Delay based hardware Trojan detection exploiting spatial correlations to suppress variations

被引:1
|
作者
Esirci, Fatma Nur [1 ]
Bayrakci, Alp Arslan [1 ]
机构
[1] Gebze Tech Univ, Dept Comp Engn, Kocaeli, Turkiye
关键词
Hardware security; Hardware Trojan; Side-channel analysis; Delay based detection; Spatial correlation; STATISTICAL TIMING ANALYSIS; IMPACT;
D O I
10.1016/j.vlsi.2023.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan detection is a crucial problem with many dimensions and high complexity. Side channel analysis based methods are advantageous for not requiring Trojan activation but deeply suffer from process variations, the inability to detect small Trojans as well as the requirement for golden chips. In this paper, a non-invasive, golden chip free delay based hardware Trojan detection method is proposed. It exploits the inherent spatial correlations to suppress the Trojan hiding effect of the variations. The method is verified using post-manufacturing simulations under an elaborative variation model considering both inter and intra die components. The results reveal that although delay-alone approach fails to detect minimal Trojans, the proposed method achieves the detection securing more than 91% percent of a circuit on average. Moreover, if the trigger detection in cooperation with the payload detection is utilized, the detection probability exceeds 99%.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [1] Hardware Trojan Detection Based on Correlated Path Delays in Defiance of Variations with Spatial Correlations
    Esirci, Fatma Nur
    Bayrakci, Alp Arslan
    PROCEEDINGS OF THE 2017 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2017, : 163 - 168
  • [2] Hardware Trojan Detection by Delay and Electromagnetic Measurements
    Ngo, X-T.
    Exurville, I.
    Bhasin, S.
    Danger, J-L.
    Guilley, S.
    Najm, Z.
    Rigaud, J-B.
    Robisson, B.
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 782 - 787
  • [3] Hardware Trojan detection using path delay fingerprint
    Jin, Yier
    Makris, Yiorgos
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 51 - +
  • [4] Hardware Trojan Detection Using the Order of Path Delay
    Cui, Xiaotong
    Koopahi, Elnaz
    Wu, Kaijie
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2018, 14 (03)
  • [5] Detection of Hardware Trojan in SEA Using Path Delay
    Kumar, Prasanna
    Srinivasan, Ramasamy
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [6] A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting
    Nejat, Arash
    Shekarian, Seyed Mohammd Hossein
    Zamani, Morteza Saheb
    MICROPROCESSORS AND MICROSYSTEMS, 2014, 38 (03) : 246 - 252
  • [7] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [8] A New Design of Hardware Trojan Based on Path Delay
    Sun, Hai-lin
    Li, Lei
    Zhou, Wan-ting
    INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY (ICMEIT 2018), 2018, : 419 - 423
  • [9] Delay-Based Reference Free Hardware Trojan Detection Using Virtual Intelligence
    Nandhini, S. Kamala
    Vallinayagam, S.
    Harshitha, H.
    Azad, V. A. Chandra Shekhar
    Mohankumar, N.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 : 506 - 514
  • [10] A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement
    Amelian, Atieh
    Borujeni, Shahram Etemadi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (09)