Detection of hardware Trojan in SEA using path delay
Title | Detection of hardware Trojan in SEA using path delay |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Kumar, P., Srinivasan, R. |
Conference Name | Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students' Conference on |
Date Published | March |
Keywords | Algorithm design and analysis, application specific integrated circuits, ASIC design flow, cryptography, delays, Encryption, fabless design house, gate level Trojan insertions, GDSII, GDSII hard macros, Hardware, hardware Trojan detection, Hardware Trojan horses (HTH), hardware Trojan horses insertion, HTH detection and insertion, invasive software, IP blocks, layout level Trojan insertions, logic circuits, Logic gates, path delay, payload Trojan, payload Trojan detection rate, Scalable Encryption Algorithm (SEA), scalable encryption algorithm crypto, SEA crypto, Trojan circuits, Trojan horses |
Abstract | Detecting hardware Trojan is a difficult task in general. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by Trojan during the foundry stage. In this paper we analyzed hardware Trojan horses insertion and detection in Scalable Encryption Algorithm (SEA) crypto. We inserted Trojan at different levels in the ASIC design flow of SEA crypto and most importantly we focused on Gate level and layout level Trojan insertions. We choose path delays in order to detect Trojan at both levels in design phase. Because the path delays detection technique is cost effective and efficient method to detect Trojan. The comparison of path delays makes small Trojan circuits significant from a delay point of view. We used typical, fast and slow 90nm libraries in order to estimate the efficiency of path delay technique in different operating conditions. The experiment's results show that the detection rate on payload Trojan is 100%. |
DOI | 10.1109/SCEECS.2014.6804444 |
Citation Key | 6804444 |
- HTH detection and insertion
- Trojan horses
- Trojan circuits
- SEA crypto
- scalable encryption algorithm crypto
- Scalable Encryption Algorithm (SEA)
- payload Trojan detection rate
- payload Trojan
- path delay
- Logic gates
- logic circuits
- layout level Trojan insertions
- IP blocks
- invasive software
- Algorithm design and analysis
- hardware Trojan horses insertion
- Hardware Trojan horses (HTH)
- hardware Trojan detection
- Hardware
- GDSII hard macros
- GDSII
- gate level Trojan insertions
- fabless design house
- encryption
- delays
- Cryptography
- ASIC design flow
- application specific integrated circuits