skip to main content
10.1145/3199478.3199480acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Data Activated Processor Hardware Trojan Detection Using Differential Bit Power Analysis

Published: 16 March 2018 Publication History

Abstract

Processor is the core chip of modern information processing system, which is seriously threatened by hardware Trojan. Side-channel analysis is the most promising method for hardware Trojan detection. However, most existing side-channel based detection approaches require golden chips as reference, which significantly increases the test cost and complexity. In this paper, we present a novel differential bit power analysis method which can detect data activated processor hardware Trojan without the need of golden chips or models. The proposed method exploits the intrinsic consistency of bit powers to detect outliers impacted by hardware Trojans. Data related power model of processor is amended. Differential bit power analysis program is proposed. Experimental measurements are done on field programmable gate array chip with open source 8051 processor and hardware Trojans. The effectiveness of propose method is proved by experiment results.

References

[1]
Bhunia, S., Hsiao, M.S., and Banga, M. 2014. Hardware Trojan Attacks: Threat Analysis and Countermeasures. Proceedings of the IEEE, 102(8), 1229--1247.
[2]
King, S. T., Tucek, J., Cozzie, A., et al. 2008. Designing and implementing malicious hardware. USENIX Workshop on Large-Scale Exploits and Emergent Threats(San Francisco, CA, USA, April 2008). IEEE, New York, NY, 31--37.
[3]
NYU Cyber-Security Awareness Week: Embedded Systems Challenge. http://www.poly.edu/csaw-embedded
[4]
Reece, T., Limbrick, D. B., Wang, X., et al. 2012. Stealth assessment of hardware Trojans in a microcontroller. International Conference on Computer Design. IEEE Computer Society, 2012:139--142.
[5]
Santos, J. and Fei, Y. 2012. Designing and implementing a Malicious 8051 processor. IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (Austin, TX, USA, October 2012). DFT '12. 63--66.
[6]
Yang, K., Hicks, M., Dong, Q., Austin, T., and Sylvester, D. 2016. A2: Analog Malicious Hardware, IEEE Symposium on Security and Privacy(San Jose, CA, USA). SP '16. IEEE, New York, NY, 18--37.
[7]
Wei, S. and Potkonjak, M. 2012. Scalable hardware Trojan diagnosis, IEEE Trans. Very Large Scale Integr. (VLSI) Syst., 2012, 20(6), 1049--1057.
[8]
Liu, Y., Huang, K., and Makris, Y. 2014. Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting. In Design Automation Conference (San Francisco, CA, USA, June 2014). DAC '14. IEEE, New York, NY, 1--6.
[9]
Hoque, T., Narasimhan, S., Wang, X., Mal-Sarkar, S., and Bhunia, S. 2017. Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise. J Electron Test, 33(107), 107--124.
[10]
Osborn, C. G. 2010. Embedded Microcontrollers and Processor Design. Prentice Hall, London.
[11]
Kocher, P., Jaffe, J., Jun, B., et al. 2011. Introduction to differential power analysis. J. Cryptogr. Eng., 1(1), 5--27.
[12]
Tehranipoor, M., Salmani, H., Zhang, X. 2014. Integrated Circuit Authentication. Springer International Publishing, Switzerland.
[13]
Trust HUB organization. Hardware Trojan benchmarks, http://trust-hub.org/resources/benchmarks, accessed November 2016.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy
March 2018
187 pages
ISBN:9781450363617
DOI:10.1145/3199478
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Wuhan Univ.: Wuhan University, China
  • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 March 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Hardware Trojan
  2. bit power consistency
  3. differential bit power analysis
  4. golden free
  5. side-channel

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • National Natural Science Foundation of China

Conference

ICCSP 2018

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 55
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media