Detection and Diagnosis of Hardware Trojan Using Power Analysis

被引:1
|
作者
Vaddi, Eknadh [1 ]
Gaddam, Karthik [1 ]
Maniam, Rahul Karthik [1 ]
Mallavajjala, Sai Abhishek [1 ]
Dasari, Srinivasulu [1 ]
Devi, Nirmala M. [1 ]
机构
[1] Amrita Vishwa Vidyapeetham, Dept Elect & Commun Engn, Hardware Secur Lab, Coimbatore 641112, Tamil Nadu, India
关键词
Hardware Trojan; Side channel analysis; Time based power; Leakage power; Golden IC;
D O I
10.1007/978-3-319-22915-7_47
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Intended malicious modification in the integrated circuits is referred to as Hardware Trojans, which has emerged as major security threat. The earlier approach, to keep check to these threats, like logic testing also known as functional testing is proved to be no longer effective for detecting large sequential Trojans which are very rarely triggered. Side channel analysis has been an effective approach for detection of such large sequential Trojans but the increasing process variations and decreasing Trojan size resulted in the reduction of Trojan detection sensitivity using this approach. All these approaches also require golden IC. In this paper, we propose leakage power analysis approach which does not require golden IC and the issue of process variations does not affect the detection sensitivity.
引用
收藏
页码:519 / 529
页数:11
相关论文
共 50 条
  • [1] Power Analysis-based Hardware Trojan Detection
    Xue, Hao
    Li, Shuo
    Ren, Saiyu
    2017 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2017, : 253 - 257
  • [2] Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis
    Zhang, Yang
    Quan, Hou-de
    Li, Xiong-wei
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 134 - 137
  • [3] A Survey of Hardware Trojan Detection, Diagnosis and Prevention
    Li, He
    Liu, Qiang
    Zhang, Jiliang
    Lyu, Yongqiang
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 173 - 180
  • [4] Nonlinear Analysis for Hardware Trojan Detection
    Zhou, Errui
    Zhao, Zhixun
    Li, Shaoqing
    Ni, Lin
    2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), 2015, : 793 - 796
  • [5] Detection and analysis of hardware trojan using scan chain method
    Rithesh, M.
    Ram, Bhargav B., V
    Harish, G.
    Yellampalli, Siva
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [6] Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis
    Yang Zhang
    Houde Quan
    Xiongwei Li
    Kaiyan Chen
    Journal of Electronic Testing, 2018, 34 : 305 - 312
  • [7] Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis
    Zhang, Yang
    Quan, Houde
    Li, Xiongwei
    Chen, Kaiyan
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (03): : 305 - 312
  • [8] Hardware Trojan Detection and Diagnosis through Synthesis and Validation using Game Theory
    Sankar, Vaishnavi
    Devi, Nirmala M.
    Jayakumar, M.
    2022 IEEE 19TH INDIA COUNCIL INTERNATIONAL CONFERENCE, INDICON, 2022,
  • [9] A Region Based Fingerprinting for Hardware Trojan Detection and Diagnosis
    Saran, T.
    Ranjani, R.
    Devi, Nirmala M.
    2017 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2017, : 166 - 172
  • [10] A Side Channel Based Power Analysis Technique for Hardware Trojan Detection using Statistical Learning Approach
    Shende, Roshni
    Ambawade, Dayanand D.
    2016 THIRTEENTH IEEE AND IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2016,