Hardware malicious circuit identification using self referencing approach
Title | Hardware malicious circuit identification using self referencing approach |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Priya, S. R., Swetha, P., Srigayathri, D., Sumedha, N., Priyatharishini, M. |
Conference Name | 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS) |
Date Published | aug |
Keywords | composability, cryptography, delays, Hardware, hardware malicious circuit identification, hardware Trojan detection sensitivity, invasive software, leakage power, logic testing, malicious inclusions, Metrics, Microelectronic Security, outsourced products, Payloads, post-silicon testing, Power measurement, pubcrawl, resilience, Resiliency, Robust Trojans, security vulnerabilities, self referencing approach, Sequential trojan, sequential Trojans, side channel analysis, Temporal Self Referencing, Test vector generation, Testing, Trojan horses |
Abstract | Robust Trojans are inserted in outsourced products resulting in security vulnerabilities. Post-silicon testing is done mandatorily to detect such malicious inclusions. Logic testing becomes obsolete for larger circuits with sequential Trojans. For such cases, side channel analysis is an effective approach. The major challenge with the side channel analysis is reduction in hardware Trojan detection sensitivity due to process variation (process variation could lead to false positives and false negatives and it is unavoidable during a manufacturing stage). In this paper Self Referencing method is proposed that measures leakage power of the circuit at four different time windows that hammers the Trojan into triggering and also help to identify/eliminate false positives/false negatives due to process variation. |
URL | http://ieeexplore.ieee.org/document/8211602/ |
DOI | 10.1109/ICMDCS.2017.8211602 |
Citation Key | priya_hardware_2017 |
- post-silicon testing
- Trojan horses
- testing
- Test vector generation
- Temporal Self Referencing
- side channel analysis
- sequential Trojans
- Sequential trojan
- self referencing approach
- security vulnerabilities
- Robust Trojans
- Resiliency
- resilience
- pubcrawl
- Power measurement
- composability
- Payloads
- outsourced products
- Microelectronic Security
- Metrics
- malicious inclusions
- logic testing
- leakage power
- invasive software
- hardware Trojan detection sensitivity
- hardware malicious circuit identification
- Hardware
- delays
- Cryptography