Skip to main content
Erschienen in: Journal of Electronic Testing 1/2020

07.02.2020

Trojan Detection Test for Clockless Circuits

verfasst von: Ricardo Aquino Guazzelli, Matheus Garay Trindade, Leonel Acunha Guimarães, Thiago Ferreira de Paiva Leite, Laurent Fesquet, Rodrigo Possamai Bastos

Erschienen in: Journal of Electronic Testing | Ausgabe 1/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Clockless integrated circuits, as any type of integrated system, might today carry hardware Trojan (HT) circuits maliciously implanted in the designs during outsourced phases of fabrication. This paper proposes a testing technique dedicated to detect HTs in clockless circuits fabricated in CMOS technologies. The proposed technique applies a well-known machine learning approach – One-Class Support Vector Machine (OC-SVM) – for dealing with the particular current signature features of clockless circuits. Through simulation experiments we show the natural ability of clockless circuits in providing individual current signatures for identifying the presence of HTs. Moreover, the results demonstrate that our testing technique requires no extra circuitry or power ports to detect HTs of a few dozens of transistors in designs under Trojan test with more than 13 thousand transistors.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. In: IEEE design test of computers, vol 27, pp 10–25 Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. In: IEEE design test of computers, vol 27, pp 10–25
2.
Zurück zum Zitat He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration VLSI Systems 25(10):2939–2948CrossRef He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration VLSI Systems 25(10):2939–2948CrossRef
3.
Zurück zum Zitat Hoque T, Narasimhan S, Wang X, Mal-Sarkar S, Bhunia S (2017) Golden-free hardware trojan detection with high sensitivity under process noise. J Electron Test 33(1):107–124CrossRef Hoque T, Narasimhan S, Wang X, Mal-Sarkar S, Bhunia S (2017) Golden-free hardware trojan detection with high sensitivity under process noise. J Electron Test 33(1):107–124CrossRef
4.
Zurück zum Zitat Liu Y, Huang K, Makris Y (2014) Hardware trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proc. 51st design automation conference (DAC), pp 1–6 Liu Y, Huang K, Makris Y (2014) Hardware trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proc. 51st design automation conference (DAC), pp 1–6
5.
Zurück zum Zitat Stellari F, Song P, Weger AJ, Culp J, Herbert A, Pfeiffer D (2014) Verification of untrusted chips using trusted layout and emission measurements. In: Proc. IEEE international symposium on hardware-oriented security and trust (HOST), pp 19–24 Stellari F, Song P, Weger AJ, Culp J, Herbert A, Pfeiffer D (2014) Verification of untrusted chips using trusted layout and emission measurements. In: Proc. IEEE international symposium on hardware-oriented security and trust (HOST), pp 19–24
6.
Zurück zum Zitat Jap D, He W, Bhasin S (2016) Supervised and unsupervised machine learning for side-channel based trojan detection. In: Proc. international conference on application-specific systems, architectures and processors (ASAP), pp 17–24 Jap D, He W, Bhasin S (2016) Supervised and unsupervised machine learning for side-channel based trojan detection. In: Proc. international conference on application-specific systems, architectures and processors (ASAP), pp 17–24
7.
Zurück zum Zitat Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware trojans using power supply transient signals. In: Proc. IEEE international workshop on hardware-oriented security and trust (HOST), pp 3–7 Rad R, Plusquellic J, Tehranipoor M (2008) Sensitivity analysis to hardware trojans using power supply transient signals. In: Proc. IEEE international workshop on hardware-oriented security and trust (HOST), pp 3–7
8.
Zurück zum Zitat Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. Transactions on Very Large Scale Integration VLSI Systems 25(4):1506–1519CrossRef Liu Y, Jin Y, Nosratinia A, Makris Y (2017) Silicon demonstration of hardware trojan design and detection in wireless cryptographic ICs. Transactions on Very Large Scale Integration VLSI Systems 25(4):1506–1519CrossRef
9.
Zurück zum Zitat Shanyour B, Tragoudas S (2018) Detection of low power trojans in standard cell designs using built-in current sensors. In: Proc. IEEE international test conference (ITC), pp 1–10 Shanyour B, Tragoudas S (2018) Detection of low power trojans in standard cell designs using built-in current sensors. In: Proc. IEEE international test conference (ITC), pp 1–10
10.
Zurück zum Zitat Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Transactions on Information Forensics and Security 5(4):893–904CrossRef Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Transactions on Information Forensics and Security 5(4):893–904CrossRef
11.
Zurück zum Zitat Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE international symposium on defect and fault tolerance of (VLSI) systems, pp 87–95 Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008) Hardware trojan detection and isolation using current integration and localized current analysis. In: Proc. IEEE international symposium on defect and fault tolerance of (VLSI) systems, pp 87–95
12.
Zurück zum Zitat Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. Transactions on Computer-Aided Design of Integrated Circuits and Systems 35(1):37–48CrossRef Zheng Y, Yang S, Bhunia S (2016) SeMIA: self-similarity-based IC integrity analysis. Transactions on Computer-Aided Design of Integrated Circuits and Systems 35(1):37–48CrossRef
13.
Zurück zum Zitat Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(10):1577–1585CrossRef Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(10):1577–1585CrossRef
14.
Zurück zum Zitat Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310 Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: Proc. IEEE symposium on security and privacy, pp 296–310
15.
Zurück zum Zitat Hoque T, Mustapa M, Amsaad F, Niamat M (2015) Assessment of NAND based ring oscillator for hardware Trojan detection. In: Proc. IEEE 58th international midwest symposium on circuits and systems MWSCAS, pp 1–4 Hoque T, Mustapa M, Amsaad F, Niamat M (2015) Assessment of NAND based ring oscillator for hardware Trojan detection. In: Proc. IEEE 58th international midwest symposium on circuits and systems MWSCAS, pp 1–4
16.
Zurück zum Zitat Cha B, Gupta SK (2013) Trojan detection via delay measurements: a new approach to select paths and cectors to maximize effectiveness and minimize cost. In: Proc. design, automation test in Europe conference (DATE), pp 1265–1270 Cha B, Gupta SK (2013) Trojan detection via delay measurements: a new approach to select paths and cectors to maximize effectiveness and minimize cost. In: Proc. design, automation test in Europe conference (DATE), pp 1265–1270
17.
Zurück zum Zitat Lodhi FK, Hasan SR, Hasan O, Awwad F (2014) Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. In: Proc. 57th international midwest symposium on circuits and systems (MWSCAS), pp 659–662 Lodhi FK, Hasan SR, Hasan O, Awwad F (2014) Hardware trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline. In: Proc. 57th international midwest symposium on circuits and systems (MWSCAS), pp 659–662
18.
Zurück zum Zitat Lodhi FK, Hasan SR, Hasan O, Awwad F (2015) Formal analysis of macro synchronous micro asychronous pipeline for hardware trojan detection. In: Proc. Nordic circuits and systems conference (NORCAS): NORCHIP international symposium on system-on-chip (SoC), pp 1–4 Lodhi FK, Hasan SR, Hasan O, Awwad F (2015) Formal analysis of macro synchronous micro asychronous pipeline for hardware trojan detection. In: Proc. Nordic circuits and systems conference (NORCAS): NORCHIP international symposium on system-on-chip (SoC), pp 1–4
19.
Zurück zum Zitat Guimarães LA, de Paiva Leite TF, Bastos RP, Fesquet L (2018) Non-intrusive testing technique for detection of trojans in asynchronous circuits. In: Proc. design, automation test in Europe conference (DATE), pp 1516–1519 Guimarães LA, de Paiva Leite TF, Bastos RP, Fesquet L (2018) Non-intrusive testing technique for detection of trojans in asynchronous circuits. In: Proc. design, automation test in Europe conference (DATE), pp 1516–1519
20.
Zurück zum Zitat Guimarães LA, Bastos RP, Fesquet L (2017) Detection of layout-level trojans by monitoring substrate with preexisting built-in sensors. In: Proc. IEEE computer society annual symposium on VLSI (ISVLSI), pp 290–295 Guimarães LA, Bastos RP, Fesquet L (2017) Detection of layout-level trojans by monitoring substrate with preexisting built-in sensors. In: Proc. IEEE computer society annual symposium on VLSI (ISVLSI), pp 290–295
21.
Zurück zum Zitat Bouesse GF, Renaudin M, Dumont S, Germain F (2005) DPA On quasi-delay insensitive asynchronous circuits: formalization and improvement. In: Proc. design, automation and test in Europe (DATE), pp 424–429 Bouesse GF, Renaudin M, Dumont S, Germain F (2005) DPA On quasi-delay insensitive asynchronous circuits: formalization and improvement. In: Proc. design, automation and test in Europe (DATE), pp 424–429
22.
Zurück zum Zitat Lim J, Ho WG, Chong KS, Gwee BH (2017) DPA-resistant QDI dual-rail AES S-box based on power-balanced weak-conditioned half-buffer. In: Proc. IEEE international symposium on circuits and systems (ISCAS), pp 1–4 Lim J, Ho WG, Chong KS, Gwee BH (2017) DPA-resistant QDI dual-rail AES S-box based on power-balanced weak-conditioned half-buffer. In: Proc. IEEE international symposium on circuits and systems (ISCAS), pp 1–4
23.
Zurück zum Zitat Bouesse GF, Renaudin M, Witon A, Germain F (2005) A clock-less low-voltage AES crypto-processor. In: Proc. European solid-state circuits conference (ESSCIRC), pp 403–406 Bouesse GF, Renaudin M, Witon A, Germain F (2005) A clock-less low-voltage AES crypto-processor. In: Proc. European solid-state circuits conference (ESSCIRC), pp 403–406
24.
Zurück zum Zitat Monnet Y, Renaudin M, Leveugle R (2005) Hardening techniques against transient faults for asynchronous circuits. In: Proc. 11th IEEE international on-line testing symposium, pp 129–134 Monnet Y, Renaudin M, Leveugle R (2005) Hardening techniques against transient faults for asynchronous circuits. In: Proc. 11th IEEE international on-line testing symposium, pp 129–134
25.
Zurück zum Zitat Sutherland IE, Ebergen J (2002) Computer without clocks. Scientific American Sutherland IE, Ebergen J (2002) Computer without clocks. Scientific American
26.
Zurück zum Zitat Martin AJ, Nystrom M (2006) Asynchronous techniques for system-on-chip design. Proc IEEE 94 (6):1089–1120CrossRef Martin AJ, Nystrom M (2006) Asynchronous techniques for system-on-chip design. Proc IEEE 94 (6):1089–1120CrossRef
27.
Zurück zum Zitat Narasimhan S, Du D, Chakraborty R, Paul S, Wolff F, Papachristou C, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. In: IEEE transactions on computers, vol 62, pp 2183–2195 Narasimhan S, Du D, Chakraborty R, Paul S, Wolff F, Papachristou C, Roy K, Bhunia S (2013) Hardware trojan detection by multiple-parameter side-channel analysis. In: IEEE transactions on computers, vol 62, pp 2183–2195
28.
Zurück zum Zitat Xiao K, Zhang X, Tehranipoor M (2013) A clock sweeping technique for detecting hardware trojans impacting circuits delay. IEEE Design Test 30(2):26–34CrossRef Xiao K, Zhang X, Tehranipoor M (2013) A clock sweeping technique for detecting hardware trojans impacting circuits delay. IEEE Design Test 30(2):26–34CrossRef
29.
Zurück zum Zitat Guimarães LA, Bastos RP, de Paiva Leite TF, Fesquet L (2016) Simple tri-state logic trojans able to upset properties of ring oscillators. In: Proc. international conference on design and technology of integrated systems in nanoscale era (DTIS), pp 1–6 Guimarães LA, Bastos RP, de Paiva Leite TF, Fesquet L (2016) Simple tri-state logic trojans able to upset properties of ring oscillators. In: Proc. international conference on design and technology of integrated systems in nanoscale era (DTIS), pp 1–6
30.
Zurück zum Zitat Subasi A, Gursoy MI (2010) EEG Signal classification using PCA, ICA, LDA and support vector machines. In: Expert systems with applications, vol 37, pp 8659–8666 Subasi A, Gursoy MI (2010) EEG Signal classification using PCA, ICA, LDA and support vector machines. In: Expert systems with applications, vol 37, pp 8659–8666
Metadaten
Titel
Trojan Detection Test for Clockless Circuits
verfasst von
Ricardo Aquino Guazzelli
Matheus Garay Trindade
Leonel Acunha Guimarães
Thiago Ferreira de Paiva Leite
Laurent Fesquet
Rodrigo Possamai Bastos
Publikationsdatum
07.02.2020
Verlag
Springer US
Erschienen in
Journal of Electronic Testing / Ausgabe 1/2020
Print ISSN: 0923-8174
Elektronische ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-020-05857-6

Weitere Artikel der Ausgabe 1/2020

Journal of Electronic Testing 1/2020 Zur Ausgabe

Neuer Inhalt