Hardware Trojan Detection by Delay and Electromagnetic Measurements

被引:0
|
作者
Ngo, X-T. [2 ]
Exurville, I. [1 ,5 ]
Bhasin, S. [2 ]
Danger, J-L. [2 ,3 ,4 ]
Guilley, S. [2 ,3 ,4 ]
Najm, Z. [2 ]
Rigaud, J-B. [5 ]
Robisson, B. [1 ]
机构
[1] CEA Tech PACA, LSAS, Gardanne, France
[2] TELECOM ParisTech, Paris, France
[3] Secure IC SAS, Paris, France
[4] Secure IC SAS, Rennes, France
[5] EMSE, LSAS, Gardanne, France
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojans (HT) inserted in integrated circuits have received special attention of researchers. In this paper, we present firstly a novel HT detection technique based on path delays measurements. A delay model, which considers intra-die process variations, is established for a net. Secondly, we show how to detect HT using ElectroMagnetic (EM) measurements. We study the HT detection probability according to its size taking into account the inter-die process variations with a set of FPGA. The results show, for instance, that there is a probability greater than 95% with a false negative rate of 5% to detect a HT larger than 1.7% of the original circuit.
引用
收藏
页码:782 / 787
页数:6
相关论文
共 50 条
  • [1] Electromagnetic Circuit Fingerprints for Hardware Trojan Detection
    Balasch, Josep
    Gierlichs, Benedikt
    Verbauwhede, Ingrid
    [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC), 2015, : 246 - 251
  • [2] Hardware Trojan detection using path delay fingerprint
    Jin, Yier
    Makris, Yiorgos
    [J]. 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 51 - +
  • [3] Hardware Trojan Detection Using the Order of Path Delay
    Cui, Xiaotong
    Koopahi, Elnaz
    Wu, Kaijie
    Karri, Ramesh
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2018, 14 (03)
  • [4] Detection of Hardware Trojan in SEA Using Path Delay
    Kumar, Prasanna
    Srinivasan, Ramasamy
    [J]. 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [5] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Zhang, Lei
    Dong, Youheng
    Wang, Jianxin
    Xiao, Chaoen
    Ding, Ding
    [J]. CHINA COMMUNICATIONS, 2019, 16 (12) : 100 - 110
  • [6] A Hardware Trojan Detection Method Based on the Electromagnetic Leakage
    Lei Zhang
    Youheng Dong
    Jianxin Wang
    Chaoen Xiao
    Ding Ding
    [J]. China Communications, 2019, 16 (12) : 100 - 110
  • [7] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [8] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    [J]. Introduction to Hardw. Secty. and Trust, (339-364):
  • [9] Part I: Evaluation for Hardware Trojan Detection Based on Electromagnetic Radiation
    Su, Ting
    Li, Shaoqing
    Tang, Yongkang
    Chen, Jihua
    [J]. JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2020, 36 (05): : 591 - 606
  • [10] Robust Hardware Trojan Detection Method by Unsupervised Learning of Electromagnetic Signals
    Lee, Daehyeon
    Lee, Junghee
    Jung, Younggiu
    Kauh, Janghyuk
    Song, Taigon
    [J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2024, 32 (12): : 2327 - 2340