Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection

被引:0
|
作者
Nejat, Arash [1 ]
Kazemi, Zahra [1 ]
Beroulle, Vincent [1 ]
Hely, David [1 ]
Fazeli, Mahdi [2 ]
机构
[1] Univ Grenoble Alpes, Grenoble INP, LCIS, F-26000 Valence, France
[2] Iran Uni Sci & Tech, Sch Comp Eng, Tehran, Iran
关键词
Hardware security; design for hardware trust; logic Locking; Hardware Trojan detection; IP piracy;
D O I
10.1109/ivsw.2019.8854402
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays due to economic reasons most of the semiconductor companies prefer to outsource the manufacturing part of their designs to third fabrication foundries, the so-called fabs. Untrustworthy fabs can extract circuit blocks, the called intellectual properties (IPs), from the layouts and then pirate them. Such fabs are suspected of hardware Trojan (HT) threat in which malicious circuits are added to the layouts for sabotage objectives. HTs lead up to increase power consumption in HT-infected circuits. However, due to process variations, the power of HTs including few gates in million-gate circuits is not detectable in power consumption analysis (PCA). Thus, such circuits should be considered as a collection of small sub-circuits, and PCA must be individually performed for each one of them. In this article, we introduce an approach facilitating PCA-based HT detection methods. Concerning this approach, we propose a new logic locking method and algorithm. Logic locking methods and algorithm are usually employed against IP piracy. They modify circuits such that they do not correctly work without applying a correct key to. Our experiments at the gate level and post-synthesis show that the proposed locking method and algorithm increase the proportion of HT activity and consequently HT power to circuit power.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Restricting switching activity using logic locking to improve power analysis-based trojan detection
    Nejat, Arash
    Kazemi, Zahra
    Beroulle, Vincent
    Hely, David
    Fazeli, Mahdi
    2019 IEEE 4th International Verification and Security Workshop, IVSW 2019, 2019, : 49 - 54
  • [2] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [3] Detection and Diagnosis of Hardware Trojan Using Power Analysis
    Vaddi, Eknadh
    Gaddam, Karthik
    Maniam, Rahul Karthik
    Mallavajjala, Sai Abhishek
    Dasari, Srinivasulu
    Devi, Nirmala M.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 519 - 529
  • [4] How Logic Masking Can Improve Path Delay Analysis for Hardware Trojan Detection
    Nejat, Arash
    Hely, David
    Beroulle, Vincent
    PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2016, : 424 - 427
  • [5] Using deep graph learning to improve dynamic analysis-based malware detection in PE files
    Minh Tu Nguyen
    Viet Hung Nguyen
    Nathan Shone
    Journal of Computer Virology and Hacking Techniques, 2024, 20 : 153 - 172
  • [6] Using deep graph learning to improve dynamic analysis-based malware detection in PE files
    Nguyen, Minh Tu
    Nguyen, Viet Hung
    Shone, Nathan
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 153 - 172
  • [7] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    Nourian, M. A.
    Fazeli, M.
    Hely, D.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (04): : 461 - 470
  • [8] Hardware Trojan Detection Using an Advised Genetic Algorithm Based Logic Testing
    M. A. Nourian
    M. Fazeli
    D. Hely
    Journal of Electronic Testing, 2018, 34 : 461 - 470
  • [9] A Side Channel Based Power Analysis Technique for Hardware Trojan Detection using Statistical Learning Approach
    Shende, Roshni
    Ambawade, Dayanand D.
    2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2016,
  • [10] Power Reduction of Asynchronous Logic Circuits Using Activity Detection
    Thonnart, Yvain
    Beigne, Edith
    Valentian, Alexandre
    Vivet, Pascal
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2009, 17 (07) : 893 - 906