Skip to main content

2020 | OriginalPaper | Buchkapitel

5. Methods of Detecting Hardware Trojans in Microcircuits

verfasst von : Anatoly Belous, Vitali Saladukha

Erschienen in: Viruses, Hardware and Software Trojans

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In previous section, we performed a detailed examination of classification of Trojans in microcircuits, their design principles, functioning mechanisms, and masking methods. This chapter is dedicated to identification of the most effective means to identify hardware Trojans in microcircuits.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat C. Krieg, E. Weippl, Malware in Hardware Infrastructure Components. SBA Research, Favoritenstrasse 16, 1040, Vienna {ckrieg, eweippl}@sba- research.org C. Krieg, E. Weippl, Malware in Hardware Infrastructure Components. SBA Research, Favoritenstrasse 16, 1040, Vienna {ckrieg, eweippl}@sba- research.org
5.
Zurück zum Zitat M.S. Anderson, C.J.G. North, K.K. Yiu, Towards Countering the Rise of the Silicon Trojan. Technical Report 12 (2008). 20PR.pdf M.S. Anderson, C.J.G. North, K.K. Yiu, Towards Countering the Rise of the Silicon Trojan. Technical Report 12 (2008). 20PR.​pdf
12.
Zurück zum Zitat M. Banga, M. Chandrasekar, L. Fang, M.S. Hsiao, Guided test generation for isolation and detection of embedded Trojans in ICs, in GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI. New York, NY, USA (ACM, 2008), pp. 363–366. ISBN 978-1-59593-999-9. http://doi.acm.org/10.1145/1366110.1366196 M. Banga, M. Chandrasekar, L. Fang, M.S. Hsiao, Guided test generation for isolation and detection of embedded Trojans in ICs, in GLSVLSI ’08: Proceedings of the 18th ACM Great Lakes Symposium on VLSI. New York, NY, USA (ACM, 2008), pp. 363–366. ISBN 978-1-59593-999-9. http://​doi.​acm.​org/​10.​1145/​1366110.​1366196
15.
Zurück zum Zitat R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 396–410, https://doi.org/10.1007/978-3-642-04138-9_28 R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 396–410, https://​doi.​org/​10.​1007/​978-3-642-04138-9_​28
21.
Zurück zum Zitat D. Du, S. Narasimhan, R. Chakraborty, S. Bhunia, Self-referencing: a scalable side-channel approach for hardware Trojan detection, in Cryptographic Hardware and Embedded Systems, CHES 2010, ed. by S. Mangard, F.-X. Standaert. Volume 6225 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 173–187, http://dx.doi.org/10.1007/978-3-642-15031-9_12 D. Du, S. Narasimhan, R. Chakraborty, S. Bhunia, Self-referencing: a scalable side-channel approach for hardware Trojan detection, in Cryptographic Hardware and Embedded Systems, CHES 2010, ed. by S. Mangard, F.-X. Standaert. Volume 6225 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 173–187, http://​dx.​doi.​org/​10.​1007/​978-3-642-15031-9_​12
22.
Zurück zum Zitat M. Hicks, M. Finnicum, S.T. King, M.M.K. Martin, J.M. Smith, Overcoming an untrusted computing base: detecting and removing malicious hardware automatically, in 2010 IEEE Symposium on Security and Privacy (SP) (2010), pp. 159–172, https://doi.org/10.1109/sp.2010.18 M. Hicks, M. Finnicum, S.T. King, M.M.K. Martin, J.M. Smith, Overcoming an untrusted computing base: detecting and removing malicious hardware automatically, in 2010 IEEE Symposium on Security and Privacy (SP) (2010), pp. 159–172, https://​doi.​org/​10.​1109/​sp.​2010.​18
30.
Zurück zum Zitat F. Koushanfar, A. Mirhoseini, Y.A. Alkabani, A unifted submodular framework for multimodal IC Trojan detection, in Information Hiding, ed. by R. Boohme, P. Fong, R. Safavi-Naini. Volume 6387 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 17–32, http://dx.doi.org/10.1007/978-3-642-16435-42 F. Koushanfar, A. Mirhoseini, Y.A. Alkabani, A unifted submodular framework for multimodal IC Trojan detection, in Information Hiding, ed. by R. Boohme, P. Fong, R. Safavi-Naini. Volume 6387 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2010), pp. 17–32, http://​dx.​doi.​org/​10.​1007/​978-3-642-16435-42
31.
Zurück zum Zitat C. Lamech, R. Rad, M. Tehrani, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. Trans. Inf. Forensics Secur. (99) (2011), https://doi.org/10.1109/tifs.2011.2136339. Early Access C. Lamech, R. Rad, M. Tehrani, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. Trans. Inf. Forensics Secur. (99) (2011), https://​doi.​org/​10.​1109/​tifs.​2011.​2136339. Early Access
34.
Zurück zum Zitat L. Lin, M. Kasper, T.G. Neysu, C. Paar, W Burleson, Trojan side-channels: lightweight hardware trojans through side-channel engineering, in Cryptographic Hardware and Embedded System—CHES 2009, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 382–395, http://dx.doi.org/10.1007/978-3-642-04138-9_27 L. Lin, M. Kasper, T.G. Neysu, C. Paar, W Burleson, Trojan side-channels: lightweight hardware trojans through side-channel engineering, in Cryptographic Hardware and Embedded System—CHES 2009, ed. by C. Clavier, K. Gaj. Volume 5747 of Lecture Notes in Computer Science (Springer, Berlin/Heidelberg, 2009), pp. 382–395, http://​dx.​doi.​org/​10.​1007/​978-3-642-04138-9_​27
36.
Zurück zum Zitat S. Narasimhan, D. Du, R.S. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia, Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach, in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2010), pp. 13–18, https://doi.org/10.1109/hst.2010.5513122 S. Narasimhan, D. Du, R.S. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia, Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach, in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (2010), pp. 13–18, https://​doi.​org/​10.​1109/​hst.​2010.​5513122
37.
38.
Zurück zum Zitat M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey, Hardware Trojan horse detection using gate-level characterization, in DAC ’09: Proceedings of the 46th Annual Design Automation Conference, New York, NY, USA, 2009 (ACM, 2009), pp. 688–693. ISBN 978-160558-497-3. http://doi.acm.org/10.1145/1629911.1630091 M. Potkonjak, A. Nahapetian, M. Nelson, T. Massey, Hardware Trojan horse detection using gate-level characterization, in DAC ’09: Proceedings of the 46th Annual Design Automation Conference, New York, NY, USA, 2009 (ACM, 2009), pp. 688–693. ISBN 978-160558-497-3. http://​doi.​acm.​org/​10.​1145/​1629911.​1630091
40.
Zurück zum Zitat R. Rad, J. Plusquellic, M. Tehranipoor, A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(12), 1735–1744 (2010). ISSN 1063-8210. https://doi.org/10.1109/tvlsi.2009.2029117 R. Rad, J. Plusquellic, M. Tehranipoor, A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 18(12), 1735–1744 (2010). ISSN 1063-8210. https://​doi.​org/​10.​1109/​tvlsi.​2009.​2029117
41.
Zurück zum Zitat R.M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic, Power supply signal calibration techniques for improving detection resolution to hardware Trojans, IEEE/ACM International Conference on Computer-Aided Design, 2008. ICCAD 2008 (2008), pp. 632–639, https://doi.org/10.1109/iccad.2008.4681643 R.M. Rad, X. Wang, M. Tehranipoor, J. Plusquellic, Power supply signal calibration techniques for improving detection resolution to hardware Trojans, IEEE/ACM International Conference on Computer-Aided Design, 2008. ICCAD 2008 (2008), pp. 632–639, https://​doi.​org/​10.​1109/​iccad.​2008.​4681643
43.
Zurück zum Zitat H. Salmani, M. Tehranipoor, J. Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time, in IEEE International Workshop on Hardware-Oriented Security and Trust, 2009. HOST ’09 (2009), pp. 66–73, https://doi.org/10.1109/hst.2009.5224968 H. Salmani, M. Tehranipoor, J. Plusquellic, New design strategy for improving hardware Trojan detection and reducing Trojan activation time, in IEEE International Workshop on Hardware-Oriented Security and Trust, 2009. HOST ’09 (2009), pp. 66–73, https://​doi.​org/​10.​1109/​hst.​2009.​5224968
44.
Zurück zum Zitat H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, in Proceedings of IEEE Int Information Forensics and Security (WIFS) Workshop (2010), pp. 1–6, https://doi.org/10.1109/wifs.20https://doi.org/10.5711438 H. Salmani, M. Tehranipoor, J. Plusquellic, A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits, in Proceedings of IEEE Int Information Forensics and Security (WIFS) Workshop (2010), pp. 1–6, https://​doi.​org/​10.​1109/​wifs.​20https://doi.org/10.5711438
45.
Zurück zum Zitat H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing trojan activation time. (99) (2011), https://doi.org/10.1109/tvlsi.20https://doi.org/10.2093547. Early Access H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing trojan activation time. (99) (2011), https://​doi.​org/​10.​1109/​tvlsi.​20https://doi.org/10.2093547. Early Access
48.
Zurück zum Zitat X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan detection and isolation using current integration and localized current analysis, in IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08 (2008), pp. 87–95, https://doi.org/10.1109/dft.2008.61 X. Wang, H. Salmani, M. Tehranipoor, J. Plusquellic, Hardware Trojan detection and isolation using current integration and localized current analysis, in IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems, 2008. DFTVS ’08 (2008), pp. 87–95, https://​doi.​org/​10.​1109/​dft.​2008.​61
54.
Zurück zum Zitat R. Torrance, D. James, The state-of-the-art in semiconductor reverse engineering, in Design Automation Conference—DAC 2011, ed. by L. Stok, N.D. Dutt, S. Hassoun (ACM, 2011), pp. 333–338 R. Torrance, D. James, The state-of-the-art in semiconductor reverse engineering, in Design Automation Conference—DAC 2011, ed. by L. Stok, N.D. Dutt, S. Hassoun (ACM, 2011), pp. 333–338
55.
Zurück zum Zitat C. Bao, D. Forte, A. Srivastava, On application of one-class SVM to reverse engineering-based hardware trojan detection, in International Symposium on Quality Electronic Design—ISQED 2014 (IEEE, 2014), pp. 47–54 C. Bao, D. Forte, A. Srivastava, On application of one-class SVM to reverse engineering-based hardware trojan detection, in International Symposium on Quality Electronic Design—ISQED 2014 (IEEE, 2014), pp. 47–54
56.
Zurück zum Zitat R.S. Chakraborty, F.G. Wolff, S. Paul, C.A. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2009, ed. by C. Clavier, K. Gaj, ser. LNCS, vol. 5747 (Springer, 2009), pp. 396–410 R.S. Chakraborty, F.G. Wolff, S. Paul, C.A. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2009, ed. by C. Clavier, K. Gaj, ser. LNCS, vol. 5747 (Springer, 2009), pp. 396–410
57.
Zurück zum Zitat D. Du, S. Narasimhan, R.S. Chakraborty, S. Bhunia, Selfreferencing: a scalable side-channel approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2010, ed. by S. Mangard, F. Standaert, ser. LNCS, vol. 6225 (Springer, 2010), pp. 173–187 D. Du, S. Narasimhan, R.S. Chakraborty, S. Bhunia, Selfreferencing: a scalable side-channel approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems—CHES 2010, ed. by S. Mangard, F. Standaert, ser. LNCS, vol. 6225 (Springer, 2010), pp. 173–187
Metadaten
Titel
Methods of Detecting Hardware Trojans in Microcircuits
verfasst von
Anatoly Belous
Vitali Saladukha
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-47218-4_5

Neuer Inhalt