Title | Hardware Trojan Detection Using Power Signal Foot Prints in Frequency Domain |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Maruthi, Vangalli, Balamurugan, Karthigha, Mohankumar, N. |
Conference Name | 2020 International Conference on Communication and Signal Processing (ICCSP) |
Keywords | composability, cyber physical security, cyber physical systems, delays, Frequency domain and Power footprints, frequency-domain analysis, Hardware, hardware security, Hardware Trojan (HT) detection, Logic gates, Power demand, Predictive Metrics, pubcrawl, resilience, Resiliency, Scalability, supply chain security, Time Frequency Analysis and Security, time-domain analysis, trojan horse detection, Trojan horses |
Abstract | This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of $μ$W) which are difficult to manipulate for HT detection using conventional methods. The proposed method utilizes the time domain power signals which is converted to frequency domain that represents the implausible signals and analyzed. The precision of HT detection is found to be increased because of the magnified power values in frequency domain. This work uses ISCAS89 bench mark circuits for conducting experiments. In this, the wide range of power values that spans from 695 $μ$W to 22.3 $μ$W are observed in frequency domain whereas the respective powers in time domain have narrow span of 2.29 $μ$W to 0.783 $μ$W which is unconvincing. This work uses the wide span of power values to identify HT and observed that the mid-band of frequencies have larger footprints than the side bands. These methods intend to help the designers in easy identification of HT even of single gate events. |
DOI | 10.1109/ICCSP48568.2020.9182134 |
Citation Key | maruthi_hardware_2020 |