Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach
- 1 June 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Malicious alterations of integrated circuits during fabrication in untrusted foundries pose major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover such alterations, also referred to as “hardware Trojans” using conventional structural or functional testing strategies. In this paper, we propose a novel non-invasive, multiple-parameter side-channel analysis based Trojan detection approach that is capable of detecting malicious hardware modifications in the presence of large process variation induced noise. We exploit the intrinsic relationship between dynamic current (I DDT ) and maximum operating frequency (F max ) of a circuit to distinguish the effect of a Trojan from process induced fluctuations in I DDT . We propose a vector generation approach for I DDT measurement that can improve the Trojan detection sensitivity for arbitrary Trojan instances. Simulation results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit Advanced Encryption System (AES) cipher, show a detection resolution of 0.04% can be achieved in presence of ±20% parameter (V th ) variations. The approach is also validated with experimental results using 120nm FPGA (Xilinx Virtex-II) chips.Keywords
This publication has 7 references indexed in Scilit:
- A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental ConditionsIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2009
- Performance of delay-based Trojan detection techniques under parameter variationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- A region based approach for the identification of hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Towards trojan-free trusted ICsPublished by Association for Computing Machinery (ACM) ,2008
- Trojan Detection using IC FingerprintingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Multiple-parameter CMOS IC testing with increased sensitivity for I/sub DDQ/IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2003
- Alpha-power law MOSFET model and its applications to CMOS inverter delay and other formulasIEEE Journal of Solid-State Circuits, 1990