skip to main content
10.1145/1366110.1366196acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
poster

Guided test generation for isolation and detection of embedded trojans in ics

Published: 04 May 2008 Publication History

Abstract

Testing the genuineness of a manufactured chip is an important step in an IC product life cycle. This becomes more prominent with the outsourcing of the manufacturing process, since the manufacturer may tamper the internal circuit behavior using Trojan circuits in the original design. Traditional testing methods cannot detect these stealthy Trojans because the triggering scenario, which activates it, is unknown. Recently, approaches based on side-channel analysis have shown promising results in detecting Trojans. In this paper, we propose a novel test generation technique that aims at magnifying the disparity between side-channel signal waveforms of tampered and genuine circuits to indicate the possibility of internal tampering. Experimental results indicate that our approach could magnify the likelihood of Trojans 4 to 20 times more than existing side-channel analysis based approaches.

References

[1]
D. Agarwal, S. Baktir, D. Karakoy, P. Rohatgi, B. Sunar, "Trojan Detection using IC Fingerprinting", IBM Research Report, 2006.
[2]
K. Nowaka, G. Carpenter, F. Gebara, J. Schaub, D. Agarwal, P. Rohatgi, W. E. Hall, S. Baktir, D. Karakoyunlu, B. Sunar, "IC Fingerprinting and Stable IS Sensors for Enhanced IC Trust, 2006.
[3]
S. Pilli, S. S. Sapatnekar, "Power estimation considering statistical IC parametric variations"; ISCAS 1997, pp. 1524 -- 1527, vol.3.
[4]
C. Fagot, O. Gascuel, P. Girard, C. Landrault, "On Calculating Efficient LFSR Seeds for Built-In Self Test"; Proc. Of European Test Workshop, 1999, pp 7--14.
[5]
G. Hetherington, T. Fryars, N. Tamarapalli, M. Kassab, A. Hassan, J. Rajski, "Logic BIST for large industrial designs: real issues and case studies"; ITC, 1999, pp. 358--367.
[6]
W.-T. Cheng; M. Sharma; T. Rinderknecht, C. Hill, "Signature Based Diagnosis for Logic BIST"; ITC 2006, Oct. 2006, pp. 1--9.
[7]
L. J. Kohout, A. Yasinsac, E. McDuffie, "Activity profiles for intrusion detection" ; Fuzzy Information Processing Society, 2002. pp. 463--468.
[8]
W. Li; S. M. Reddy, I. Pomeranz, "On reducing peak current and power during test"; Proc. IEEE computer society annual symposium, 2005, pp. 156--161.
[9]
D. Agarwal. et al, "The EM side-channel(s)" CHES 2002, v 2523 Lecture Notes on Computer Science, Springer-Verlag, pp. 29--45, 2002.
[10]
F. N. Najm, "Transition density: a new measure of activity in digital circuits;", IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, Vol 12, Issue 2, Feb. 1993 pp. 310--323.

Cited By

View all
  • (2024)Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00160(3789-3804)Online publication date: 19-May-2024
  • (2023)GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247697(1-6)Online publication date: 9-Jul-2023
  • (2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
  • Show More Cited By

Index Terms

  1. Guided test generation for isolation and detection of embedded trojans in ics

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI
      May 2008
      480 pages
      ISBN:9781595939999
      DOI:10.1145/1366110
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 May 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tag

      1. trojan

      Qualifiers

      • Poster

      Conference

      GLSVLSI08
      Sponsor:
      GLSVLSI08: Great Lakes Symposium on VLSI 2008
      May 4 - 6, 2008
      Florida, Orlando, USA

      Acceptance Rates

      Overall Acceptance Rate 312 of 1,156 submissions, 27%

      Upcoming Conference

      GLSVLSI '25
      Great Lakes Symposium on VLSI 2025
      June 30 - July 2, 2025
      New Orleans , LA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 15 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Rethinking IC Layout Vulnerability: Simulation-Based Hardware Trojan Threat Assessment with High Fidelity2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00160(3789-3804)Online publication date: 19-May-2024
      • (2023)GDSII-Guard: ECO Anti-Trojan Optimization with Exploratory Timing-Security Trade-Offs2023 60th ACM/IEEE Design Automation Conference (DAC)10.1109/DAC56929.2023.10247697(1-6)Online publication date: 9-Jul-2023
      • (2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
      • (2021)An Overview of Hardware Security and Trust: Threats, Countermeasures, and Design ToolsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2020.304797640:6(1010-1038)Online publication date: Jun-2021
      • (2021)Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00052(970-986)Online publication date: May-2021
      • (2021)Jintide: Utilizing Low-Cost Reconfigurable External Monitors to Substantially Enhance Hardware Security of Large-Scale CPU ClustersIEEE Journal of Solid-State Circuits10.1109/JSSC.2021.305855156:8(2585-2601)Online publication date: Aug-2021
      • (2021)Hardware Trojan Detection using Ring Oscillator2021 6th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES51350.2021.9488935(362-368)Online publication date: 8-Jul-2021
      • (2020)SoKProceedings of the 4th ACM Workshop on Attacks and Solutions in Hardware Security10.1145/3411504.3421211(103-116)Online publication date: 13-Nov-2020
      • (2020)Analytical Estimation and Localization of Hardware Trojan Vulnerability in RTL Designs2020 21st International Symposium on Quality Electronic Design (ISQED)10.1109/ISQED48828.2020.9137024(149-154)Online publication date: Mar-2020
      • (2020)Broadside ATPG for Low Power Trojans Detection using Built-in Current Sensors2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS50870.2020.9159713(1-3)Online publication date: Jul-2020
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media