs, in GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI. New York, NY, USA (ACM, 2008), pp. 363–366. ISBN 978-1-59593-999-9. http://​doi.​acm.​org/​10.​1145/​1366110.​1366196
15.
go back to reference R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 396–410, https://doi.org/10.1007/978-3-642-04138-9_28 R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 396–410, https://​doi.​org/​10.​1007/​978-3-642-04138-9_​28
21.
go back to reference D. Du, S. Narasimhan, R. Chakraborty, S. Bhunia, Self-referencing: a scalable side-channel approach for hardware Trojan detection, in Cryptographic Hardware and Embedded Systems, CHES 2010, ed. by S. Mangard, F.-X. Standaert. Volume 6225 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 173–187, http://dx.doi.org/10.1007/978-3-642-15031-9_12 D. Du, S. Narasimhan, R. Chakraborty, S. Bhunia, Self-referencing: a scalable side-channel approach for hardware Trojan detection, in Cryptographic Hardware and Embedded Systems, CHES 2010, ed. by S. Mangard, F.-X. Standaert. Volume 6225 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 173–187, http://​dx.​doi.​org/​10.​1007/​978-3-642-15031-9_​12
22.
go back to reference M. Hicks, M. Finnicum, S.T. King, M.M.K. Martin, J.M. Smith, Overcoming an untrusted computing base: detecting and removing malicious hardware automatically, in 2010 IEEE Symposium on Security and Privacy (SP) (2010), pp. 159–172, https://doi.org/10.1109/sp.2010.18 M. Hicks, M. Finnicum, S.T. King, M.M.K. Martin, J.M. Smith, Overcoming an untrusted computing base: detecting and removing malicious hardware automatically, in 2010 IEEE Symposium on Security and Privacy (SP) (2010), pp. 159–172, https://​doi.​org/​10.​1109/​sp.​2010.​18
30.
go back to reference F. Koushanfar, A. Mirhoseini, Y.A. Alkabani, A unifted submodular framework for multimodal IC Trojan detection, in Information Hiding, ed. by R. Boohme, P. Fong, R. Safavi-Naini. Volume 6387 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 17–32, http://dx.doi.org/10.1007/978-3-642-16435-42 F. Koushanfar, A. Mirhoseini, Y.A. Alkabani, A unifted submodular framework for multimodal IC Trojan detection, in Information Hiding, ed. by R. Boohme, P. Fong, R. Safavi-Naini. Volume 6387 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 17–32, http://​dx.​doi.​org/​10.​1007/​978-3-642-16435-42
31.
go back to reference C. Lamech, R. Rad, M. Tehrani, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. Trans. Inf. Forensics Secur. (99) (2011), https://doi.org/10.1109/tifs.2011.2136339. Early Access C. Lamech, R. Rad, M. Tehrani, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. Trans. Inf. Forensics Secur. (99) (2011), https://​doi.​org/​10.​1109/​tifs.​2011.​2136339. Early Access
34.
go back to reference L. Lin, M. Kasper, T.G. Neysu, C. Paar, W Burleson, Trojan side-channels: lightweight hardware trojans through side-channel engineering, in Cryptographic Hardware and Embedded System—CHES 2009, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 382–395, http://dx.doi.org/10.1007/978-3-642-04138-9_27 L. Lin, M. Kasper, T.G. Neysu, C. Paar, W Burleson, Trojan side-channels: lightweight hardware trojans through side-channel engineering, in Cryptographic Hardware and Embedded System—CHES 2009, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 382–395, http://​dx.​doi.​org/​10.​1007/​978-3-642-04138-9_​27
36.
go back to reference S. Narasimhan, D. Du, R.S. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia, Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach, in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2010), pp. 13–18, https://doi.org/10.1109/hst.2010.5513122 S. Narasimhan, D. Du, R.S. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia, Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach, in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2010), pp. 13–18, https://​doi.​org/​10.​1109/​hst.​2010.​5513122
38.
go back to reference M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey, Hardware Trojan horse detection using gate-level characterization, in DAC ’09: Proceedings of the 46th Annual Design Automation Conference, New York, NY, USA, 2009 (ACM, 2009), pp. 688–693. ISBN 978-160558-497-3. http://doi.acm.org/10.1145/1629911.1630091 M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey, Hardware Trojan horse detection using gate-level characterization, in DAC ’09: Proceedings of the 46th Annual Design Automation Conference, New York, NY, USA, 2009 (ACM, 2009), pp. 688–693. ISBN 978-160558-497-3. http://​doi.​acm.​org/​10.​1145/​1629911.​1630091
40.
go back to reference R. Rad, J. Plusquellic, M. Tehranipoor, A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(12), 1735–1744 (2010). ISSN 1063-8210. https://doi.org/10.1109/tvlsi.2009.2029117 R. Rad, J. Plusquellic, M. Tehranipoor, A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(12), 1735–1744 (2010). ISSN 1063-8210. https://​doi.​org/​10.​1109/​tvlsi.​2009.​2029117
41.
43.
go back to reference H. Salmani, M. Tehranipoor, J. Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time, in IEEE International Workshop on Hardware-Oriented Security and Trust, 2009. HOST ’09 (2009), pp. 66–73, https://doi.org/10.1109/hst.2009.5224968 H. Salmani, M. Tehranipoor, J. Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time, in IEEE International Workshop on Hardware-Oriented Security and Trust, 2009. HOST ’09 (2009), pp. 66–73, https://​doi.​org/​10.​1109/​hst.​2009.​5224968
44.
go back to reference H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, in Proceedings of IEEE Int Information Forensics and Security (WIFS) Workshop (2010), pp. 1–6, https://doi.org/10.1109/wifs.20https://doi.org/10.5711438 H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, in Proceedings of IEEE Int Information Forensics and Security (WIFS) Workshop (2010), pp. 1–6, https://​doi.​org/​10.​1109/​wifs.​20https://doi.org/10.5711438
45.
go back to reference H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing trojan activation time. (99) (2011), https://doi.org/10.1109/tvlsi.20https://doi.org/10.2093547. Early Access H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing trojan activation time. (99) (2011), https://​doi.​org/​10.​1109/​tvlsi.​20https://doi.org/10.2093547. Early Access
48.
go back to reference X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan detection and isolation using current integration and localized current analysis, in IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08 (2008), pp. 87–95, https://doi.org/10.1109/dft.2008.61 X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan detection and isolation using current integration and localized current analysis, in IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08 (2008), pp. 87–95, https://​doi.​org/​10.​1109/​dft.​2008.​61
54.
go back to reference R. Torrance, D. James, The state-of-the-art in semiconductor reverse engineering, in Design Automation Conference—DAC 2011, ed. by L. Stok, N.D. Dutt, S. Hassoun (ACM, 2011), pp. 333–338 R. Torrance, D. James, The state-of-the-art in semiconductor reverse engineering, in Design Automation Conference—DAC 2011, ed. by L. Stok, N.D. Dutt, S. Hassoun (ACM, 2011), pp. 333–338
55.
go back to reference C. Bao, D. Forte, A. Srivastava, On application of one-class SVM to reverse engineering-based hardware trojan detection, in International Symposium on Quality Electronic Design—ISQED 2014 (IEEE, 2014), pp. 47–54 C. Bao, D. Forte, A. Srivastava, On application of one-class SVM to reverse engineering-based hardware trojan detection, in International Symposium on Quality Electronic Design—ISQED 2014 (IEEE, 2014), pp. 47–54
56.
go back to reference R.S. Chakraborty, F.G. Wolff, S. Paul, C.A. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2009, ed. by C. Clavier, K. Gaj, ser. LNCS, vol. 5747 (Springer, 2009), pp. 396–410 R.S. Chakraborty, F.G. Wolff, S. Paul, C.A. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2009, ed. by C. Clavier, K. Gaj, ser. LNCS, vol. 5747 (Springer, 2009), pp. 396–410
57.
go back to reference D. Du, S. Narasimhan, R.S. Chakraborty, S. Bhunia, Selfreferencing: a scalable side-channel approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2010, ed. by S. Mangard, F. Standaert, ser. LNCS, vol. 6225 (Springer, 2010), pp. 173–187 D. Du, S. Narasimhan, R.S. Chakraborty, S. Bhunia, Selfreferencing: a scalable side-channel approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2010, ed. by S. Mangard, F. Standaert, ser. LNCS, vol. 6225 (Springer, 2010), pp. 173–187
Metadata
Title
Methods of Detecting Hardware Trojans in Microcircuits
Authors
Anatoly Belous
Vitali Saladukha
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-47218-4_5