A Hardware Trojan Detection Method Based on the Electromagnetic Leakage

被引:0
|
作者
Lei Zhang [1 ]
Youheng Dong [1 ]
Jianxin Wang [1 ]
Chaoen Xiao [1 ]
Ding Ding [1 ]
机构
[1] Beijing Electronic Science and Technology Institute
基金
中央高校基本科研业务费专项资金资助; 北京市自然科学基金;
关键词
hardware trojan detection; side channel analysis; electromagnetic leakage; principal component analysis; Mahalanobis distance; detection quality;
D O I
暂无
中图分类号
TN407 [测试和检验];
学科分类号
080903 ; 1401 ;
摘要
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achieve destructive functions. Unfortunately the HT is difficult to detecte due to its minimal resource occupation. In order to achieve an accurate detection with high efficiency, a HT detection method based on the electromagnetic leakage of the chip is proposed in this paper. At first, the dimensionality reduction and the feature extraction of the electromagnetic leakage signals in each group(template chip, Trojan-free chip and target chip) were realized by principal component analysis(PCA). Then, the Mahalanobis distances between the template group and the other groups were calculated. Finally, the differences between the Mahalanobis distances and the threshold were compared to determine whether the HT had been implanted into the target chip. In addition, the concept of the HT Detection Quality(HTDQ) was proposed to analyze and compare the performance of different detection methods. Our experiment results indicate that the accuracy of this detection method is 91.93%, and the time consumption is 0.042s in average, which shows a high HTDQ compared with three other methods.
引用
收藏
页码:100 / 110
页数:11
相关论文
共 50 条
  • [1] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    [J]. CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [2] Hardware Trojan Detection by Delay and Electromagnetic Measurements
    Ngo, X-T.
    Exurville, I.
    Bhasin, S.
    Danger, J-L.
    Guilley, S.
    Najm, Z.
    Rigaud, J-B.
    Robisson, B.
    [J]. 2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 782 - 787
  • [3] Electromagnetic Circuit Fingerprints for Hardware Trojan Detection
    Balasch, Josep
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 246 - 251
  • [4] Hardware Trojan detection method based on circuit activity
    Zhao, Yiqiang
    Xie, Xiaotian
    Liu, Yanjiang
    Liu, Aqiang
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2018, 46 (02): : 90 - 94
  • [5] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [6] Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation
    Su, Ting
    Li, Shaoqing
    Tang, Yongkang
    Chen, Jihua
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2020, 36 (05): : 591 - 606
  • [7] Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation
    Ting Su
    Shaoqing Li
    Yongkang Tang
    Jihua Chen
    [J]. Journal of Electronic Testing, 2020, 36 : 591 - 606
  • [8] Machine Learning Based Hardware Trojan Detection Using Electromagnetic Emanation
    Takahashi, Junko
    Okabe, Keiichi
    Itoh, Hiroki
    Xuan-Thuy Ngo
    Guilley, Sylvain
    Shrivastwa, Ritu-Ranjan
    Ahmed, Mushir
    Lejoly, Patrick
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (03) : 311 - 325
  • [9] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    [J]. IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [10] Hardware Trojan detection method based on combined features analysis
    Zhao, Yiqiang
    Li, Bowen
    Ma, Haocheng
    He, Jiaji
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2021, 49 (05): : 1 - 6