Skip to main content
Erschienen in: Journal of Electronic Testing 1/2015

01.02.2015

Detecting Hardware Trojans using On-chip Sensors in an ASIC Design

verfasst von: Shane Kelly, Xuehui Zhang, Mohammed Tehranipoor, Andrew Ferraiuolo

Erschienen in: Journal of Electronic Testing | Ausgabe 1/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The modern integrated circuit (IC) manufacturing process has exposed the fabless semiconductor industry to hardware Trojans that threaten circuits bound for critical applications. This paper investigates an on-chip sensor’s effectiveness for Trojan detection in an application specific integrated circuit (ASIC) and proposes new techniques to improve the sensor’s sensitivity to Trojan switching activity. The sensors serve as power supply monitors by detecting fluctuations in their characteristic frequencies due to malicious inclusions (i.e. hardware Trojans) in the circuit under authentication. Our proposed on-chip structure was implemented and fabricated on an ASIC test chip using IBM 90nm technology with controlled hardware Trojans. This work analyzes the impact of both sequential and combinational Trojans with varied partial activity, area, and location on the proposed on-chip structure and demonstrates that stealthy Trojans can be effectively detected with this technique, even when obfuscated by circuit switching activity and process and environmental variations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC Fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310
2.
Zurück zum Zitat Ayers JE (2009) Digital integrated circuits analysis and design, 2nd edn. CRC Press, pp 242–248 Ayers JE (2009) Digital integrated circuits analysis and design, 2nd edn. CRC Press, pp 242–248
3.
Zurück zum Zitat Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 40–47 Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 40–47
4.
Zurück zum Zitat Bradford Barber C, Dobkin DP, Huhdanpaa H (1996) The quickhull algorithm for convex hulls. ACM Trans Math Softw:469–483 Bradford Barber C, Dobkin DP, Huhdanpaa H (1996) The quickhull algorithm for convex hulls. ACM Trans Math Softw:469–483
5.
Zurück zum Zitat Chakraborty RS, Paul S, Bhunia S (2008) On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 48–50 Chakraborty RS, Paul S, Bhunia S (2008) On-demand transparency for improving hardware Trojan detectability. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 48–50
6.
Zurück zum Zitat Ferraiuolo A, Zhang X, Tehranipoor M (2012) Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC. In: Proc. int. conf. on computer-aided design (ICCAD) Ferraiuolo A, Zhang X, Tehranipoor M (2012) Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC. In: Proc. int. conf. on computer-aided design (ICCAD)
7.
Zurück zum Zitat Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 51–57 Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 51–57
8.
Zurück zum Zitat Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE), pp 117–124 Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: Proc. IEEE high assurance systems engineering symposium (HASE), pp 117–124
9.
Zurück zum Zitat Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer Jolliffe IT (2002) Principal component analysis, 2nd edn. Springer
10.
Zurück zum Zitat Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware Trojans. Computer:39–46 Karri R, Rajendran J, Rosenfeld K, Tehranipoor M (2010) Trustworthy hardware: identifying and classifying hardware Trojans. Computer:39–46
11.
Zurück zum Zitat Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 8–14 Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 8–14
12.
Zurück zum Zitat Narasimhan S, Du D, Chakraborty RS, Paul S,Wolff F, Papachristou C, Roy K, Bhunia S (2010) Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST), pp 13–18 Narasimhan S, Du D, Chakraborty RS, Paul S,Wolff F, Papachristou C, Roy K, Bhunia S (2010) Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proc. IEEE int. symposium on hardware-oriented security and trust (HOST), pp 13–18
13.
Zurück zum Zitat Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011) Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST), pp 71–74 Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011) Tesr: a robust temporal self-referencing approach for hardware Trojan detection. In: Proc. IEEE int. symposium on hardware oriented security and trust (HOST), pp 71–74
14.
Zurück zum Zitat Preparata FP, Hong SJ (1977) Convex hulls of finite sets of points in two and three dimensions. Commun ACM:87–93 Preparata FP, Hong SJ (1977) Convex hulls of finite sets of points in two and three dimensions. Commun ACM:87–93
15.
Zurück zum Zitat Potkonjak M, Nahapetian A, Nelson M, Massey T (2009) Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC), pp 688–693 Potkonjak M, Nahapetian A, Nelson M, Massey T (2009) Hardware Trojan horse detection using gate-level characterization. In: Proc. ACM/IEEE design automation conference (DAC), pp 688–693
16.
Zurück zum Zitat Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 3–7 Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware Trojans using power supply transient signals. In: Proc. IEEE int. workshop on hardware-oriented security and trust (HOST), pp 3–7
17.
Zurück zum Zitat Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008) Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD), pp 632–639 Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008) Power supply signal calibration techniques for improving detection resolution to hardware Trojans. In: Proc. IEEE int. conference on computer-aided design (ICCAD), pp 632–639
18.
Zurück zum Zitat Rilling J, Graziano D, Hitchcock J, Meyer T, Wang X, Jones P, Zambreno J (2011) Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD), pp 289–292 Rilling J, Graziano D, Hitchcock J, Meyer T, Wang X, Jones P, Zambreno J (2011) Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection. In: Proc. IEEE 29th int. conference on computer design (ICCD), pp 289–292
19.
Zurück zum Zitat Report of the defense science board task force on high performace microchip supply (2005) Technical report, US DOD Report of the defense science board task force on high performace microchip supply (2005) Technical report, US DOD
20.
Zurück zum Zitat Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 66–73 Salmani H, Tehranipoor M, Plusquellic J (2009) New design strategy for improving hardware Trojan detection and reducing Trojan activation time. In: Proc. IEEE int. workshop on hardware oriented security and trust (HOST), pp 66–73
21.
Zurück zum Zitat Tehranipoor M, Wang C (2010) Introduction to hardware security and trust. Springer Tehranipoor M, Wang C (2010) Introduction to hardware security and trust. Springer
22.
Zurück zum Zitat Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Design and Test of Computers:10–25 Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Design and Test of Computers:10–25
23.
Zurück zum Zitat Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST), pp 15–19 Wang X, Tehranipoor M, Plusquellic J (2008) Detecting malicious inclusions in secure hardware: challenges and solutions. In: Proc. IEEE workshop on hardware-oriented security and trust (HOST), pp 15–19
24.
Zurück zum Zitat Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems, pp 87–95 Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware Trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE int. symposium on defect and fault tolerance of VLSI systems, pp 87–95
25.
Zurück zum Zitat Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proc. DATE, pp 1362–1365 Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008) Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proc. DATE, pp 1362–1365
26.
Zurück zum Zitat Zhang X, Ferraiuoloand A, Tehranipoor M (2012) Detection of hardware Trojans using a combined ring oscillator network and off-chip transient power analysis. ACM J Emerg Technol Comput Syst (JETC) Zhang X, Ferraiuoloand A, Tehranipoor M (2012) Detection of hardware Trojans using a combined ring oscillator network and off-chip transient power analysis. ACM J Emerg Technol Comput Syst (JETC)
27.
Zurück zum Zitat Zhang X, Tehranipoor M (2011) Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE), pp 1–6 Zhang X, Tehranipoor M (2011) Ron: an on-chip ring oscillator network for hardware Trojan detection. In: Proc. design, automation test in Europe conference exhibition (DATE), pp 1–6
Metadaten
Titel
Detecting Hardware Trojans using On-chip Sensors in an ASIC Design
verfasst von
Shane Kelly
Xuehui Zhang
Mohammed Tehranipoor
Andrew Ferraiuolo
Publikationsdatum
01.02.2015
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 1/2015
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-015-5504-x

Weitere Artikel der Ausgabe 1/2015

Journal of Electronic Testing 1/2015 Zur Ausgabe

EditorialNotes

Editorial

Neuer Inhalt