Abstract
The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive research activities have focused on finding appropriate solutions to prevent this issue. This paper proposes an approach to detect hardware Trojans using a design method for hardware security at runtime and during operation in the field. To this end, the operation of the circuit components is constantly monitored, and if there is a functionality violation for any reason, including an inserted hardware Trojan, it can be immediately detected and notified to the user. This is done by comparing the outputs of each part of the circuit that are prone to incorporate the Trojan’s payload by adversaries with the output of a circuit that imitates it. We show that by using this approach, we can find all of the Trojans that change the functionality of the attempted benchmarks even if they remain active for only a few nanoseconds. Besides, our approach does not need a golden chip and can be used for any type of digital chips.
















Similar content being viewed by others
References
Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: High Assurance Systems Engineering Symposium, IEEE, pp 117–124
Bloom G, Narahari B, Simha R (2009) OS support for detecting Trojan circuit attacks. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 100–103
Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247
DARPA TRUST Program Information, http://www.acq.osd.mil/dsb/reports/2005-02-HPMS_Report_Final.pdf
Lieberman J Whitepaper on National Security Aspects of the Global "Migration of the US Semiconductor Industry", http://lieberman.senate.gov/documents/whitepapers/semiconductor.pdf
Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39
Geiger D (2021) Innovation at risk: IP infringement challenges the semiconductor equipment industry, Jul 24, 2012, [Online]. https://www.semi.org/en/innovation-risk-ip-infringement-challenges-semiconductor-equipment-industry. [Accessed August, 14, 2021]
Hu W, Chang CH, Sengupta A, Bhunia S, Kastner R, Li H (2021) An overview of hardware security and trust: threats, countermeasures and design tools. Trans Comput-Aided Des Integr Circuits Syst, IEEE 40(6):1010–1038
Ngo XT, Danger JL, Guilley S, Najm Z, Emery O (2015) Hardware property checker for run-time hardware Trojan detection. In: Proceedings of the European Conference on Circuit Theory and Design (ECCTD), IEEE, pp 1–4
Kulkarni A, Pino Y, Mohsenin T (2016) SVM-based real-time hardware Trojan detection for many-core platform. In: International Symposium on Quality Electronic Design (ISQED), IEEE, pp 362–367
Elnaggar R, Chakrabarty K, Tahoori MB (2017) Run-time hardware Trojan detection using performance counters. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1–10
Hou Y, He H, Shamsi K, Jin Y, Wu D, Wu H (2018) R2D2: runtime reassurance and detection of A2 Trojan. In: International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, pp 195–200
Dubeuf J, Hély D, Karri R (2013) Run-time detection of hardware Trojans: the processor protection unit. In: European Test Symposium (ETS), IEEE, pp 1–6
Veeranna N, Schafer BC (2017) Trust filter: runtime hardware Trojan detection in behavioral MPSoCs. J Hardw Syst Secur, Springer, 1:56–67
Khalid F, Hasan SR, Zia S, Hasan O, Awwad F, Shafique M (2020) MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT Edge devices. Trans Comput-Aided Des Integr Circuits Syst, IEEE 39(11):3748–3761
Elnaggar R, Chakrabarty K, Tahoori MB (2019) Hardware trojan detection using changepoint-based anomaly detection techniques. Trans Very Large Scale Integr VLSI Syst IEEE 27(12):2706–2719
Cui X, Ma K, Shi L, Wu K (2014) High-level synthesis for run-time hardware Trojan detection and recovery. In: Proceedings of the Design Automation Conference (DAC), ACM/EDAC/IEEE, pp 1–6
Khalid F, Hasan SR, Hasan O, Awwad F (2018) Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integration 61:62–76
Hasan SR, Kamhoua CA, Kwiat KA, Njilla L (2016) Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. Asian Hardware-Oriented Security and Trust (AsianHOST), IEEE, pp 1–6
Khalid F, Hasan SR, Hasan O, Awwadl F (2017) Behavior profiling of power distribution networks for runtime hardware Trojan detection. In: International Midwest Symposium on Circuits and Systems (MWSCAS), IEEE, pp 1316–1319
Rivera LR, Wang X (2020) Run-time hardware Trojan detection and recovery for third-party IPs in SoC FPGAs. In: Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, pp 9–16
Frey J, Yu Q (2017) A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, Elsevier 56:15–31
JYV MK, Swain AK, Kumar S, Sahoo SR, Mahapatra K (2018) Run time mitigation of performance degradation hardware Trojan attacks in network on chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 738–743
Hussain M, Malekpour A, Guo H, Parameswaran S (2018) EETD: an energy efficient design for runtime hardware Trojan detection in untrusted network-on-chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 345–350
Wang K, Zheng H, Louri A (2020) TSA-NoC: learning-based threat detection and mitigation for secure network-on-chip architecture. Micro, IEEE 40(5):56–63
Alsaiari U, Gebali F (2019) Hardware trojan detection using reconfigurable assertion checkers. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(7):1575–1586
Faccenda RF, Caimi LL, Moraes FG (2021) Detection and countermeasures of security attacks and faults on noc-based many-cores. Access, IEEE 9:153142–153152
Danger JL, Fribourg L, Kühne U, Naceur M (2019) LAOCOÖN: A run-time monitoring and verification approach for hardware trojan detection. In: Proceedings of the Euromicro Conference on Digital System Design (DSD), IEEE, pp 269–276
Kapatsori C, Liu Y, Antonopoulos A, Makris Y (2018) Hardware dithering: a run-time method for trojan neutralization in wireless cryptographic ICs. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1–7
Mohd BJ, Abed S, Hayajneh T, Alshayeji MH (2021) Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection. IEEE Trans Dependable Secur Comput, IEEE 18(6):2689–2704
Abed S, Mohd BJ, Hayajneh T, Alshayeji MH (2021) Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int J Circuit Theory Appl 49(11):3607–3629
Wang J, Li Y (2021) RDAMS: an efficient run-time approach for memory fault and hardware trojans detection. Information 12(4):169
Zhu J et al (2021) Jintide: utilizing low-cost reconfigurable external monitors to substantially enhance hardware security of large-scale CPU clusters. J Solid-State Circuits, IEEE 56(8):2585–2601
Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: Proceedings of the International Conference on Computer-Aided Design (ICCAD), IEEE/ACM, pp 532–539
Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware Trojans. Trans Comput-Aided Design of Integr Circuits Syst, IEEE 34(10):1577–1585
Zhao H, Kwiat K, Kamhoua C, Rodriguez M (2015) Applying chaos theory for runtime hardware Trojan detection. In: Symposium on Computational Intelligence for Security and Defense Applications (CISDA), IEEE, pp 1–6
Zhao H, Kwiat L, Kwiat KA, Kamhoua CA, Njilla L (2020) Applying chaos theory for runtime hardware Trojan monitoring and detection. Trans Dependable Secur Comput, IEEE 17(4):716–729
Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 8–14
Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware Trojan detection based on logical testing. J Electron Test, Springer 33(4):381–395
Salvi SS, Jain A (2021) Detection of unusual thermal activities in a semiconductor chip using backside infrared thermal imaging. J Electron Packag. https://doi.org/10.1115/1.4049291
"SILVACO Library Design," [Online]. https://silvaco.com/services/library-design/. [Accessed; August 14, 2021].
Hassan S, Mark T (2021) Chip-level Trojan benchmarks. [Online]. https://www.trust-hub.org/#/home, [Accessed; August 14, 2021].
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Fani, R., Saheb Zamani, M. Runtime hardware Trojan detection by reconfigurable monitoring circuits. J Supercomput 78, 12726–12752 (2022). https://doi.org/10.1007/s11227-022-04362-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-022-04362-1