ABSTRACT
This paper presents a stealthy triggering mechanism that reduces the dependencies of analog hardware Trojans on the frequent toggling of the software-controlled rare nets. The trigger to activate the Trojan is generated by using a glitch generation circuit and a clock signal, which increases the selectivity and feasibility of the trigger signal. The proposed trigger is able to evade the state-of-the-art run-time detection (R2D2) and Built-In Acceleration Structure (BIAS) schemes. Furthermore, the simulation results show that the proposed trigger circuit incurs a minimal overhead in side-channel footprints in terms of area (29 transistors), delay (less than 1ps in the clock cycle), and power (1μW).
- Md Mahbub Alam, Adib Nahiyan, Mehdi Sadi, Domenic Forte, and Mark Tehranipoor. 2020. Soft-HaT: Software-Based Silicon Reprogramming for Hardware Trojan Implementation. ACM TODAES (2020).Google ScholarDigital Library
- Mohammad-Mahdi Bidmeshki, Angelos Antonopoulos, and Yiorgos Makris. 2017. Information flow tracking in analog/mixed-signal designs through proof-carrying hardware IP. In DATE, 2017.Google Scholar
- Mohammad Mahdi Bidmeshki, Kiruba Sankaran Subramani, and Yiorgos Makris. 2019. Revisiting Capacitor-Based Trojan Design. In ICCD.Google Scholar
- Ding Deng, Yaohua Wang, and Yang Guo. 2020. Novel Design Strategy Toward A2 Trojan Detection Based on Built-In Acceleration Structure. IEEE TCAD (2020).Google ScholarCross Ref
- Domenic Forte, Chongxi Bao, and Ankur Srivastava. 2013. Temperature tracking: An innovative run-time approach for hardware Trojan detection. In 2013 IEEE/ACM ICCAD.Google Scholar
- Xiaolong Guo, Huifeng Zhu, Yier Jin, and Xuan Zhang. 2019. When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans. In 2019 DATE.Google Scholar
- Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, and Huaqiang Wu. 2019. On-Chip Analog Trojan Detection Framework for Microprocessor Trustworthiness. IEEE TCAD (2019).Google ScholarDigital Library
- Kai Huang, Yun He, and Xiaowen Jiang. 2019. Holistic hardware Trojan design of trigger and payload at gate level with rare switching signals eliminated. IEICE Electronics Express (2019).Google ScholarCross Ref
- S. Kelly, X. Zhang, M. Tehranipoor, et al. 2015. Detecting Hardware Trojans using On-chip Sensors in an ASIC Design. J Electron Test 31.Google Scholar
- Mohammad Nasim Imtaiz Khan, Asmit De, and Swaroop Ghosh. 2020. Cache-Out: Leaking Cache Memory Using Hardware Trojan. IEEE TVLSI (2020).Google Scholar
- Christian Kison, Omar Mohamed Awad, Marc Fyrbiak, and Christof Paar. 2019. Security Implications of Intentional Capacitive Crosstalk. IEEE TIFS (2019).Google Scholar
- He Li, Qiang Liu, and Jiliang Zhang. 2016. A survey of hardware Trojan threat and defense. Integration (2016).Google Scholar
- Jie Li and John Lach. 2008. At-speed delay characterization for IC authentication and Trojan Horse detection. In 2008 IEEE HOST.Google Scholar
- Yangdi Lyu and Prabhat Mishra. 2021. MaxSense. ACM TODAES (2021).Google Scholar
- Christian Pilato, Kanad Basu, Francesco Regazzoni, and Ramesh Karri. 2019. Black-Hat High-Level Synthesis: Myth or Reality? IEEE TVLSI (2019).Google Scholar
- Jan M Rabaey, Anantha P Chandrakasan, and Borivoje Nikolić 2003. Digital integrated circuits: a design perspective. Pearson edu. Upper Saddle River, NJ.Google Scholar
- Ashfaqur Rahman, Paul D Shepherd, Shaila A Bhuyan, Shamim Ahmed, Sai K Akula, Landon Caley, H Alan Mantooth, Jia Di, A Matthew Francis, and James A Holmes. 2015. A family of CMOS analog and mixed signal circuits in SiC for high temperature electronics. In 2015 IEEE Aerospace Conference. IEEE.Google ScholarCross Ref
- Kiruba Subramani, Georgios Volanis, Mohammad-Mahdi Bidmeshki, Angelos Antonopoulos, and Yiorgos Makris. 2019. Trusted and Secure Design of Analog/RF ICs: Recent Developments. In 2019 IEEE 25th IOLTS.Google Scholar
- Shmuel Wimer and Israel Koren. 2013. Design flow for flip-flop grouping in data-driven clock gating. IEEE TVLSI (2013).Google Scholar
- Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, and Dennis Sylvester. 2016. A2: Analog Malicious Hardware. In 2016 IEEE SSP.Google Scholar
- Tiancheng Yang, Ankit Mittal, Yunsi Fei, and Aatmesh Shrivastava. 2021. Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities. IEEE TVLSI (2021).Google Scholar
- Jie Zhang and Qiang Xu. 2013. On hardware Trojan design and implementation at register-transfer level. In 2013 IEEE HOST.Google Scholar
Recommendations
Delta: automatic identification of unknown web-based infection campaigns
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securityIdentifying malicious web sites has become a major challenge in today's Internet. Previous work focused on detecting if a web site is malicious by dynamically executing JavaScript in instrumented environments or by rendering web sites in client ...
A 1 V Second Order Sigma-Delta Modulator
Special issue on ICECS-99A second order switched capacitor sigma-delta modulator operating at a supply voltage of 1 V is presented. This low supply voltage restricts the gate overdrive voltage available for switching transistors. The design relies on the elimination of critical ...
A 0.6-V delta-sigma modulator with subthreshold-leakage suppression switches
A 0.6-V 34-µW delta-sigma modulator implemented by using a standard 0.13-µm complementary metal-oxide-semiconductor technology is presented. This brief analyzes a subthreshold-leakage current problem in switched-capacitor circuits and proposes ...
Comments