Skip to main content
Top
Published in: Journal of Electronic Testing 1/2020

07-02-2020

Trojan Detection Test for Clockless Circuits

Authors: Ricardo Aquino Guazzelli, Matheus Garay Trindade, Leonel Acunha Guimarães, Thiago Ferreira de Paiva Leite, Laurent Fesquet, Rodrigo Possamai Bastos

Published in: Journal of Electronic Testing | Issue 1/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Clockless integrated circuits, as any type of integrated system, might today carry hardware Trojan (HT) circuits maliciously implanted in the designs during outsourced phases of fabrication. This paper proposes a testing technique dedicated to detect HTs in clockless circuits fabricated in CMOS technologies. The proposed technique applies a well-known machine learning approach – One-Class Support Vector Machine (OC-SVM) – for dealing with the particular current signature features of clockless circuits. Through simulation experiments we show the natural ability of clockless circuits in providing individual current signatures for identifying the presence of HTs. Moreover, the results demonstrate that our testing technique requires no extra circuitry or power ports to detect HTs of a few dozens of transistors in designs under Trojan test with more than 13 thousand transistors.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. In: IEEE design test of computers, vol 27, pp 10–25 Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. In: IEEE design test of computers, vol 27, pp 10–25
2.
go back to reference He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration VLSI Systems 25(10):2939–2948CrossRef He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration VLSI Systems 25(10):2939–2948CrossRef
3.
go back to reference Hoque T, Narasimhan S, Wang X, Mal-Sarkar S, Bhunia S (2017) Golden-free hardware trojan detection with high sensitivity under process noise. J Electron Test 33(1):107–124CrossRef Hoque T, Narasimhan S, Wang X, Mal-Sarkar S, Bhunia S (2017) Golden-free hardware trojan detection with high sensitivity under process noise. J Electron Test 33(1):107–124CrossRef
4.
go back to reference Liu Y, Huang K, Makris Y (2014) Hardware trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proc. 51st design automation conference (DAC), pp 1–6 Liu Y, Huang K, Makris Y (2014) Hardware trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proc. 51st design automation conference (DAC), pp 1–6
5.
go back to reference Stellari F, Song P, Weger AJ, Culp J, Herbert A, Pfeiffer D (2014) Verification of untrusted chips using trusted layout and emission measurements. In: Proc. IEEE international symposium on hardware-oriented security and trust (HOST), pp 19–24 Stellari F, Song P, Weger AJ, Culp J, Herbert A, Pfeiffer D (2014) Verification of untrusted chips using trusted layout and emission measurements. In: Proc. IEEE international symposium on hardware-oriented security and trust (HOST), pp 19–24
6.
go back to reference Jap D, He W, Bhasin S (2016) Supervised and unsupervised machine learning for side-channel based trojan detection. In: Proc. international conference on application-specific systems, architectures and processors (ASAP), pp 17–24 Jap D, He W, Bhasin S (2016) Supervised and unsupervised machine learning for side-channel based trojan detection. In: Proc. international conference on application-specific systems, architectures and processors (ASAP), pp 17–24
7.
go back to reference Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware trojans using power supply transient signals. In: Proc. IEEE international workshop on hardware-oriented security and trust (HOST), pp 3–7 Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware trojans using power supply transient signals. In: Proc. IEEE international workshop on hardware-oriented security and trust (HOST), pp 3–7
8.
go back to reference Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. Transactions on Very Large Scale Integration VLSI Systems 25(4):1506–1519CrossRef Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. Transactions on Very Large Scale Integration VLSI Systems 25(4):1506–1519CrossRef
9.
go back to reference Shanyour B, Tragoudas S (2018) Detection of low power trojans in standard cell designs using built-in current sensors. In: Proc. IEEE international test conference (ITC), pp 1–10 Shanyour B, Tragoudas S (2018) Detection of low power trojans in standard cell designs using built-in current sensors. In: Proc. IEEE international test conference (ITC), pp 1–10
10.
go back to reference Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Transactions on Information Forensics and Security 5(4):893–904CrossRef Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Transactions on Information Forensics and Security 5(4):893–904CrossRef
11.
go back to reference Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE international symposium on defect and fault tolerance of (VLSI) systems, pp 87–95 Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE international symposium on defect and fault tolerance of (VLSI) systems, pp 87–95
12.
go back to reference Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. Transactions on Computer-Aided Design of Integrated Circuits and Systems 35(1):37–48CrossRef Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. Transactions on Computer-Aided Design of Integrated Circuits and Systems 35(1):37–48CrossRef
13.
go back to reference Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(10):1577–1585CrossRef Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(10):1577–1585CrossRef
14.
go back to reference Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310
15.
go back to reference Hoque T, Mustapa M, Amsaad F, Niamat M (2015) Assessment of NAND based ring oscillator for hardware Trojan detection. In: Proc. IEEE 58th international midwest symposium on circuits and systems MWSCAS, pp 1–4 Hoque T, Mustapa M, Amsaad F, Niamat M (2015) Assessment of NAND based ring oscillator for hardware Trojan detection. In: Proc. IEEE 58th international midwest symposium on circuits and systems MWSCAS, pp 1–4
16.
go back to reference Cha B, Gupta SK (2013) Trojan detection via delay measurements: a new approach to select paths and cectors to maximize effectiveness and minimize cost. In: Proc. design, automation test in Europe conference (DATE), pp 1265–1270 Cha B, Gupta SK (2013) Trojan detection via delay measurements: a new approach to select paths and cectors to maximize effectiveness and minimize cost. In: Proc. design, automation test in Europe conference (DATE), pp 1265–1270
17.
go back to reference Lodhi FK, Hasan SR, Hasan O, Awwad F (2014) Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. In: Proc. 57th international midwest symposium on circuits and systems (MWSCAS), pp 659–662 Lodhi FK, Hasan SR, Hasan O, Awwad F (2014) Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. In: Proc. 57th international midwest symposium on circuits and systems (MWSCAS), pp 659–662
18.
go back to reference Lodhi FK, Hasan SR, Hasan O, Awwad F (2015) Formal analysis of macro synchronous micro asychronous pipeline for hardware trojan detection. In: Proc. Nordic circuits and systems conference (NORCAS): NORCHIP international symposium on system-on-chip (SoC), pp 1–4 Lodhi FK, Hasan SR, Hasan O, Awwad F (2015) Formal analysis of macro synchronous micro asychronous pipeline for hardware trojan detection. In: Proc. Nordic circuits and systems conference (NORCAS): NORCHIP international symposium on system-on-chip (SoC), pp 1–4
19.
go back to reference Guimarães LA, de Paiva Leite TF, Bastos RP, Fesquet L (2018) Non-intrusive testing technique for detection of trojans in asynchronous circuits. In: Proc. design, automation test in Europe conference (DATE), pp 1516–1519 Guimarães LA, de Paiva Leite TF, Bastos RP, Fesquet L (2018) Non-intrusive testing technique for detection of trojans in asynchronous circuits. In: Proc. design, automation test in Europe conference (DATE), pp 1516–1519
20.
go back to reference Guimarães LA, Bastos RP, Fesquet L (2017) Detection of layout-level trojans by monitoring substrate with preexisting built-in sensors. In: Proc. IEEE computer society annual symposium on VLSI (ISVLSI), pp 290–295 Guimarães LA, Bastos RP, Fesquet L (2017) Detection of layout-level trojans by monitoring substrate with preexisting built-in sensors. In: Proc. IEEE computer society annual symposium on VLSI (ISVLSI), pp 290–295
21.
go back to reference Bouesse GF, Renaudin M, Dumont S, Germain F (2005) DPA On quasi-delay insensitive asynchronous circuits: formalization and improvement. In: Proc. design, automation and test in Europe (DATE), pp 424–429 Bouesse GF, Renaudin M, Dumont S, Germain F (2005) DPA On quasi-delay insensitive asynchronous circuits: formalization and improvement. In: Proc. design, automation and test in Europe (DATE), pp 424–429
22.
go back to reference Lim J, Ho WG, Chong KS, Gwee BH (2017) DPA-resistant QDI dual-rail AES S-box based on power-balanced weak-conditioned half-buffer. In: Proc. IEEE international symposium on circuits and systems (ISCAS), pp 1–4 Lim J, Ho WG, Chong KS, Gwee BH (2017) DPA-resistant QDI dual-rail AES S-box based on power-balanced weak-conditioned half-buffer. In: Proc. IEEE international symposium on circuits and systems (ISCAS), pp 1–4
23.
go back to reference Bouesse GF, Renaudin M, Witon A, Germain F (2005) A clock-less low-voltage AES crypto-processor. In: Proc. European solid-state circuits conference (ESSCIRC), pp 403–406 Bouesse GF, Renaudin M, Witon A, Germain F (2005) A clock-less low-voltage AES crypto-processor. In: Proc. European solid-state circuits conference (ESSCIRC), pp 403–406
24.
go back to reference Monnet Y, Renaudin M, Leveugle R (2005) Hardening techniques against transient faults for asynchronous circuits. In: Proc. 11th IEEE international on-line testing symposium, pp 129–134 Monnet Y, Renaudin M, Leveugle R (2005) Hardening techniques against transient faults for asynchronous circuits. In: Proc. 11th IEEE international on-line testing symposium, pp 129–134
25.
go back to reference Sutherland IE, Ebergen J (2002) Computer without clocks. Scientific American Sutherland IE, Ebergen J (2002) Computer without clocks. Scientific American
26.
go back to reference Martin AJ, Nystrom M (2006) Asynchronous techniques for system-on-chip design. Proc IEEE 94 (6):1089–1120CrossRef Martin AJ, Nystrom M (2006) Asynchronous techniques for system-on-chip design. Proc IEEE 94 (6):1089–1120CrossRef
27.
go back to reference Narasimhan S, Du D, Chakraborty R, Paul S, Wolff F, Papachristou C, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. In: IEEE transactions on computers, vol 62, pp 2183–2195 Narasimhan S, Du D, Chakraborty R, Paul S, Wolff F, Papachristou C, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. In: IEEE transactions on computers, vol 62, pp 2183–2195
28.
go back to reference Xiao K, Zhang X, Tehranipoor M (2013) A clock sweeping technique for detecting hardware trojans impacting circuits delay. IEEE Design Test 30(2):26–34CrossRef Xiao K, Zhang X, Tehranipoor M (2013) A clock sweeping technique for detecting hardware trojans impacting circuits delay. IEEE Design Test 30(2):26–34CrossRef
29.
go back to reference Guimarães LA, Bastos RP, de Paiva Leite TF, Fesquet L (2016) Simple tri-state logic trojans able to upset properties of ring oscillators. In: Proc. international conference on design and technology of integrated systems in nanoscale era (DTIS), pp 1–6 Guimarães LA, Bastos RP, de Paiva Leite TF, Fesquet L (2016) Simple tri-state logic trojans able to upset properties of ring oscillators. In: Proc. international conference on design and technology of integrated systems in nanoscale era (DTIS), pp 1–6
30.
go back to reference Subasi A, Gursoy MI (2010) EEG Signal classification using PCA, ICA, LDA and support vector machines. In: Expert systems with applications, vol 37, pp 8659–8666 Subasi A, Gursoy MI (2010) EEG Signal classification using PCA, ICA, LDA and support vector machines. In: Expert systems with applications, vol 37, pp 8659–8666
Metadata
Title
Trojan Detection Test for Clockless Circuits
Authors
Ricardo Aquino Guazzelli
Matheus Garay Trindade
Leonel Acunha Guimarães
Thiago Ferreira de Paiva Leite
Laurent Fesquet
Rodrigo Possamai Bastos
Publication date
07-02-2020
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 1/2020
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-020-05857-6

Other articles of this Issue 1/2020

Journal of Electronic Testing 1/2020 Go to the issue

Announcement

2019 Reviewers