Visible to the public Hardware malicious circuit identification using self referencing approach

TitleHardware malicious circuit identification using self referencing approach
Publication TypeConference Paper
Year of Publication2017
AuthorsPriya, S. R., Swetha, P., Srigayathri, D., Sumedha, N., Priyatharishini, M.
Conference Name2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS)
Date Publishedaug
Keywordscomposability, cryptography, delays, Hardware, hardware malicious circuit identification, hardware Trojan detection sensitivity, invasive software, leakage power, logic testing, malicious inclusions, Metrics, Microelectronic Security, outsourced products, Payloads, post-silicon testing, Power measurement, pubcrawl, resilience, Resiliency, Robust Trojans, security vulnerabilities, self referencing approach, Sequential trojan, sequential Trojans, side channel analysis, Temporal Self Referencing, Test vector generation, Testing, Trojan horses
Abstract

Robust Trojans are inserted in outsourced products resulting in security vulnerabilities. Post-silicon testing is done mandatorily to detect such malicious inclusions. Logic testing becomes obsolete for larger circuits with sequential Trojans. For such cases, side channel analysis is an effective approach. The major challenge with the side channel analysis is reduction in hardware Trojan detection sensitivity due to process variation (process variation could lead to false positives and false negatives and it is unavoidable during a manufacturing stage). In this paper Self Referencing method is proposed that measures leakage power of the circuit at four different time windows that hammers the Trojan into triggering and also help to identify/eliminate false positives/false negatives due to process variation.

URLhttp://ieeexplore.ieee.org/document/8211602/
DOI10.1109/ICMDCS.2017.8211602
Citation Keypriya_hardware_2017