skip to main content
research-article

Detection of trojans using a combined ring oscillator network and off-chip transient power analysis

Published: 08 October 2013 Publication History

Abstract

Verifying the trustworthiness of Integrated Circuits (ICs) is of utmost importance, as hardware Trojans may destroy ICs bound for critical applications. A novel methodology combining on-chip structure with external current measurements is proposed to verify whether or not an IC is Trojan free. This method considers Trojans' impact on neighboring cells and on the entire IC's power consumption, and effectively localizes the measurement of dynamic power. To achieve this, we develop a new on-chip ring oscillator network structure distributed across the entire chip and place each ring oscillator's components in different rows of a standard-cell design. By developing novel statistical data analysis, the effect of process variations on the ICs' transient power will be separated from the effect of Trojans. Simulation results using 90nm technology and experimental results on Xilinx Spartan-6 FPGAs demonstrate the efficiency of our proposed method.

References

[1]
Abramovici, M. and Bradley, P. 2009. Integrated circuit security: New threats and solutions. In Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 13--15.
[2]
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., and Sunar, B. 2007. Trojan detection using ic finger-printing. In Proceedings of the IEEE Symposium on Security and Privacy (SP'07). 296--310.
[3]
Banga, M. and Hsiao, M. 2008. A region based approach for the identification of hardware trojans. In Proceedings of the IEEE International Workshop on Hardware Oriented Security and Trust (HOST'08). 40--47.
[4]
Bushnell, M. and Agrawal, V. 2004. Types of testing. In Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits. Kluwer Academic, 21--24.
[5]
Di, J. and Smith, S. 2007. A hardware threat modeling concept for trustable integrated circuits. In Proceedings of the IEEE Region 5 Technical Conference.
[6]
Digilentinc.Com. 2010. http://digilentinc.com/Products/Detail.cfm?NavPath=2,66,828&Prod=ADEPT2.
[7]
Embabi, S. H. K. 1993. Digital BiCMOS Integrated Circuit Design. Kluwer.
[8]
Iwls Org. 2005. http://iwls.org/iwls2005/benchmarks.html.
[9]
Jha, S. and Jha, S. K. 2008. Randomization based probabilistic approach to detect trojan circuits. In Proceedings of the IEEE High Assurance System Engineering Symposium (HASE'08). 117--124.
[10]
Jin, Y. and Makris, Y. 2008. Hardware trojan detection using path delay fingerprint. In Proceedings of the IEEE International Workshop on Hardware Oriented Security and Trust (HOST'08). 1--57.
[11]
Jolliffe, I. T. 2002. Principal Component Analysis 2nd Ed. Springer.
[12]
Leinweber, L., Papachristou, C. A., and Bhunia, S. 2008. Towards trojan-free trusted ics: Problem analysis and detection scheme. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'08). 1362--1365.
[13]
Li, J. and Lach, J. 2008. At-speed delay characterization for ic authentication and trojan horse detection. In Proceedings of the IEEE International Workshop on Hardware Oriented Security and Trust (HOST'08). 8--14.
[14]
Narasimhan, S., Du, D., Chakraborty, R., Paul, S., Wolff, F., Papachristou, C., Roy, K., and Bhunia, S. 2010. Multiple-parameter side-channel analysis: A non-invasive hardware trojan detection approach. In Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust (HOST'10). 13--18.
[15]
Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics. 2005. Report of the defense science board task force on high performance microchip supply. Defense Science Board, US Department of Defense. http://www.acq.osd.mil/dsb/reports/2005-02-HPMSi Report Final.pdf.
[16]
Potkonjak, M., Nahapetian, A., Nelson, M., and Massey, T. 2009. Hardware trojan horse detection using gate-level characterization. In Proceedings of the Design Automation Conference (DAC'09). ACM Press, New York, 688--693.
[17]
Preparata, F. P. and Hong, S. J. 1977. Convex hulls of finite sets of points in two and three dimensions. Comm. ACM 20, 2, 87--93.
[18]
Rabaey, J. M., Chandrakasan, A., and Nikolic, B. 2003. Digital Integrated Circuits: A Design Perspective 2nd Ed. Prentice Hall.
[19]
Rad, R. M., Plusquellic, J., and Tehranipoor, M. 2008a. Sensitivity analysis to hardware trojans using power supply transient signals. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08). 3--7.
[20]
Rad, R. M., Wang, X., Tehranipoor, M., and Plusquellic, J. 2008b. Power supply signal calibration techniques for improving detection resolution to hardware trojans. In Proceedings of the IEEE International Conference on Computer-Aided Design. 10--13.
[21]
Sakurai, T. and Newton, R. 1990. Alpha-power law mosfet model and its applications to cmos inverter delay and other formulas. IEEE J. Solid-State Circ. 25, 2, 584--594.
[22]
Salmani, H., Tehranipoor, M., and Plusquellic, J. 2012. A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans. VLSI 22, 1, 112--125.
[23]
Tehranipoor, M. and Koushanfar, F. 2010. A survey of hardware trojan taxonomy and detection. IEEE Des. Test Comput. 27, 1, 10--25.
[24]
Tehranipoor, M., Salmani, H., Zhang, X., Wang, X., and Karri, R. 2011. Trustworthy hardware: Trojan detection and design-for-trust challenges. IEEE Comput. 44, 7, 66--74.
[25]
Wang, X., Tehranipoor, M., and Plusquellic, J. 2008a. Detecting malicious inclusions in secure hardware: Challenges and solutions. In Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08). 15--19.
[26]
Wang, X., Salmani, H., Tehranipoor, M., and Plusquellic, J. 2008b. Hardware trojan detection and isolation using current integration and localized current analysis. In Proceedingsof the IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (DFTVS'08). 87--95.
[27]
Wolff, F., Papachristou, C., Bhunia, S., and Chakraborty, R. S. 2008. Towards trojan-free trusted ics: Problem analysis and detection scheme. In Proceedings of the Design, Automation and Test in Europe Conference and Exhibition (DATE'08). 1362--1365.
[28]
Zhang, X. and Tehranipoor, M. 2011. RON: An on-chip ring oscillator network for hardware trojan detection. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE'11).
[29]
Zhao, S., Roy, K., and Koh, C.-K. 2000. Frequency domain analysis of switching noise on power supply network. ECE Tech. rep. 23. http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1023&context=ecetr.

Cited By

View all
  • (2024)Optimized and Automated Secure IC Design Flow: A Defense-in-Depth ApproachIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.336416071:5(2031-2044)Online publication date: May-2024
  • (2023)Assuring Netlist-to-Bitstream Equivalence using Physical Netlist Generation and Structural Comparison2023 International Conference on Field Programmable Technology (ICFPT)10.1109/ICFPT59805.2023.00021(142-151)Online publication date: 12-Dec-2023
  • (2021)Approaches for FPGA Design AssuranceACM Transactions on Reconfigurable Technology and Systems10.1145/349123315:3(1-29)Online publication date: 27-Dec-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Journal on Emerging Technologies in Computing Systems
ACM Journal on Emerging Technologies in Computing Systems  Volume 9, Issue 3
September 2013
196 pages
ISSN:1550-4832
EISSN:1550-4840
DOI:10.1145/2533711
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 08 October 2013
Accepted: 01 May 2012
Revised: 01 March 2012
Received: 01 October 2011
Published in JETC Volume 9, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hardware Trojan detection
  2. on-chip sensor
  3. process variations
  4. ring oscillators

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Optimized and Automated Secure IC Design Flow: A Defense-in-Depth ApproachIEEE Transactions on Circuits and Systems I: Regular Papers10.1109/TCSI.2024.336416071:5(2031-2044)Online publication date: May-2024
  • (2023)Assuring Netlist-to-Bitstream Equivalence using Physical Netlist Generation and Structural Comparison2023 International Conference on Field Programmable Technology (ICFPT)10.1109/ICFPT59805.2023.00021(142-151)Online publication date: 12-Dec-2023
  • (2021)Approaches for FPGA Design AssuranceACM Transactions on Reconfigurable Technology and Systems10.1145/349123315:3(1-29)Online publication date: 27-Dec-2021
  • (2021)Hardware Trojan Detection using Ring Oscillator2021 6th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES51350.2021.9488935(362-368)Online publication date: 8-Jul-2021
  • (2020)Towards secure composition of integrated circuits and electronic systemsProceedings of the 23rd Conference on Design, Automation and Test in Europe10.5555/3408352.3408468(508-513)Online publication date: 9-Mar-2020
  • (2020)Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE48585.2020.9116483(508-513)Online publication date: Mar-2020
  • (2020)Securing IoT Space via Hardware Trojan DetectionIEEE Internet of Things Journal10.1109/JIOT.2020.29946277:11(11115-11122)Online publication date: Nov-2020
  • (2020)IR-drop calibration for Hardware Trojan detection2020 13th International Symposium on Computational Intelligence and Design (ISCID)10.1109/ISCID51228.2020.00101(418-421)Online publication date: Dec-2020
  • (2020)Broadside ATPG for Low Power Trojans Detection using Built-in Current Sensors2020 IEEE 26th International Symposium on On-Line Testing and Robust System Design (IOLTS)10.1109/IOLTS50870.2020.9159713(1-3)Online publication date: Jul-2020
  • (2019)Surviving Information Leakage Hardware Trojan Attacks Using Hardware IsolationIEEE Transactions on Emerging Topics in Computing10.1109/TETC.2017.26487397:2(253-261)Online publication date: 1-Apr-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media