skip to main content
10.1145/3135997.3135998acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfpgaworldConference Proceedingsconference-collections
research-article

Use of Analog Signatures for Hardware Trojan Detection

Published: 19 September 2017 Publication History

Abstract

Malicious Hardware Trojans can corrupt data which if undetected may cause serious harm. We propose a technique where characteristics of the data itself are used to detect Hardware Trojan (HT) attacks. In particular, we use a two-chip approach where we generate a data "signature" in analog and test for the signature in a partially reconfigurable digital microchip where the HT may attack. This paper presents an overall signature-based HT detection architecture and case study for cardiovascular signals used in medical device technology. Our results show that with minimal performance and area overhead, the proposed architecture is able to detect HT attacks on primary data inputs as well as on multiple modules of the design.

References

[1]
T. Wu, K. Ganesan, A. Hu, H. Wong, S. Wong, S. Mitra, "TPAD: Hardware Trojan Prevention and Detection for Trusted Integrated Circuits," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol.PP, no.99, pp. 1--17, August 2015.
[2]
M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10--25, Jan.-Feb. 2010.
[3]
T. Wehbe, V. J. Mooney, A. Q. Javaid and O. T. Inan, "A Novel Physiological Features-Assisted Architecture for Rapidly Distinguishing Health Problems from Hardware Trojan Attacks and Errors in Medical Devices," in IEEE Int'l Symp. on Hardware Oriented Security and Trust (HOST), Mclean, VA, USA, 2017, pp. 106--109.
[4]
T. Wehbe, V. J. Mooney, D. C. Keezer and N. Parham, "A Novel Approach to Detect Hardware Trojan Attacks on Primary Data Inputs," in Proc. of the Workshop on Embedded Systems Security (WESS), October 2015.
[5]
A. Gbade-Alabi, D. Keezer, V. Mooney, A. Poshmann, M. Stöttinger and K. Divekar, "A Signature Based Architecture for Trojan Detection," in Proc. of the Workshop on Embedded Systems Security (WESS), October 2014.
[6]
J. Francq and F. Frick, "Introduction to hardware trojan detection methods," Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 770--775, 2015.
[7]
S. Moein, J. Subramnian, T. A. Gulliver, F. Gebali and M. W. El-Kharashi, "Classification of hardware trojan detection techniques," 10th International Conference on Computer Engineering & Systems (ICCES), pp. 357--362, 2015.
[8]
O. T. Inan, P.-F. Migeotte, K.-S. Park, M. Etemadi, K. Tavakolian, R. Casanella, et al., "Ballistocardiography and Seismocardiography: A Review of Recent Advances," IEEE Journal of Biomedical and Health Informatics, 2014.
[9]
G. K. Prisk, S. Verhaeghe, D. Padeken, H. Hamacher, and M. Paiva, "Three-Dimensional Ballistocardiography and Respiratory Motion in Sustained Microgravity," Aviat Space Environ Med, vol. 72, pp. 1067--1074, 2001.
[10]
I. Starr, A. J. Rawson, H. A. Schroeder, and N. R. Joseph, "Studies on the estimation of cardiac output in man, and of abnormalities in cardiac function, from the heart's recoil and the blood's impacts; the ballistocardiogram," American Journal of Physiology, vol. 127, pp. 1--28, 1939.
[11]
B. Curtis, "Delivering security by design in the Internet of Things," IEEE Int'l Test Conference (ITC), pp. 1--1, 2014.
[12]
A. Q. Javaid, N. F. Fesmire, M. A. Weitnauer, and O. T. Inan, "Towards robust estimation of systolic time intervals using head-to-foot and dorso-ventral components of sternal acceleration signals," IEEE 12th Int'l Conf on Wearable and Implantable Body Sensor Networks (BSN), pp. 1--5, 2015.
[13]
H. Ashouri and O. T. Inan, "Improving the Accuracy of Proximal Timing Detection from Ballistocardiogram Signals using a High Bandwidth Force Plate," IEEE Biomedical and Health Informatics Conference, 2016.
[14]
R. F. Coughlin and R. S. Villanucci, Introductory Operational Amplifiers and Linear ICs: Theory and Experimentation. Harlow, United Kingdom: Pearson Education Limited, 1990.
[15]
A. Boganov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, "PRESENT: An Ultra-Lightweight Block Cipher," Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS, Springer-Verlag, September 2007.
[16]
NCSU 45nm FreePDK™ Process Design Kit. Electronic Design Automation, North Carolina State University. Available at: http://www.eda.ncsu.edu/wiki/FreePDK
[17]
A. H Syed, "Performance of Different Multipliers in the DesignWare Building Block IP," DesignWare Technical Bulletin Article, Synopsys Inc. Available at: https://www.synopsys.com/dw/dwtb.php?a=multiplier_bldg_block {Accessed on: April 8, 2016.

Cited By

View all
  • (2022)The Road-ahead for E-healthcare 4.0: A Review of Security Challenges2022 1st International Conference on Informatics (ICI)10.1109/ICI53355.2022.9786917(208-213)Online publication date: 14-Apr-2022
  • (2020)Privacy Attack On IoT: a Systematic Literature Review2020 International Conference on ICT for Smart Society (ICISS)10.1109/ICISS50791.2020.9307568(1-8)Online publication date: 19-Nov-2020
  • (2018)A chip-level security framework for assessing sensor data integrityProceedings of the International Conference on Hardware/Software Codesign and System Synthesis10.5555/3283568.3283588(1-2)Online publication date: 30-Sep-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
FPGAworld '17: Proceedings of the 14th FPGAworld Conference
September 2017
39 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 September 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Analog Signatures
  2. Ballistocardiography
  3. Hardware Trojans
  4. Reconfigurable Logic

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

FPGAworld '17
FPGAworld '17: The FPGAworld conference
September 19, 2017
Stockholm, Sweden

Acceptance Rates

Overall Acceptance Rate 4 of 6 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)The Road-ahead for E-healthcare 4.0: A Review of Security Challenges2022 1st International Conference on Informatics (ICI)10.1109/ICI53355.2022.9786917(208-213)Online publication date: 14-Apr-2022
  • (2020)Privacy Attack On IoT: a Systematic Literature Review2020 International Conference on ICT for Smart Society (ICISS)10.1109/ICISS50791.2020.9307568(1-8)Online publication date: 19-Nov-2020
  • (2018)A chip-level security framework for assessing sensor data integrityProceedings of the International Conference on Hardware/Software Codesign and System Synthesis10.5555/3283568.3283588(1-2)Online publication date: 30-Sep-2018
  • (2018)Work-in-Progress: A Chip-Level Security Framework for Assessing Sensor Data Integrity2018 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS)10.1109/CODESISSS.2018.8525858(1-2)Online publication date: Sep-2018
  • (2018)Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based SignaturesJournal of Hardware and Systems Security10.1007/s41635-018-0040-72:3(251-265)Online publication date: 19-Jun-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media