Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Title | Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Khalid, F., Hasan, S. R., Hasan, O., Awwadl, F. |
Conference Name | 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS) |
ISBN Number | 978-1-5090-6389-5 |
Keywords | behavior profiling, circuit under test, classical Advanced Encryption Standard circuit, composability, cryptography, cyber physical systems, digital power profile, golden data model, Hardware, integrated circuits, Intrusion detection, invasive software, IP based SoC, manufacturing test phase, mission critical applications, Monitoring, power distribution networks, pubcrawl, resilience, Resiliency, Runtime, runtime hardware Trojan detection techniques, simple processing mechanism, system-on-chip, Temperature sensors, traditional techniques, trojan horse detection, Trojan horses |
Abstract | Runtime hardware Trojan detection techniques are required in third party IP based SoCs as a last line of defense. Traditional techniques rely on golden data model or exotic signal processing techniques such as utilizing Choas theory or machine learning. Due to cumbersome implementation of such techniques, it is highly impractical to embed them on the hardware, which is a requirement in some mission critical applications. In this paper, we propose a methodology that generates a digital power profile during the manufacturing test phase of the circuit under test. A simple processing mechanism, which requires minimal computation of measured power signals, is proposed. For the proof of concept, we have applied the proposed methodology on a classical Advanced Encryption Standard circuit with 21 available Trojans. The experimental results show that the proposed methodology is able to detect 75% of the intrusions with the potential of implementing the detection mechanism on-chip with minimal overhead compared to the state-of-the-art techniques. |
URL | https://ieeexplore.ieee.org/document/8053173/ |
DOI | 10.1109/MWSCAS.2017.8053173 |
Citation Key | khalid_behavior_2017 |
- mission critical applications
- Trojan horses
- trojan horse detection
- traditional techniques
- Temperature sensors
- system-on-chip
- simple processing mechanism
- runtime hardware Trojan detection techniques
- Runtime
- Resiliency
- resilience
- pubcrawl
- power distribution networks
- Monitoring
- behavior profiling
- manufacturing test phase
- IP based SoC
- invasive software
- Intrusion Detection
- integrated circuits
- Hardware
- golden data model
- digital power profile
- cyber physical systems
- Cryptography
- composability
- classical Advanced Encryption Standard circuit
- circuit under test