Abstract
Hardware Trojans have emerged as a security threat to many critical systems. In particular, malicious hardware components can be inserted at the foundry for implementing hidden backdoors to leak secret information. In this paper, we present a new method to partition the circuit under test into blocks in order to obtain different side-channel signatures per chip. Each signature indicates which block is off or on in terms of the dynamic power (switching activity). As a result, there are different co-existing decisions to more precisely detect the Trojan instead of one decision resulting from one side-channel signature. Moreover, this method detects in which block the Trojan exists. AES was used as an example to be divided into blocks. Sakura-G was used as an implementation target. The obtained results give four decisions to enhance Trojan existence and position. This paper also presents a methodology for Trojan detection using a cryptographic protocol to secure the detection process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Defense Advanced Research Projects Agency (DARPA): TRUST in Integrated Circuits (TIC) (2007). http://www.darpa.mil/MTO/solicitations/baa07-24
Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M., Plusquellic, J., Tehranipoor, M.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30(3), 6–17 (2013)
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 296–310. IEEE (2007)
Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1362–1365. ACM (2008)
Tehranipoor, M., Koushanfar, F.: A Survey of Hardware Trojan Taxonomy and Detection (2010)
Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 27(1), 10–25 (2010)
Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: IEEE International Symposium on Electromagnetic Compatibility (EMC 2015), pp. 246–251. IEEE (2015)
Du, D., Narasimhan, S., Chakraborty, R.S., Bhunia, S.: Self-referencing: a scalable side-channel approach for hardware Trojan detection. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 173–187. Springer, Heidelberg (2010)
Torrance, R., James, D.: The state-of-the-art in semiconductor reverse engineering. In: Proceedings of the 48th Design Automation Conference, pp. 333–338. ACM (2011)
Bao, C., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: 15th International Symposium on Quality Electronic Design (ISQED 2014), pp. 47–54. IEEE (2014)
Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396–410. Springer, Heidelberg (2009)
Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proceedings of the 51st Annual Design Automation Conference, pp. 1–6. ACM (2014)
D’Souza, A.L., Hsiao, M.S.: Error diagnosis of sequential circuits using region-based model. In: Fourteenth International Conference on VLSI Design, 2001, pp. 103–108. IEEE (2001)
Sanno, B.: Detecting Hardware Trojans. Ruhr-University Bochum, Bochum (2009)
Chown, P.: Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) (2002)
SAKURA-G Quick Start Guide. http://satoh.cs.uec.ac.jp/SAKURA/doc/SAKURA-G_Quik_Start_Guide_Ver1.0_English.pdf
Xiao, K., Tehranipoor, M.: BISA: built-in self-authentication for preventing hardware Trojan insertion. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013), pp. 45–50. IEEE (2013)
Abramovici, M., Levin, P.: Protecting Integrated Circuits from Silicon Trojan Horses, January/February 2009
Acknowledgment
This work was supported by the European Commission through the ICT program under contract FP7-ICT-2011-317930 HINT. The authors would like to thank Driss Aboulkassimi and David Cambon for their help in this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Abdellatif, K.M., Cornesse, C., Fournier, J., Robisson, B. (2016). New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements. In: Bonato, V., Bouganis, C., Gorgon, M. (eds) Applied Reconfigurable Computing. ARC 2016. Lecture Notes in Computer Science(), vol 9625. Springer, Cham. https://doi.org/10.1007/978-3-319-30481-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-30481-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30480-9
Online ISBN: 978-3-319-30481-6
eBook Packages: Computer ScienceComputer Science (R0)