Visible to the public Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption

TitleHardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption
Publication TypeConference Paper
Year of Publication2020
AuthorsTang, Nan, Zhou, Wanting, Li, Lei, Yang, Ji, Li, Rui, He, Yuanhang
Conference Name2020 13th International Symposium on Computational Intelligence and Design (ISCID)
Date Publisheddec
KeywordsAES encryption circuit, composability, cyber physical security, cyber physical systems, Encryption, Fourier transform, frequency-domain analysis, Hardware, hardware trojan, Integrated circuit modeling, Mahalanobis distance, power analysis, Power demand, Predictive Metrics, pubcrawl, resilience, Resiliency, Scalability, supply chain security, Time Frequency Analysis and Security, time-domain analysis, trojan horse detection, Trojan horses
AbstractHardware security has long been an important issue in the current IC design. In this paper, a hardware Trojan detection method based on frequency domain characteristics of power consumption is proposed. For some HTs, it is difficult to detect based on the time domain characteristics, these types of hardware Trojan can be analyzed in the frequency domain, and Mahalanobis distance is used to classify designs with or without HTs. The experimental results demonstrate that taking 10% distance as the criterion, the hardware Trojan detection results in the frequency domain have almost no failure cases in all the tested designs.
DOI10.1109/ISCID51228.2020.00099
Citation Keytang_hardware_2020