全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
VLSI Design  2014 

Efficient Hardware Trojan Detection with Differential Cascade Voltage Switch Logic

DOI: 10.1155/2014/652187

Full-Text   Cite this paper   Add to My Lib

Abstract:

Offshore fabrication, assembling and packaging challenge chip security, as original chip designs may be tampered by malicious insertions, known as hardware Trojans (HTs). HT detection is imperative to guarantee the chip performance and safety. Existing HT detection methods have limited capability to detect small-scale HTs and are further challenged by the increased process variation. To increase HT detection sensitivity and reduce chip authorization time, we propose to exploit the inherent feature of differential cascade voltage switch logic (DCVSL) to detect HTs at runtime. In normal operation, a system implemented with DCVSL always produces complementary logic values in internal nets and final outputs. Noncomplementary values on inputs and internal nets in DCVSL systems potentially result in abnormal power behavior and even system failures. By examining special power characteristics of DCVSL systems upon HT insertion, we can detect HTs, even if the HT size is small. Simulation results show that the proposed method achieves up to 100% HT detection rate. The evaluation on ISCAS benchmark circuits shows that the proposed method obtains a HT detection rate in the range of 66% to 98%. 1. Introduction The growing number of ICs manufactured offshore increases the threats to chip security [1–3]. Research has exposed an increase in existence of hardware Trojans (HTs), which are malicious additions or modifications to the circuit design that alter the original function. Malicious inclusions of hardware have the potential to degrade system performance, surreptitiously delete data, leave a backdoor for secret key leaking, or eventually destroy the chip [4, 5]. It is imperative to detect HTs. HTs can be detected by destructive approaches such as the chemical mechanical polishing (CMP) method. The CMP approach detects HTs by analyzing pictures of the demetalized chips under an electron microscope [6]. In addition to being expensive, this type of technique is also time consuming (takes several months) and loses its efficiency when the transistor density increases. Nondestructive HT detection methods are broadly classified into two categories: logic testing and side-channel analysis (SCA) approaches [6]. Automatic test pattern generation (ATPG) approaches examine whether the measured outputs match the expected one for given inputs and work well for a functional unit with a small set of inputs, as the probability of rare events is relatively high. When the circuit complexity increases, the number of test vectors for ATPG will significantly increase to an unaffordable

References

[1]  J. Markoff, “Old Trick Threatens the Newest Weapons,” October 2009, http://www.nytimes.com/2009/10/27/science/27trojan.html?pagewanted=all&_r=1&.
[2]  J. Ellis, “Trojan integrated circuits,” http://chipsecurity.org/2012/02/trojan-circuit/.
[3]  S. Johnson, “Fake chips threaten military,” San Jose Mercury News, September 2010, http://www.mercurynews.com/breaking-news/ci_15990184.
[4]  M. Banga and M. S. Hsiao, “A region based approach for the identification of hardware Trojans,” in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST '08), pp. 40–47, June 2008.
[5]  D. Mukhopadhyay and R. S. Chakraborty, “Testability of cryptographic hardware and detection of Hardware Trojans,” in Proceedings of the 20th Asian Test Symposium (ATS '11), pp. 517–524, November 2011.
[6]  M. Tehranipoor and F. Koushanfar, “A survey of hardware trojan taxonomy and detection,” IEEE Design and Test of Computers, vol. 27, no. 1, pp. 10–25, 2010.
[7]  F. Wolff, C. Papachristou, S. Bhunia, and R. S. Chakraborty, “Towards Trojan-free trusted ICs: problem analysis and detection scheme,” in Proceedings of the Design, Automation and Test in Europe (DATE '08), pp. 1362–1365, Munich, Germany, March 2008.
[8]  R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, “MERO: a statistical approach for hardware Trojan detection,” in Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, pp. 396–410, 2009.
[9]  M. Banga and M. S. Hsiao, “VITAMIN: voltage inversion technique to ascertain malicious insertions in ICs,” in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST '09), pp. 104–107, July 2009.
[10]  H. Salmani, M. Tehranipoor, and J. Plusquellic, “A novel technique for improving hardware trojan detection and reducing trojan activation time,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 20, no. 1, pp. 112–125, 2012.
[11]  Y. Alkabani, “Trojan immune circuits using duality,” in Proceedings of the 15th Euromicro Conference on Digital System Design (DSD '12), pp. 177–184, 2012.
[12]  Y. Jin and Y. Makris, “Hardware Trojan detection using path delay fingerprint,” in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST '08), pp. 51–57, June 2008.
[13]  K. Hu, A. N. Nowroz, S. Reda, and F. Koushanfar, “High-sensitivity hardware Trojan detection using multimodal characterization,” in Proceedings of the Design, Automation & Test in Europe Conference & Exhibition (DATE ’13), pp. 1271–1276, 2013.
[14]  C. Bell, M. Lewandowski, and S. Katkoori, “A multi-parameter functional side-channel analysis method for hardware trust verification,” in Proceedings of the 31st IEEE VLSI Test Symposium (VTS ’13), pp. 1–4, 2013.
[15]  L. Wang, H. Xie, and H. Luo, “Malicious circuitry detection using transient power analysis for IC security,” in Proceedings of the International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE ’13), pp. 1164–1167, 2013.
[16]  S. Narasimhan, D. Du, R. S. Chakraborty et al., “Hardware Trojan detection by multiple-parameter side-channel analysis,” IEEE Transactions on Computers, vol. 62, no. 11, pp. 2183–2195, 2013.
[17]  S. Narasimhan, X. Wang, S. Bhunia, W. Yueh, and S. Mukhopadhyay, “Improving IC security against Trojan attacks through integration of security monitors,” IEEE Design & Test of Computers, vol. 29, no. 5, pp. 37–46, 2012.
[18]  T. Huffmire, J. Valamehr, T. Sherwood et al., “Trustworthy system security through 3-D integrated hardware,” in Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST '08), pp. 91–92, June 2008.
[19]  X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, “Hardware Trojan detection and isolation using current integration and localized current analysis,” in Proceedings of the 23rd IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT '08), pp. 87–95, October 2008.
[20]  F. Koushanfar and A. Mirhoseini, “A unified framework for multimodal submodular integrated circuits trojan detection,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 162–174, 2011.
[21]  D. A. Rennels and H. Kim, “Concurrent error detection in self-timed VLSI,” in Proceedings of the 24th International Symposium on Fault-Tolerant Computing, pp. 96–105, June 1994.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133