A Start to Fail Frequency Technique for Detecting Hardware Trojan

被引:0
|
作者
Durai, Sharmila [1 ]
Kumar, Prasanna [2 ]
Ramasamy, Srinivasan [2 ]
机构
[1] RMD Engn Coll, Dept Elect & Commun Engn, Madras, Tamil Nadu, India
[2] RMK Engn Coll, Dept Elect & Commun Engn, Thiruvallur, India
关键词
GDSII; Hardware Trojan horses (HTH); HTH detection and insertion; Scalable encryption algorithm (SEA); Path delay; ALGORITHM;
D O I
10.1007/978-81-322-2126-5_67
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Rapid development of portable devices plays a major role in communication sector, which has led to a significant concern for cryptology. Cryptographic circuits are vulnerable to various side-channel attacks by the hardware Trojan horses (HTHs). HTHs are the malicious design modification that either alters the actual behavior of the design or reveals the secret information. In this work, we proposed a technique which is elusively for detection of hardware Trojans based on Start to Fail (STF) frequency concept. We inferred that this detection technique is efficient based on the experimental results observed, using ISCAS benchmark circuits and scalable encryption algorithm (SEA).
引用
收藏
页码:621 / 631
页数:11
相关论文
共 50 条
  • [1] An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan
    Hossain, Fakir Sharif
    Yoneda, Tomokazu
    Inoue, Michiko
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (01): : 130 - 139
  • [2] Hardware Trojan with Frequency Modulation
    Luft, Ash
    Sima, Mihai
    Mcguire, Michael
    2021 IEEE 12TH LATIN AMERICA SYMPOSIUM ON CIRCUITS AND SYSTEM (LASCAS), 2021,
  • [3] A Novel Approach to Detecting Hardware Trojan Horses
    Zhang, Jia-lin
    Fang, Lei
    Li, Lei
    Zhang, Zi-xuan
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 43 - 46
  • [4] Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
    Xue, Mingfu
    Liu, Wei
    Hu, Aiqun
    Wang, Youdong
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (03) : 606 - 609
  • [5] A Novel Technique for defending Hardware Trojan Circuit
    Zhao, ZhiQiang
    Yang, GaiGai
    Li, Lei
    Li, Zhen
    Li, Jia
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION PROBLEM-SOLVING (ICCP), 2014, : 357 - 360
  • [6] Hardware Trust through Layout Filling: a Hardware Trojan Prevention Technique
    Ba, Papa-Sidy
    Dupuis, Sophie
    Palanichamy, Manikandan
    Marie-Lise-Flottes
    Di Natale, Giorgio
    Rouzeyre, Bruno
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 254 - 259
  • [7] A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    Salmani, Hassan
    Tehranipoor, Mohammad
    Plusquellic, Jim
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (01) : 112 - 125
  • [8] On the Effect of Aging in Detecting Hardware Trojan Horses with Template Analysis
    Karimi, Naghmeh
    Danger, Jean-Luc
    Guilley, Sylvain
    2018 IEEE 24TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2018), 2018, : 281 - 286
  • [9] Cellular Automata Based Solution for Detecting Hardware Trojan in CMPs
    Hazra, Suvadip
    Dalui, Mamata
    RECENT ADVANCES IN INTELLIGENT INFORMATION SYSTEMS AND APPLIED MATHEMATICS, 2020, 863 : 644 - 655
  • [10] Detecting hardware Trojan through feature extraction in subspace domain
    Hu, A. (aqhu@seu.edu.cn), 1600, Southeast University (44):