Runtime hardware Trojan detection by reconfigurable monitoring circuits

被引:0
|
作者
Reza Fani
Morteza Saheb Zamani
机构
[1] Amirkabir University of Technology,Department of Computer Engineering
来源
关键词
Hardware Trojan; Design for hardware trust; Design for trust; Runtime detection;
D O I
暂无
中图分类号
学科分类号
摘要
The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive research activities have focused on finding appropriate solutions to prevent this issue. This paper proposes an approach to detect hardware Trojans using a design method for hardware security at runtime and during operation in the field. To this end, the operation of the circuit components is constantly monitored, and if there is a functionality violation for any reason, including an inserted hardware Trojan, it can be immediately detected and notified to the user. This is done by comparing the outputs of each part of the circuit that are prone to incorporate the Trojan’s payload by adversaries with the output of a circuit that imitates it. We show that by using this approach, we can find all of the Trojans that change the functionality of the attempted benchmarks even if they remain active for only a few nanoseconds. Besides, our approach does not need a golden chip and can be used for any type of digital chips.
引用
收藏
页码:12726 / 12752
页数:26
相关论文
共 50 条
  • [1] Runtime hardware Trojan detection by reconfigurable monitoring circuits
    Fani, Reza
    Zamani, Morteza Saheb
    [J]. JOURNAL OF SUPERCOMPUTING, 2022, 78 (10): : 12726 - 12752
  • [2] Applying Chaos Theory for Runtime Hardware Trojan Monitoring and Detection
    Zhao, Hong
    Kwiat, Luke
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    Njilla, Laurent
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (04) : 716 - 729
  • [3] Applying Chaos Theory for Runtime Hardware Trojan Detection
    Zhao, Hong
    Kwiat, Kevin
    Kamhoua, Charles
    Rodriguez, Manuel
    [J]. 2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 156 - 161
  • [4] Hardware Trojan Insertion and Detection in Asynchronous Circuits
    Inaba, Koutaro
    Yoneda, Tomohiro
    Kanamoto, Toshiki
    Kurokawa, Atsushi
    Imai, Masashi
    [J]. 2019 25TH IEEE INTERNATIONAL SYMPOSIUM ON ASYNCHRONOUS CIRCUITS AND SYSTEMS (ASYNC 2019), 2019, : 134 - 143
  • [5] Trust Filter: Runtime Hardware Trojan Detection in Behavioral MPSoCs
    Nandeesha Veeranna
    Benjamin Carrion Schafer
    [J]. Journal of Hardware and Systems Security, 2017, 1 (1) : 56 - 67
  • [6] Hardware Trojan Detection Using Reconfigurable Assertion Checkers
    Alsaiari, Uthman
    Gebali, Fayez
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (07) : 1575 - 1586
  • [7] An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection
    Pirpilidis, Filippos
    Voyiatzis, Artemios G.
    Pyrgas, Lambros
    Kitsos, Paris
    [J]. 20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [8] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    [J]. 2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [9] Hardware trojan detection in Analog/RF integrated circuits
    University of Central Florida, Orlando
    FL
    32816, United States
    不详
    CT
    06520, United States
    不详
    TX
    75080, United States
    [J]. Secur. Syst. Des. and Trust. Comput., (241-268):
  • [10] Hardware Trojan Design and Detection in Asynchronous NCL Circuits
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Smith, Scott C.
    [J]. 2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,