On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

被引:6
|
作者
Dupuis, Sophie [1 ]
Di Natale, Giorgio [1 ]
Flottes, Marie-Lise [1 ]
Rouzeyre, Bruno [1 ]
机构
[1] LIRMM UM2, CNRS, 161 Rue Ada, F-34095 Montpellier, France
来源
INFORMATION SECURITY JOURNAL | 2013年 / 22卷 / 5-6期
关键词
Hardware Trojan Horse (HTH); HTH detection; Side-channel analysis; Simulation;
D O I
10.1080/19393555.2014.891277
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan Horses (HTHs) are malicious and stealthy alterations of integrated circuits introduced at design or fabrication steps in order to modify a circuit's intended behavior when deployed in the field. Due to HTHs' stealth and diversity (intended alteration, implementation, triggering conditions), detecting and/or locating them is challenging. Several HTHs detection approaches have been proposed to address this problem. This paper focuses on so-called "side-channel analysis" methods, that is, methods that use power or delay measurements to detect potential HTHs. It reviews these methods and raises some considerations about the experiments made to evaluate them. Moreover, an original case study is presented in which we show that weak experiments may lead to misleading interpretations. Last, we evoke problems inherent to actual power and delay measurements.
引用
收藏
页码:226 / 236
页数:11
相关论文
共 50 条
  • [31] Side-channel analysis-based detection approach of hardware Trojans
    Wang, Li-Wei
    Luo, Hong-Wei
    Yao, Ruo-He
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2012, 40 (06): : 6 - 10
  • [32] Multiple Parameters Side Channel Signal Analysis Using in Hardware Trojan Detection
    刘燕江
    王力纬
    谢云
    冯秋丽
    侯波
    Journal of Donghua University(English Edition), 2015, 32 (06) : 1055 - 1059
  • [33] LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection
    Vakil, Ashkan
    Behnia, Farnaz
    Mirzaeian, Ali
    Homayoun, Houman
    Karimi, Naghmeh
    Sasan, Avesta
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 40 - 45
  • [34] Experiences In Side Channel and Testing Based Hardware Trojan Detection
    Hely, David
    Martin, Julien
    Triana, Gerson Dario Piraquive
    Mounier, Simon Piroux
    Riviere, Elie
    Sahuc, Thibault
    Savonet, Jeremy
    Soundararadjou, Laura
    2013 IEEE 31ST VLSI TEST SYMPOSIUM (VTS), 2013,
  • [35] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326
  • [36] Side-channel trojan insertion - A practical foundry-side attack via ECO
    Perez, Tiago Diadami
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    arXiv, 2021,
  • [37] Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
    Ghandali, Samaneh
    Moos, Thorben
    Moradi, Amir
    Paar, Christof
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (06) : 1435 - 1448
  • [38] Supervised and Unsupervised Machine Learning for Side-Channel based Trojan Detection
    Jap, Dirmanto
    He, Wei
    Bhasin, Shivam
    2016 IEEE 27TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2016, : 17 - 24
  • [39] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
    Perez, Tiago
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [40] An Implementation of Trojan Side-Channel with a Masking Scheme
    Meng, Wenlin
    Zhu, Wenfeng
    Zhang, Chi
    Liu, Junrong
    Guo, Zheng
    Gu, Dawu
    Fan, Wei
    Zhang, Haifeng
    Yuan, Yidong
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 566 - 569