Title | Hardware Trojan Detection Method Based on the Frequency Domain Characteristics of Power Consumption |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Tang, Nan, Zhou, Wanting, Li, Lei, Yang, Ji, Li, Rui, He, Yuanhang |
Conference Name | 2020 13th International Symposium on Computational Intelligence and Design (ISCID) |
Date Published | dec |
Keywords | AES encryption circuit, composability, cyber physical security, cyber physical systems, Encryption, Fourier transform, frequency-domain analysis, Hardware, hardware trojan, Integrated circuit modeling, Mahalanobis distance, power analysis, Power demand, Predictive Metrics, pubcrawl, resilience, Resiliency, Scalability, supply chain security, Time Frequency Analysis and Security, time-domain analysis, trojan horse detection, Trojan horses |
Abstract | Hardware security has long been an important issue in the current IC design. In this paper, a hardware Trojan detection method based on frequency domain characteristics of power consumption is proposed. For some HTs, it is difficult to detect based on the time domain characteristics, these types of hardware Trojan can be analyzed in the frequency domain, and Mahalanobis distance is used to classify designs with or without HTs. The experimental results demonstrate that taking 10% distance as the criterion, the hardware Trojan detection results in the frequency domain have almost no failure cases in all the tested designs. |
DOI | 10.1109/ISCID51228.2020.00099 |
Citation Key | tang_hardware_2020 |