Skip to main content
Log in

Runtime hardware Trojan detection by reconfigurable monitoring circuits

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The trustability of integrated circuits (ICs) has become a serious issue due to the outsourcing of IC manufacturing to third-party foundries. Given reports of IC tampering, extensive research activities have focused on finding appropriate solutions to prevent this issue. This paper proposes an approach to detect hardware Trojans using a design method for hardware security at runtime and during operation in the field. To this end, the operation of the circuit components is constantly monitored, and if there is a functionality violation for any reason, including an inserted hardware Trojan, it can be immediately detected and notified to the user. This is done by comparing the outputs of each part of the circuit that are prone to incorporate the Trojan’s payload by adversaries with the output of a circuit that imitates it. We show that by using this approach, we can find all of the Trojans that change the functionality of the attempted benchmarks even if they remain active for only a few nanoseconds. Besides, our approach does not need a golden chip and can be used for any type of digital chips.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: High Assurance Systems Engineering Symposium, IEEE, pp 117–124

  2. Bloom G, Narahari B, Simha R (2009) OS support for detecting Trojan circuit attacks. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 100–103

  3. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247

    Article  Google Scholar 

  4. DARPA TRUST Program Information, http://www.acq.osd.mil/dsb/reports/2005-02-HPMS_Report_Final.pdf

  5. Lieberman J Whitepaper on National Security Aspects of the Global "Migration of the US Semiconductor Industry", http://lieberman.senate.gov/documents/whitepapers/semiconductor.pdf

  6. Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39

    Article  Google Scholar 

  7. Geiger D (2021) Innovation at risk: IP infringement challenges the semiconductor equipment industry, Jul 24, 2012, [Online]. https://www.semi.org/en/innovation-risk-ip-infringement-challenges-semiconductor-equipment-industry. [Accessed August, 14, 2021]

  8. Hu W, Chang CH, Sengupta A, Bhunia S, Kastner R, Li H (2021) An overview of hardware security and trust: threats, countermeasures and design tools. Trans Comput-Aided Des Integr Circuits Syst, IEEE 40(6):1010–1038

    Article  Google Scholar 

  9. Ngo XT, Danger JL, Guilley S, Najm Z, Emery O (2015) Hardware property checker for run-time hardware Trojan detection. In: Proceedings of the European Conference on Circuit Theory and Design (ECCTD), IEEE, pp 1–4

  10. Kulkarni A, Pino Y, Mohsenin T (2016) SVM-based real-time hardware Trojan detection for many-core platform. In: International Symposium on Quality Electronic Design (ISQED), IEEE, pp 362–367

  11. Elnaggar R, Chakrabarty K, Tahoori MB (2017) Run-time hardware Trojan detection using performance counters. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1–10

  12. Hou Y, He H, Shamsi K, Jin Y, Wu D, Wu H (2018) R2D2: runtime reassurance and detection of A2 Trojan. In: International Symposium on Hardware Oriented Security and Trust (HOST), IEEE, pp 195–200

  13. Dubeuf J, Hély D, Karri R (2013) Run-time detection of hardware Trojans: the processor protection unit. In: European Test Symposium (ETS), IEEE, pp 1–6

  14. Veeranna N, Schafer BC (2017) Trust filter: runtime hardware Trojan detection in behavioral MPSoCs. J Hardw Syst Secur, Springer, 1:56–67

    Article  Google Scholar 

  15. Khalid F, Hasan SR, Zia S, Hasan O, Awwad F, Shafique M (2020) MacLeR: machine learning-based runtime hardware trojan detection in resource-constrained IoT Edge devices. Trans Comput-Aided Des Integr Circuits Syst, IEEE 39(11):3748–3761

    Article  Google Scholar 

  16. Elnaggar R, Chakrabarty K, Tahoori MB (2019) Hardware trojan detection using changepoint-based anomaly detection techniques. Trans Very Large Scale Integr VLSI Syst IEEE 27(12):2706–2719

    Article  Google Scholar 

  17. Cui X, Ma K, Shi L, Wu K (2014) High-level synthesis for run-time hardware Trojan detection and recovery. In: Proceedings of the Design Automation Conference (DAC), ACM/EDAC/IEEE, pp 1–6

  18. Khalid F, Hasan SR, Hasan O, Awwad F (2018) Runtime hardware Trojan monitors through modeling burst mode communication using formal verification. Integration 61:62–76

    Article  Google Scholar 

  19. Hasan SR, Kamhoua CA, Kwiat KA, Njilla L (2016) Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors. Asian Hardware-Oriented Security and Trust (AsianHOST), IEEE, pp 1–6

  20. Khalid F, Hasan SR, Hasan O, Awwadl F (2017) Behavior profiling of power distribution networks for runtime hardware Trojan detection. In: International Midwest Symposium on Circuits and Systems (MWSCAS), IEEE, pp 1316–1319

  21. Rivera LR, Wang X (2020) Run-time hardware Trojan detection and recovery for third-party IPs in SoC FPGAs. In: Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC), IEEE, pp 9–16

  22. Frey J, Yu Q (2017) A hardened network-on-chip design using runtime hardware Trojan mitigation methods. Integration, Elsevier 56:15–31

    Google Scholar 

  23. JYV MK, Swain AK, Kumar S, Sahoo SR, Mahapatra K (2018) Run time mitigation of performance degradation hardware Trojan attacks in network on chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 738–743

  24. Hussain M, Malekpour A, Guo H, Parameswaran S (2018) EETD: an energy efficient design for runtime hardware Trojan detection in untrusted network-on-chip. In: Computer Society Annual Symposium on VLSI (ISVLSI), IEEE, pp 345–350

  25. Wang K, Zheng H, Louri A (2020) TSA-NoC: learning-based threat detection and mitigation for secure network-on-chip architecture. Micro, IEEE 40(5):56–63

    Article  Google Scholar 

  26. Alsaiari U, Gebali F (2019) Hardware trojan detection using reconfigurable assertion checkers. IEEE Trans Very Large Scale Integr (VLSI) Syst 27(7):1575–1586

    Article  Google Scholar 

  27. Faccenda RF, Caimi LL, Moraes FG (2021) Detection and countermeasures of security attacks and faults on noc-based many-cores. Access, IEEE 9:153142–153152

    Article  Google Scholar 

  28. Danger JL, Fribourg L, Kühne U, Naceur M (2019) LAOCOÖN: A run-time monitoring and verification approach for hardware trojan detection. In: Proceedings of the Euromicro Conference on Digital System Design (DSD), IEEE, pp 269–276

  29. Kapatsori C, Liu Y, Antonopoulos A, Makris Y (2018) Hardware dithering: a run-time method for trojan neutralization in wireless cryptographic ICs. In: Proceedings of the International Test Conference (ITC), IEEE, pp 1–7

  30. Mohd BJ, Abed S, Hayajneh T, Alshayeji MH (2021) Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection. IEEE Trans Dependable Secur Comput, IEEE 18(6):2689–2704

    Article  Google Scholar 

  31. Abed S, Mohd BJ, Hayajneh T, Alshayeji MH (2021) Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int J Circuit Theory Appl 49(11):3607–3629

    Article  Google Scholar 

  32. Wang J, Li Y (2021) RDAMS: an efficient run-time approach for memory fault and hardware trojans detection. Information 12(4):169

    Article  MathSciNet  Google Scholar 

  33. Zhu J et al (2021) Jintide: utilizing low-cost reconfigurable external monitors to substantially enhance hardware security of large-scale CPU clusters. J Solid-State Circuits, IEEE 56(8):2585–2601

    Article  Google Scholar 

  34. Forte D, Bao C, Srivastava A (2013) Temperature tracking: an innovative run-time approach for hardware Trojan detection. In: Proceedings of the International Conference on Computer-Aided Design (ICCAD), IEEE/ACM, pp 532–539

  35. Bao C, Forte D, Srivastava A (2015) Temperature tracking: toward robust run-time detection of hardware Trojans. Trans Comput-Aided Design of Integr Circuits Syst, IEEE 34(10):1577–1585

    Article  Google Scholar 

  36. Zhao H, Kwiat K, Kamhoua C, Rodriguez M (2015) Applying chaos theory for runtime hardware Trojan detection. In: Symposium on Computational Intelligence for Security and Defense Applications (CISDA), IEEE, pp 1–6

  37. Zhao H, Kwiat L, Kwiat KA, Kamhoua CA, Njilla L (2020) Applying chaos theory for runtime hardware Trojan monitoring and detection. Trans Dependable Secur Comput, IEEE 17(4):716–729

    Article  Google Scholar 

  38. Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: International Workshop on Hardware-Oriented Security and Trust, IEEE, pp 8–14

  39. Bazzazi A, Shalmani MTM, Hemmatyar AMA (2017) Hardware Trojan detection based on logical testing. J Electron Test, Springer 33(4):381–395

    Article  Google Scholar 

  40. Salvi SS, Jain A (2021) Detection of unusual thermal activities in a semiconductor chip using backside infrared thermal imaging. J Electron Packag. https://doi.org/10.1115/1.4049291

    Article  Google Scholar 

  41. "SILVACO Library Design," [Online]. https://silvaco.com/services/library-design/. [Accessed; August 14, 2021].

  42. Hassan S, Mark T (2021) Chip-level Trojan benchmarks. [Online]. https://www.trust-hub.org/#/home, [Accessed; August 14, 2021].

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Morteza Saheb Zamani.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fani, R., Saheb Zamani, M. Runtime hardware Trojan detection by reconfigurable monitoring circuits. J Supercomput 78, 12726–12752 (2022). https://doi.org/10.1007/s11227-022-04362-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-022-04362-1

Keywords

Navigation