Skip to main content

New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements

  • Conference paper
  • First Online:
Book cover Applied Reconfigurable Computing (ARC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9625))

Included in the following conference series:

Abstract

Hardware Trojans have emerged as a security threat to many critical systems. In particular, malicious hardware components can be inserted at the foundry for implementing hidden backdoors to leak secret information. In this paper, we present a new method to partition the circuit under test into blocks in order to obtain different side-channel signatures per chip. Each signature indicates which block is off or on in terms of the dynamic power (switching activity). As a result, there are different co-existing decisions to more precisely detect the Trojan instead of one decision resulting from one side-channel signature. Moreover, this method detects in which block the Trojan exists. AES was used as an example to be divided into blocks. Sakura-G was used as an implementation target. The obtained results give four decisions to enhance Trojan existence and position. This paper also presents a methodology for Trojan detection using a cryptographic protocol to secure the detection process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Defense Advanced Research Projects Agency (DARPA): TRUST in Integrated Circuits (TIC) (2007). http://www.darpa.mil/MTO/solicitations/baa07-24

  2. Bhunia, S., Abramovici, M., Agrawal, D., Bradley, P., Hsiao, M., Plusquellic, J., Tehranipoor, M.: Protection against hardware Trojan attacks: towards a comprehensive solution. IEEE Des. Test 30(3), 6–17 (2013)

    Article  Google Scholar 

  3. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 296–310. IEEE (2007)

    Google Scholar 

  4. Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-free trusted ICs: problem analysis and detection scheme. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1362–1365. ACM (2008)

    Google Scholar 

  5. Tehranipoor, M., Koushanfar, F.: A Survey of Hardware Trojan Taxonomy and Detection (2010)

    Google Scholar 

  6. Tehranipoor, M., Koushanfar, F.: A survey of hardware Trojan taxonomy and detection. IEEE Des. Test 27(1), 10–25 (2010)

    Article  Google Scholar 

  7. Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: IEEE International Symposium on Electromagnetic Compatibility (EMC 2015), pp. 246–251. IEEE (2015)

    Google Scholar 

  8. Du, D., Narasimhan, S., Chakraborty, R.S., Bhunia, S.: Self-referencing: a scalable side-channel approach for hardware Trojan detection. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 173–187. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  9. Torrance, R., James, D.: The state-of-the-art in semiconductor reverse engineering. In: Proceedings of the 48th Design Automation Conference, pp. 333–338. ACM (2011)

    Google Scholar 

  10. Bao, C., Forte, D., Srivastava, A.: On application of one-class SVM to reverse engineering-based hardware Trojan detection. In: 15th International Symposium on Quality Electronic Design (ISQED 2014), pp. 47–54. IEEE (2014)

    Google Scholar 

  11. Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: a statistical approach for hardware Trojan detection. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 396–410. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Liu, Y., Huang, K., Makris, Y.: Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In: Proceedings of the 51st Annual Design Automation Conference, pp. 1–6. ACM (2014)

    Google Scholar 

  13. D’Souza, A.L., Hsiao, M.S.: Error diagnosis of sequential circuits using region-based model. In: Fourteenth International Conference on VLSI Design, 2001, pp. 103–108. IEEE (2001)

    Google Scholar 

  14. Sanno, B.: Detecting Hardware Trojans. Ruhr-University Bochum, Bochum (2009)

    Google Scholar 

  15. Chown, P.: Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) (2002)

    Google Scholar 

  16. SAKURA-G Quick Start Guide. http://satoh.cs.uec.ac.jp/SAKURA/doc/SAKURA-G_Quik_Start_Guide_Ver1.0_English.pdf

  17. Xiao, K., Tehranipoor, M.: BISA: built-in self-authentication for preventing hardware Trojan insertion. In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST 2013), pp. 45–50. IEEE (2013)

    Google Scholar 

  18. Abramovici, M., Levin, P.: Protecting Integrated Circuits from Silicon Trojan Horses, January/February 2009

    Google Scholar 

Download references

Acknowledgment

This work was supported by the European Commission through the ICT program under contract FP7-ICT-2011-317930 HINT. The authors would like to thank Driss Aboulkassimi and David Cambon for their help in this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Karim M. Abdellatif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Abdellatif, K.M., Cornesse, C., Fournier, J., Robisson, B. (2016). New Partitioning Approach for Hardware Trojan Detection Using Side-Channel Measurements. In: Bonato, V., Bouganis, C., Gorgon, M. (eds) Applied Reconfigurable Computing. ARC 2016. Lecture Notes in Computer Science(), vol 9625. Springer, Cham. https://doi.org/10.1007/978-3-319-30481-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30481-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30480-9

  • Online ISBN: 978-3-319-30481-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics