Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans

被引:56
|
作者
Bao, Chongxi [1 ]
Forte, Domenic [2 ]
Srivastava, Ankur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Univ Connecticut, Dept Elect & Comp Engn, Storrs, CT 06269 USA
基金
美国国家科学基金会;
关键词
Extended Kalman filter (EKF); hardware Trojan; KF; run-time detection; temperature tracking; LEAKAGE;
D O I
10.1109/TCAD.2015.2424929
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose three innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. The first one is a local sensor-based approach that uses information from thermal sensors together with hypothesis testing to make a decision. The second one is a global approach that exploits correlation between sensors and maintains track of the ICs thermal profile using a Kalman filter (KF). The third approach incorporates leakage power into the system dynamic model and apply extended KF (EKF) to track ICs thermal profile. Simulation results using state-of-the-art tools on ten publicly available Trojan benchmarks verify that all three proposed approaches can detect active Trojans quickly and with few false positives. Among three approaches, EKF is flawless in terms of the ten benchmarks tested but would require the most overhead.
引用
收藏
页码:1577 / 1585
页数:9
相关论文
共 50 条
  • [41] Run-time Mapping of Spiking Neural Networks to Neuromorphic Hardware
    Balaji, Adarsha
    Marty, Thibaut
    Das, Anup
    Catthoor, Francky
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2020, 92 (11): : 1293 - 1302
  • [42] Run-time Mapping of Spiking Neural Networks to Neuromorphic Hardware
    Adarsha Balaji
    Thibaut Marty
    Anup Das
    Francky Catthoor
    Journal of Signal Processing Systems, 2020, 92 : 1293 - 1302
  • [43] Run-time Hardware Trojan Detection and Recovery for Third-Party IPs in SoC FPGAs
    Rivera, Luis Ramirez
    Wang, Xiaofang
    2020 IEEE 18TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, EUC 2020, 2020, : 9 - 16
  • [44] Toward Translating Design Constraints to Run-Time Assertions
    Baresi, Luciano
    Young, Michal
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 116 : 73 - 84
  • [45] Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans
    Chen, Zhe
    Guo, Shize
    Wang, Jian
    Li, Yubai
    Lu, Zhonghai
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04) : 7061 - 7068
  • [46] Run-time malware detection based on IRP
    Zhang F.-Y.
    Qi D.-Y.
    Hu J.-L.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (02): : 113 - 117
  • [47] Run-time Attack Detection in Cryptographic APIs
    Focardi, Riccardo
    Squarcina, Marco
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 176 - 188
  • [48] Run-time spatial locality detection and optimization
    Johnson, TL
    Merten, MC
    Hwu, WW
    THIRTIETH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, 1997, : 57 - 64
  • [49] Hardware-Based Run-Time Code Integrity in Embedded Devices
    Wehbe, Taimour
    Mooney, Vincent
    Keezer, David
    CRYPTOGRAPHY, 2018, 2 (03) : 1 - 18
  • [50] Ensemble Learning for Effective Run-Time Hardware-Based Malware Detection: A Comprehensive Analysis and Classification
    Sayadi, Hossein
    Patel, Nisarg
    Manoj, Sai P. D.
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,