Delay based hardware Trojan detection exploiting spatial correlations to suppress variations

被引:1
|
作者
Esirci, Fatma Nur [1 ]
Bayrakci, Alp Arslan [1 ]
机构
[1] Gebze Tech Univ, Dept Comp Engn, Kocaeli, Turkiye
关键词
Hardware security; Hardware Trojan; Side-channel analysis; Delay based detection; Spatial correlation; STATISTICAL TIMING ANALYSIS; IMPACT;
D O I
10.1016/j.vlsi.2023.03.006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan detection is a crucial problem with many dimensions and high complexity. Side channel analysis based methods are advantageous for not requiring Trojan activation but deeply suffer from process variations, the inability to detect small Trojans as well as the requirement for golden chips. In this paper, a non-invasive, golden chip free delay based hardware Trojan detection method is proposed. It exploits the inherent spatial correlations to suppress the Trojan hiding effect of the variations. The method is verified using post-manufacturing simulations under an elaborative variation model considering both inter and intra die components. The results reveal that although delay-alone approach fails to detect minimal Trojans, the proposed method achieves the detection securing more than 91% percent of a circuit on average. Moreover, if the trigger detection in cooperation with the payload detection is utilized, the detection probability exceeds 99%.
引用
收藏
页码:107 / 118
页数:12
相关论文
共 50 条
  • [21] Quantification of Power Based Hardware Trojan Detection under Realistic Variations and Separation of Power Supplies
    Kocabas, Mehmet
    Bayrakci, Alp Arslan
    ELECO 2019 - 11th International Conference on Electrical and Electronics Engineering, 2019, : 522 - 526
  • [22] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [23] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [24] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [25] A Co-Training based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models
    Xue, Mingfu
    Bian, Rongzhen
    Wang, Jian
    Liu, Weiqiang
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1452 - 1457
  • [26] Hardware Trojan detection algorithm based on deep learning
    Liu Z.
    Zhang M.
    Chi Y.
    Li Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (06): : 37 - 45
  • [27] Deep Learning Based Approach for Hardware Trojan Detection
    Amrita Vishwa Vidyapeetham, Center for Cybersecurity Systems and Networks, Amritapuri, India
    不详
    Proc. - IEEE Int. Symp. Smart Electron. Syst., iSES, 1600, (177-182): : 177 - 182
  • [28] Activity Factor Based Hardware Trojan Detection and Localization
    Yongkang Tang
    Liang Fang
    Shaoqing Li
    Journal of Electronic Testing, 2019, 35 : 293 - 302
  • [29] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [30] On Reverse Engineering-Based Hardware Trojan Detection
    Department of Electrical and Computer Engineering, University of Maryland, College Park
    MD
    20742, United States
    不详
    FL
    32611, United States
    IEEE Trans Comput Aided Des Integr Circuits Syst, 1 (49-57):