On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

被引:6
|
作者
Dupuis, Sophie [1 ]
Di Natale, Giorgio [1 ]
Flottes, Marie-Lise [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] LIRMM UM2, CNRS, 161 Rue Ada, F-34095 Montpellier, France
来源
INFORMATION SECURITY JOURNAL | 2013年 / 22卷 / 5-6期
关键词
Hardware Trojan Horse (HTH); HTH detection; Side-channel analysis; Simulation;
D O I
10.1080/19393555.2014.891277
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan Horses (HTHs) are malicious and stealthy alterations of integrated circuits introduced at design or fabrication steps in order to modify a circuit's intended behavior when deployed in the field. Due to HTHs' stealth and diversity (intended alteration, implementation, triggering conditions), detecting and/or locating them is challenging. Several HTHs detection approaches have been proposed to address this problem. This paper focuses on so-called "side-channel analysis" methods, that is, methods that use power or delay measurements to detect potential HTHs. It reviews these methods and raises some considerations about the experiments made to evaluate them. Moreover, an original case study is presented in which we show that weak experiments may lead to misleading interpretations. Last, we evoke problems inherent to actual power and delay measurements.
引用
收藏
页码:226 / 236
页数:11
相关论文
共 50 条
  • [1] A Hardware Trojan Detection Method Based on Side-channel Analysis
    Wang Xiaohan
    Li Xiongwei
    Xu Lu
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1042 - 1047
  • [2] Hardware Trojan Detection Techniques Using Side-Channel Analysis
    Thi-Tam Hoang
    Thai-Ha Tran
    Van-Phuc Hoang
    Xuan-Nam Tran
    Cong-Kha Pham
    PROCEEDINGS OF 2019 6TH NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT (NAFOSTED) CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2019, : 528 - 533
  • [3] Side-channel Analysis for Hardware Trojan Detection using Machine Learning
    Yang, Shuo
    Chakraborty, Prabuddha
    Bhunia, Swarup
    2021 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2021, : 7 - 12
  • [4] Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
    Narasimhan, Seetharam
    Du, Dongdong
    Chakraborty, Rajat Subhra
    Paul, Somnath
    Wolff, Francis G.
    Papachristou, Christos A.
    Roy, Kaushik
    Bhunia, Swarup
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2183 - 2195
  • [5] An Efficient Approach for Hardware Trojan Detection Based on Side-Channel Analysis
    Tiwari, Shubham Kumar
    Ramesh, S.R.
    2023 IEEE 20th India Council International Conference, INDICON 2023, 2023, : 85 - 90
  • [6] A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement
    Amelian, Atieh
    Borujeni, Shahram Etemadi
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (09)
  • [7] Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis
    Xuan Thuy Ngo
    Najm, Zakaria
    Bhasin, Shivam
    Guilley, Sylvain
    Danger, Jean-Luc
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (03) : 239 - 247
  • [8] SCCA: Side-Channel Correlation Analysis for Detecting Hardware Trojan
    Liu, Yanjiang
    Zhao, Yiqiang
    He, Jiaji
    Liu, Aqiang
    Xin, Ruishan
    PROCEEDINGS OF 2017 11TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2017, : 196 - 200
  • [9] The First Thorough Side-Channel Hardware Trojan
    Ender, Maik
    Ghandali, Samaneh
    Moradi, Amir
    Paar, Christof
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 755 - 780
  • [10] RF Analog Hardware Trojan Detection Through Electromagnetic Side-Channel
    Kan, John
    Shen, Yuyi
    Xu, Jiachen
    Chen, Ethan
    Zhu, Jimmy
    Chen, Vanessa
    IEEE OPEN JOURNAL OF CIRCUITS AND SYSTEMS, 2022, 3 : 237 - 251