Skip to main content
Log in

Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

Processor is the core chip of modern information system, which is severely threatened by hardware Trojan. Side-channel analysis is the most promising method for hardware Trojan detection. However, most existing detection methods require golden chips as reference, which significantly increases the test cost and complexity. In this paper, we propose a golden-free detection method that exploits the bit power consistency of processor. For the data activated processor hardware Trojan, the power model of processor is modified. Two decomposition methods of power signal are proposed: the differential bit power consistency analysis and the contradictory equations solution. With the proposed method, each bit power can be calculated. The bit consistency based detection algorithms are proposed, the deviation boundaries are obtained by statistical analysis. Experimental measurements were done on field programmable gate array chip with open source 8051 core and hardware Trojans. The results showed that the differences between the two methods were very small. The data activated processor hardware Trojans were detected successfully.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bhunia S, Hsiao MS, Banga M (2014) Hardware Trojan attacks: threat analysis and countermeasures. P IEEE 102(8):1229–1247. https://doi.org/10.1109/JPROC.2014.2334493

    Article  Google Scholar 

  2. He J, Zhao Y, Guo X, Jin Y (2017) Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Trans Very Large Scale Integr (VLSI) Syst 99:2939–2948. https://doi.org/10.1109/TVLSI.2017.2727985

    Article  Google Scholar 

  3. Hoque T, Narasimhan S, Wang X et al (2017) Golden-free hardware Trojan detection with high sensitivity under process noise. J Electron Test 33:107:107–107:124. https://doi.org/10.1007/s10836-016-5632-y

    Article  Google Scholar 

  4. King ST, Tucek J, Cozzie A, Grier C, Jiang W, Zhou Y (2008) Designing and implementing malicious hardware. In: Workshop on large-scale exploits and emergent threats (LEET), pp 31–37

    Google Scholar 

  5. Kocher P, Jaffe J, Jun B, Rohatgi P (2011) Introduction to differential power analysis. J Cryptogr Eng 1(1):5–27. https://doi.org/10.1007/s13389-011-0006-y

    Article  Google Scholar 

  6. Liu Y, Huang K, Makris Y (2014) Hardware Trojan detection through golden Chip-free statistical Side-Channel fingerprinting. Design Automation Conference (DAC):1–6. https://doi.org/10.1145/2593069.2593147

  7. Mangard S, Oswald E, Popp T (2007) Power analysis attacks: revealing the secrets of smart cards. Springer, New York

    MATH  Google Scholar 

  8. Narasimhan S, Wang X, Du D et al (2011) TeSR: a robust temporal self-referencing approach for hardware Trojan detection. IEEE Int Sym Hardware-Oriented Security & Trust (HOST):71–74. https://doi.org/10.1109/HST.2011.5954999

  9. NYU Cyber-Security Awareness Week. Embedded Systems Challenge, Available: http://www.poly.edu/csaw-embedded.

  10. Reece T, Limbrick DB, Wang X (2012) Stealth assessment of hardware Trojans in a microcontroller. Int Conf Computer Design:139–142. https://doi.org/10.1109/ICCD.2012.6378631

  11. Santos J, Fei Y (2012) Designing and implementing a malicious 8051 processor. Int Sym Defect and Fault Tolerance VLSI & Nanotechnology Systems (DFT):63–66. https://doi.org/10.1109/DFT.2012.6378201

  12. Strobel D, Oswald D, Richter B et al (2014) Microcontrollers as (in) security devices for pervasive computing applications. P IEEE 102(8):1157–1173. https://doi.org/10.1109/JPROC.2014.2325397

    Article  Google Scholar 

  13. Tehranipoor M, Salmani H, Zhang X (2014) Integrated Circuit Authentication. Springer Berlin. https://doi.org/10.1007/978-3-319-00816-5.

  14. Trust HUB organization (2016) Hardware Trojan benchmarks. Available: http://trust-hub.org/resources/benchmarks. Accessed Nov 2016

  15. Wei S, Potkonjak M (2011) Scalable consistency-based hardware trojan detection and diagnosis. Int Conf Network & System Security:176–183. https://doi.org/10.1109/ICNSS.2011.6059998

  16. Wei S, Potkonjak M (2012) Scalable hardware Trojan diagnosis. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(6):1049–1057. https://doi.org/10.1109/TVLSI.2011.2147341

    Article  Google Scholar 

  17. Wei S, Nahapetian A, Nelson M, et al (2012) Gate Characterization Using Singular Value Decomposition: Foundations and Applications [J]. IEEE Trans. Information Forensics & Security, 7(2):765–773. https://doi.org/10.1109/TIFS.2011.2181500

  18. Xiao K, Forte D, Jin Y et al (2016) Hardware Trojans: lessons learned after one decade of research. ACM Trans Des Autom Electron Syst 22(1):6. https://doi.org/10.1145/2906147

    Article  Google Scholar 

  19. Xue MF, Wang J, Hu AQ (2016) An enhanced classification-based golden chips-free hardware Trojan detection technique. IEEE Asian Hardware-Oriented Security and Trust (AsianHOST):1–6. https://doi.org/10.1109/AsianHOST.2016.7835553

  20. Yang K, Hicks M, Dong Q, Austin T, Sylvester D (2016) A2: analog malicious hardware. IEEE Sym Security and Privacy (SP):18–37. https://doi.org/10.1109/SP.2016.10

  21. Yoshimizu N (2014) Hardware trojan detection by symmetry breaking in path delays. In IEEE Int Sym Hardware-Oriented Security & Trust (HOST):107–111. https://doi.org/10.1109/HST.2014.6855579

  22. Zheng Y, Yang S, Bhunia S (2015) SeMIA: Self-Similarity based IC Integrity Analysis. IEEE Trans Computer-Aided Design of Integr Circuits & Syst 35(1):1–1. https://doi.org/10.1109/TCAD.2015.2449231

Download references

Acknowledgements

This work was supported in part by the Young Scientists Fund of the National Natural Science Foundation of China (Grant No.61602505) and the National Natural Science Foundation of China (Grant Nos. 51377170 and 61271152).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Zhang.

Additional information

Responsible Editor: M. Barragan and K. Huang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y., Quan, H., Li, X. et al. Golden-Free Processor Hardware Trojan Detection Using Bit Power Consistency Analysis. J Electron Test 34, 305–312 (2018). https://doi.org/10.1007/s10836-018-5715-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-018-5715-z

Keywords

Navigation