Skip to main content
Erschienen in: Journal of Electronic Testing 5/2020

14.10.2020

Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation

verfasst von: Ting Su, Shaoqing Li, Yongkang Tang, Jihua Chen

Erschienen in: Journal of Electronic Testing | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Hardware Trojan (HT) is increasingly becoming a major threat in the filed of hardware security. Recently, researchers are taking a high value on the side-channel countermeasures. Meanwhile, the electromagnetic radiation (EMR) based method is one of the most promising schemes to ensure whether integrated circuit (IC) is HT-infected or not. In this paper, we focus on the ability evaluation for existing EMR based methods to implement the HT detection. We propose the noise model based on analyses of noise sources during HT detection using EMR. Then, we study the effect caused by several types of noises in this model. According to these analyses, we discuss the limitation for EMR based methods in two special scenarios, and propose an evaluation scheme to evaluate the detection capability for using EMR analysis to identify HTs. Finally, we exemplify our scheme with some experiments. Experimental results on FPGA show the effectiveness of EMR based methods as well as their limitations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy, proceedings, IEEE Comp Soc TCSP, IEEE symposium on security and privacy, IEEE symposium on security and privacy (S&P 2007), Berkeley, CA, May 20-23, 2007, p 296+, https://doi.org/10.1109/SP.2007.36 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy, proceedings, IEEE Comp Soc TCSP, IEEE symposium on security and privacy, IEEE symposium on security and privacy (S&P 2007), Berkeley, CA, May 20-23, 2007, p 296+, https://​doi.​org/​10.​1109/​SP.​2007.​36
2.
Zurück zum Zitat Balasch J, Gierlichs B, Verbauwhede I (2015) Electromagnetic circuit fingerprints for hardware trojan detection. In: 2015 IEEE international symposium on electromagnetic compatibility (EMC), IEEE; EMC Soc; EMC europe; VDE; wurth elektronik; rohde & schwarz; huawei; EMCos; altair; AMETEK; ETS LINDGREN; albatross projects; nolato; airbus; thales; ANDRO; thyssenkrupp; AR, IEEE international symposium on electromagnetic compatibility,Joint IEEE international symposium on electromagnetic compatibility (EMC) And Emc Europe, Dresden, Germany, Aug 16-22, 2015, pp 246–251 Balasch J, Gierlichs B, Verbauwhede I (2015) Electromagnetic circuit fingerprints for hardware trojan detection. In: 2015 IEEE international symposium on electromagnetic compatibility (EMC), IEEE; EMC Soc; EMC europe; VDE; wurth elektronik; rohde & schwarz; huawei; EMCos; altair; AMETEK; ETS LINDGREN; albatross projects; nolato; airbus; thales; ANDRO; thyssenkrupp; AR, IEEE international symposium on electromagnetic compatibility,Joint IEEE international symposium on electromagnetic compatibility (EMC) And Emc Europe, Dresden, Germany, Aug 16-22, 2015, pp 246–251
3.
Zurück zum Zitat Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust, IEEE, IEEE international workshop on hardware-oriented security and trust, Anaheim, CA, Jun 09, 2008, pp 40–47, https://doi.org/10.1109/HST.2008.4559047 Banga M, Hsiao MS (2008) A region based approach for the identification of hardware Trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust, IEEE, IEEE international workshop on hardware-oriented security and trust, Anaheim, CA, Jun 09, 2008, pp 40–47, https://​doi.​org/​10.​1109/​HST.​2008.​4559047
4.
Zurück zum Zitat Beenakker C, Büttiker M (1992) Suppression of shot noise in metallic diffusive conductors. Phys Rev B 46(3):1889CrossRef Beenakker C, Büttiker M (1992) Suppression of shot noise in metallic diffusive conductors. Phys Rev B 46(3):1889CrossRef
5.
Zurück zum Zitat Bossuet L, Fischer V, Bayon P (2015) Contactless transmission of intellectual property data to protect fpga designs. In: 2015 IFIP/IEEE international conference on very large scale integration (VLSI-SOC), Int Federat Informat Proc TC 10 Working Grp 10 5; Inst Elect & Elect Engineers; Korea Adv Inst Sci & Technol; Seoul Natl Univ, Embedded Syst Res Ctr; IEEE Council Elect Design Automat; IEEE Circuits & Syst Soc; Korean Inst Informat Scientists & Engineers; ACM Special Interest Grp Design Automat, 23rd IFIP WG 10.5/IEEE international conference on very large scale integration (VLSI-SoC), Daejeon, South Korea, Oct 05-07, 2015, pp 19–24 Bossuet L, Fischer V, Bayon P (2015) Contactless transmission of intellectual property data to protect fpga designs. In: 2015 IFIP/IEEE international conference on very large scale integration (VLSI-SOC), Int Federat Informat Proc TC 10 Working Grp 10 5; Inst Elect & Elect Engineers; Korea Adv Inst Sci & Technol; Seoul Natl Univ, Embedded Syst Res Ctr; IEEE Council Elect Design Automat; IEEE Circuits & Syst Soc; Korean Inst Informat Scientists & Engineers; ACM Special Interest Grp Design Automat, 23rd IFIP WG 10.5/IEEE international conference on very large scale integration (VLSI-SoC), Daejeon, South Korea, Oct 05-07, 2015, pp 19–24
7.
Zurück zum Zitat Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) MERO: A statistical approach for hardware trojan detection. In: Clavier C, Gaj K (eds) Cryptographic hardware and embedded systems - CHES 2009, proceedings, int assoc cryptol res, lecture notes in computer science. 11th international workshop on cryptographic hardware and embedded systems, Lausanne, Switzerland, Sep 06-09, 2009, vol 5747, pp 396–410 Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009) MERO: A statistical approach for hardware trojan detection. In: Clavier C, Gaj K (eds) Cryptographic hardware and embedded systems - CHES 2009, proceedings, int assoc cryptol res, lecture notes in computer science. 11th international workshop on cryptographic hardware and embedded systems, Lausanne, Switzerland, Sep 06-09, 2009, vol 5747, pp 396–410
9.
Zurück zum Zitat Daubechies I (1992) Ten lectures on wavelets. SIAM Daubechies I (1992) Ten lectures on wavelets. SIAM
10.
11.
Zurück zum Zitat Gray RM, Neuhoff DL (1998) Quantization. IEEE Trans Inform Theor 44(6):2325–2383CrossRef Gray RM, Neuhoff DL (1998) Quantization. IEEE Trans Inform Theor 44(6):2325–2383CrossRef
14.
Zurück zum Zitat Hou B, He C, Wang L, En Y, Xie S (2014) Hardware trojan detection via current measurement: a method immune to process variation effects. In: En YF, Ji CY (eds) Proceedings of 2014 10th international conference on reliability, maintainability and safety (ICRMS), VOLS I AND II, China Inst Elect (CIE); IEEE; CSAS; CMES; CICS; COS; CSA; CSAA, international conference on reliability maintainability and safety, 10th international conference on reliability maintainability and safety, chinese institute of electronics, Guangzhou, Peoples R China, Aug 06-08, 2014, pp 1039–1042 Hou B, He C, Wang L, En Y, Xie S (2014) Hardware trojan detection via current measurement: a method immune to process variation effects. In: En YF, Ji CY (eds) Proceedings of 2014 10th international conference on reliability, maintainability and safety (ICRMS), VOLS I AND II, China Inst Elect (CIE); IEEE; CSAS; CMES; CICS; COS; CSA; CSAA, international conference on reliability maintainability and safety, 10th international conference on reliability maintainability and safety, chinese institute of electronics, Guangzhou, Peoples R China, Aug 06-08, 2014, pp 1039–1042
15.
Zurück zum Zitat Jarque CM, Bera AK (1987) A test for normality of observations and regression residuals. International Statistical Review/Revue Internationale de Statistique pp 163–172 Jarque CM, Bera AK (1987) A test for normality of observations and regression residuals. International Statistical Review/Revue Internationale de Statistique pp 163–172
16.
Zurück zum Zitat Lee EA, Messerschmitt DG (2012) Digital communication. Springer Science & Business Media, New York Lee EA, Messerschmitt DG (2012) Digital communication. Springer Science & Business Media, New York
17.
Zurück zum Zitat Liu C, Cronin P, Yang C (2016) A mutual auditing framework to protect iot against hardware trojans. In: 2016 21st asia and south pacific design automation conference (ASP-DAC), Asia and south pacific design automation conference proceedings, 21st Asia and south pacific design automation conference (ASP-DAC), Macao, Peoples R China, Jan 25-28, 2016, pp 69–74 Liu C, Cronin P, Yang C (2016) A mutual auditing framework to protect iot against hardware trojans. In: 2016 21st asia and south pacific design automation conference (ASP-DAC), Asia and south pacific design automation conference proceedings, 21st Asia and south pacific design automation conference (ASP-DAC), Macao, Peoples R China, Jan 25-28, 2016, pp 69–74
18.
Zurück zum Zitat Lundberg KH (2002) Noise sources in bulk cmos. Unpublished Paper 3:28 Lundberg KH (2002) Noise sources in bulk cmos. Unpublished Paper 3:28
21.
Zurück zum Zitat Ngo XT, Exurville I, Bhasin S, Danger JL, Guilley S, Najm Z, Rigaud JB, Robisson B (2015) Hardware trojan detection by delay and electromagnetic measurements. In: 2015 design, automation & test in europe conference & exhibition (DATE), european design & automation association; elect design automation consortium; IEEE council on elec design automation; european elect chips & Syst design initiative; ACM special interest Grp on design automation; Russian Acad of Sciences; IEEE Comp Soc test technology tech Council (tttC); IEEE solid-state circuits Soc (SSCS); international federation for information processing (IFIP); Ville De Grenoble; LETI; ST; MINALOGIC; Agence DEtudes et de Promotion de lIsere; Rhone Alpes; Grenoble Alpes; CMP; Systematic Paris Region Systems & ICT; Cluster SCC; JEITA; Synopsys; Mentor Graphics; Cadence; Mathworks; Eurotraining, design automation and test in europe conference and exhibition, conference on design automation test in Europe (DATE), alpexpo congress center, Grenoble, France, Mar 09-13, 2015, pp 782–787 Ngo XT, Exurville I, Bhasin S, Danger JL, Guilley S, Najm Z, Rigaud JB, Robisson B (2015) Hardware trojan detection by delay and electromagnetic measurements. In: 2015 design, automation & test in europe conference & exhibition (DATE), european design & automation association; elect design automation consortium; IEEE council on elec design automation; european elect chips & Syst design initiative; ACM special interest Grp on design automation; Russian Acad of Sciences; IEEE Comp Soc test technology tech Council (tttC); IEEE solid-state circuits Soc (SSCS); international federation for information processing (IFIP); Ville De Grenoble; LETI; ST; MINALOGIC; Agence DEtudes et de Promotion de lIsere; Rhone Alpes; Grenoble Alpes; CMP; Systematic Paris Region Systems & ICT; Cluster SCC; JEITA; Synopsys; Mentor Graphics; Cadence; Mathworks; Eurotraining, design automation and test in europe conference and exhibition, conference on design automation test in Europe (DATE), alpexpo congress center, Grenoble, France, Mar 09-13, 2015, pp 782–787
23.
Zurück zum Zitat Proakis JG (2001) Digital signal processing: principles algorithms and applications. Pearson Education India, India Proakis JG (2001) Digital signal processing: principles algorithms and applications. Pearson Education India, India
24.
Zurück zum Zitat Qiu H, Luo C, Fang W, Jiang L (2018) Noncontact time-domain emi measurement of two adjacent traces on a pcb. In: 2018 IEEE symposium on electromagnetic compatibility, signal integrity and power integrity (EMC, SI & PI), IEEE; EMC Soc; ROHDE & SCHWARZ; Altair; AH Syst Inc; ANDRO; Bruce Archambeault; EMC Shop; ITG Magnet & EMI Filter; SPIRA; TDK, IEEE symposium on electromagnetic compatibility, signal integrity and power integrity (EMC, SI & PI), Long Beach, CA, Jul 30-Aug 03, 2018, pp 634–639 Qiu H, Luo C, Fang W, Jiang L (2018) Noncontact time-domain emi measurement of two adjacent traces on a pcb. In: 2018 IEEE symposium on electromagnetic compatibility, signal integrity and power integrity (EMC, SI & PI), IEEE; EMC Soc; ROHDE & SCHWARZ; Altair; AH Syst Inc; ANDRO; Bruce Archambeault; EMC Shop; ITG Magnet & EMI Filter; SPIRA; TDK, IEEE symposium on electromagnetic compatibility, signal integrity and power integrity (EMC, SI & PI), Long Beach, CA, Jul 30-Aug 03, 2018, pp 634–639
25.
Zurück zum Zitat Rai D, Lach J (2009) Performance of Delay-Based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust, IEEE, IEEE international workshop on hardware-oriented security and trust, San Francisco, CA, Jul 27, 2009, pp 58–65, https://doi.org/10.1109/HST.2009.5224966 Rai D, Lach J (2009) Performance of Delay-Based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust, IEEE, IEEE international workshop on hardware-oriented security and trust, San Francisco, CA, Jul 27, 2009, pp 58–65, https://​doi.​org/​10.​1109/​HST.​2009.​5224966
27.
Zurück zum Zitat Soell O, Korak T, Muehlberghuber M, Hutter M (2014) EM-based detection of hardware trojans on FPGAs. In: 2014 IEEE international symposium on hardware-oriented security and trust (Host), IEEE; IEEE Test Technol Tech Council; IEEE Comp Soc; IEEE Secur & Privacy Soc, IEEE international symposium on hardware-oriented security and trust (Host), Arlington, VA, May 06-07, 2014, pp 84–87 Soell O, Korak T, Muehlberghuber M, Hutter M (2014) EM-based detection of hardware trojans on FPGAs. In: 2014 IEEE international symposium on hardware-oriented security and trust (Host), IEEE; IEEE Test Technol Tech Council; IEEE Comp Soc; IEEE Secur & Privacy Soc, IEEE international symposium on hardware-oriented security and trust (Host), Arlington, VA, May 06-07, 2014, pp 84–87
31.
32.
Zurück zum Zitat Yang K, Hicks M, Dong Q, Austin T, Sylvester D (2016) A2: analog malicious hardware. In: 2016 IEEE symposium on security and privacy (SP), IEEE; IEEE Comp soc IEEE symposium on security and privacy, pp 18–37, IEEE symposium on security and privacy (SP), San Jose, CA, MAY 23-25, 2016, https://doi.org/10.1109/SP.2016.10 Yang K, Hicks M, Dong Q, Austin T, Sylvester D (2016) A2: analog malicious hardware. In: 2016 IEEE symposium on security and privacy (SP), IEEE; IEEE Comp soc IEEE symposium on security and privacy, pp 18–37, IEEE symposium on security and privacy (SP), San Jose, CA, MAY 23-25, 2016, https://​doi.​org/​10.​1109/​SP.​2016.​10
33.
Zurück zum Zitat Zhang J, Fang L, Li L, Zhang Z (2015) A novel approach to detecting hardware trojan horses. In: 2015 8th international symposium on computational intelligence and design (ISCID), vol 1, IEEE Nanjing Computat Intelligence Chapter; Univ Bristol; Zhejiang Univ; Zhejiang Sci Tech Univ; Zhejiang Univ, Coll Comp Sci; IEEE Comp Soc, International Symposium on Computational Intelligence and Design, 8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, Peoples R China, Dec 12-13, 2015, pp 43–46, https://doi.org/10.1109/ISCID.2015.32 Zhang J, Fang L, Li L, Zhang Z (2015) A novel approach to detecting hardware trojan horses. In: 2015 8th international symposium on computational intelligence and design (ISCID), vol 1, IEEE Nanjing Computat Intelligence Chapter; Univ Bristol; Zhejiang Univ; Zhejiang Sci Tech Univ; Zhejiang Univ, Coll Comp Sci; IEEE Comp Soc, International Symposium on Computational Intelligence and Design, 8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, Peoples R China, Dec 12-13, 2015, pp 43–46, https://​doi.​org/​10.​1109/​ISCID.​2015.​32
Metadaten
Titel
Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation
verfasst von
Ting Su
Shaoqing Li
Yongkang Tang
Jihua Chen
Publikationsdatum
14.10.2020
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 5/2020
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-020-05905-1

Weitere Artikel der Ausgabe 5/2020

Journal of Electronic Testing 5/2020 Zur Ausgabe

EditorialNotes

Editorial

Neuer Inhalt