Abstract:Hardware Trojan is the malicious circuit modification which can disable the Integrated Circuit (IC) or leak confidential information covertly to the adversary, and brings potential safety hazard for ICs. In this paper, a new approach for hardware Trojan detection based on compare the temperature variation characteristics when IC starts working. Ring Oscillator (RO) is used as a detector to obtain the information about IC’s temperature variation characteristics. In order to describe temperature variation characteristics accuracy, a parameter about the D-value of RO’s oscillation cycle counts is presented, and parameters about the quality of the fitting curve are used to estimate the hardware Trojan’s effect on IC’s temperature characteristics. Results from ten chips show that the proposed approach is effective towards increasing successful detection ratio and can achieve better Trojan detection probability 100% on average over conventional patterns for Trojan which is 32 logic elements, and for Trojan which is 16 logic elements can also achieve Trojan detection probability 90%, besides the proposed approach locating the Trojan’s insertion place roughly.
LIU C L. Research of hardware Trojans detection technology based on side channel analysis[D]. [Ph.D. dissertation], Tianjin University, 2013: 1-8.
[2]
YANG K and HICKS M. Analog malicious hardware[C]. IEEE Symposium on Security and Privacy Conference, San Jose, USA, 2016: 18-37. doi: 10.1109/SP.2016.10.
[3]
SUBRAMANYAN P, TSISKARIDZE N, and LI Wenchao. Reverse engineering digital circuits using structural and functional analyses[J]. IEEE Transactions on Emerging Topics in Computing, 2014, 2(1): 63-80. doi: 10.1109/TETC. 2013.2294918.
[4]
BAO Chongxi, FORTE D , and SRIVASTAVE A. On Reverse engineering-based hardware Trojan detection[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(1): 49-57. doi: 10.1109/TCAD. 2015.2488495.
[5]
AGRAWAL D and BAKTIR S. Trojan detection using IC fingerprinting[C]. IEEE Symposium on Security and Privacy Conference, Berkeley, USA, 2007: 296-310. doi: 10.1109/SP. 2007.36.
[6]
JIN Y and MAKRIS Y. Hardware Trojan detection using path delay fingerprint[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 51-57. doi: 10.1109/HST.2008.4559049.
[7]
AARESTAD J, ACHARYYA D, and RAD R. Detecting Trojans through leakage current analysis using multiple supply pad IDDQs[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4): 893-904. doi: 10.1109/ TIFS.2010.2061228.
[8]
NOWROZ A N, HU Kangqiao, and KOUSHANFAR F. Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps[J]. IEEE Transactions on Computer-aided Design of Integrated Circuits and Systems, 2014, 33(12): 1792-1805. doi: 10.1109/TCAD.2014.2354293.
[9]
SOLL O and KORAK T. EM-based detection of hardware Trojans on FPGAs[C]. IEEE International Symposium on Hardware-Oriented Security and Trust Conference, California, USA, 2014: 84-87. doi: 10.1109/HST.2014. 6855574.
[10]
NGO X T, NAJM Z, and BHASIN S. Method taking into account process dispersion to detect hardware Trojan horse by side-channel analysis[J]. Journal of Cryptographic Engineering, 2016, 6(3): 239-247. doi: 10.1007/s13389-016- 0129-2.
WANG Pengjun, ZHANG Yuejun, ZHANG Xuelong, et al. Research of differential power analysis countermeasures[J]. Journal of Electronics & Information Technology, 2012, 34(11): 2774-2784. doi: 10.3724/SP.J.1146.2012.00555.
[12]
SREEDHAR A, KUNDU S, and KOREN I. On reliability Trojan injection and detection[J]. Journal on Low Power Electronics, 2012, 8(5): 674-683. doi: 10.1166/jolpe.2012. 1225.34.
XUE Mingfu, HU Aiqun, and WANG Jian. A novel hardware Trojan detection technique using heuristic partition and test pattern generation[J]. Acta Electronica Sinica, 2016, 44(5): 1132-1138. doi: 10.3969/j.issn.0372-2112.2016.05.017.
[14]
KULKARNI A, PINO Y, and MOHSENIN T. SVM-based real-time hardware Trojan detection for many-core platform[C]. IEEE International Symposium on Quality Electronic Design Conference, California, USA, 2016: 362-367. doi: 10.1109/ISQED.2016.7479228.
[15]
CHAKRABORTY R S and PAUL S. On-demand transparency for improving hardware Trojan detectability[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 48-50. doi: 10.1109/HST.2008.4559048.
[16]
ZHOU Bin, ZHANG Wei, THAMBIPILLAI S, et al. Cost-efficient acceleration of hardware Trojan detection through fan-out cone analysis and weighted random pattern technique[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(5): 792-805. doi: 10.1109/TCAD.2015.2460551.
[17]
LI Jie and LACH J. At-speed delay characterization for IC authentication and Trojan horse detection[C]. IEEE International Workshop on Hardware-Oriented Security and Trust Conference, Anaheim, USA, 2008: 8-14. doi: 10.1109/ HST.2008.4559038.
[18]
JIN Y and KUPP N. DFTT: Design for Trojan test[C]. IEEE International Conference on Electronics & Circuits & Systems, Athens, Greece, 2010: 1168-1171. doi: 10.1109/ ICECS.2010.5724725.
[19]
ZHANG Xuihui and TEHRANIPOOR M. RON: An on-chip ring oscillator network for hardware Trojan detection[C]. Design Automation & Test in Europe Conference & Exhibition, Grenoble, France, 2011: 1-6. doi: 10.1109/DATE. 2011.5763260.
[20]
XIAO Kan and TEHRANIPOOR M. BISA: Built-in self-authentication for preventing hardware Trojan insertion[C]. IEEE International Symposium on Hardware- Oriented Security and Trust Conference, Anaheim, USA, 2013: 45-50. doi: 10.1109/HST.2013.6581564.
[21]
WU Tony F, GANESAN K, HU Yunqing, et al. TPAD: Hardware Trojan prevention and detection for trusted integrated circuits[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2016, 35(4): 521-534. doi: 10.1109/TCAD.2015.2474373.