Runtime hardware Trojan detection by reconfigurable monitoring circuits

被引:0
|
作者
Reza Fani
Morteza Saheb Zamani
机构
[1] Amirkabir University of Technology,Department of Computer Engineering
来源
关键词
Hardware Trojan; Design for hardware trust; Design for trust; Runtime detection;
D O I
暂无
中图分类号
学科分类号
摘要
The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive research activities have focused on finding appropriate solutions to prevent this issue. This paper proposes an approach to detect hardware Trojans using a design method for hardware security at runtime and during operation in the field. To this end, the operation of the circuit components is constantly monitored, and if there is a functionality violation for any reason, including an inserted hardware Trojan, it can be immediately detected and notified to the user. This is done by comparing the outputs of each part of the circuit that are prone to incorporate the Trojan’s payload by adversaries with the output of a circuit that imitates it. We show that by using this approach, we can find all of the Trojans that change the functionality of the attempted benchmarks even if they remain active for only a few nanoseconds. Besides, our approach does not need a golden chip and can be used for any type of digital chips.
引用
收藏
页码:12726 / 12752
页数:26
相关论文
共 50 条
  • [21] Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits
    Basu, Subhashree
    Kule, Malay
    Rahaman, Hafizur
    [J]. 4th International Symposium on Devices, Circuits and Systems, ISDCS 2021 - Conference Proceedings, 2021,
  • [22] Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors
    He, Jiaji
    Guo, Xiaolong
    Ma, Haocheng
    Liu, Yanjiang
    Zhao, Yiqiang
    Jin, Yier
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [23] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [24] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    [J]. Introduction to Hardw. Secty. and Trust, (339-364):
  • [25] Hardware Trojan Detection on a PCB Through Differential Power Monitoring
    Piliposyan, Gor
    Khursheed, Saqib
    Rossi, Daniele
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (02) : 740 - 751
  • [26] A runtime environment for reconfigurable hardware operating systems
    Walder, H
    Platzner, M
    [J]. FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 831 - 835
  • [27] Synthesis of Application Accelerators on Runtime Reconfigurable Hardware
    Alle, Mythri
    Varadarajan, Keshavan
    Reddy, Ramesh
    Joseph, Nimmy
    Fell, Alexander
    Rao, Adarsha
    Nandy, S. K.
    Narayan, Ranjani
    [J]. 2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 13 - +
  • [28] Hardware Trojan Detection Method for Inspecting Integrated Circuits Based on Machine Learning
    Wang, Yuze
    Liu, Peng
    Han, Xiaoxia
    Jiang, Yingtao
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 432 - 436
  • [29] EETD: An Energy Efficient Design for Runtime Hardware Trojan Detection in Untrusted Network-on-Chip
    Hussain, Mubashir
    Malekpour, Amin
    Guo, Hui
    Parameswaran, Sri
    [J]. 2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 345 - 350
  • [30] A General Framework for Hardware Trojan Detection in Digital Circuits by Statistical Learning Algorithms
    Chen, Xiaoming
    Wang, Lin
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2017, 36 (10) : 1633 - 1646