Abstract
Emerging trend of outsourcing the design and fabrication services to external facilities as well as increasing reliance on third-party Intellectual Property (IP) cores and electronic design automation tools makes integrated circuits (ICs) increasingly vulnerable to hardware Trojan attacks at different stages of its life-cycle. Figure 15.1 shows the modern IC design, fabrication, test, and deployment stages highlighting the level of trust at each stage. This scenario raises a new set of challenges for trust validation with respect to malicious design modification at various stages of an IC life-cycle, where untrusted components/personnel are involved [1]. In particular, it brings in the requirement for reliable detection of malicious design modification made in an untrusted fabrication facility, during post-manufacturing test. It also imposes a requirement for trust validation in IP cores obtained from untrusted thirdparty vendors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
DARPA (2007) TRUST in Integrated Circuits (TIC). http://www.darpa.mil/MTO/solicitations/baa07--24. Accessed 15 Sept. 2008
Lin L et al. (2009) Trojan side-channels: lightweight hardware Trojans through side-channel engineering. In: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
Chipworks, Inc., Semiconductor Manufacturing – Reverse Engineering of Semiconductor components, parts and process. http://www.chipworks.com. Accessed 20 July 2011
Abramovici M, Bradley P (2009) Integrated circuit security – New threats and solutions. In: Proceedings of Workshop on Cyber Security and Information Intelligence Research, pp 1–3
Bloom G, Narahari B, Simha R (2009) OS support for detecting Trojan circuit attacks. In:Â Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust
Hicks M, Finnicum M, King ST, Martin MMK, Smith JM (2010) Overcoming an untrusted computing base: detecting and removing malicious hardware automatically. In: Proceedings of the IEEE Symposium on Security and Privacy
McIntyre D, Wolff F, Papachristou C, Bhunia S (2009) Dynamic evaluation of hardware trust. In: Proceedings of the IEEE InternationalWorkshop on Hardware-Oriented Security and Trust
Chakraborty RS et al. (2009) MERO: a statistical approach for hardware Trojan detection. In:Â Proc Workshop on Cryptographic Hardware and Embedded Systems
Jha S, Jha SK (2008) Randomization based probabilistic approach to detect Trojan circuits. In: Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, pp 117–124
Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting Trojans though leakage current analysis using multiple supply pad IDDQs. In: Proceedings of the IEEE Transactional Information Forensics and Security
Alkabani Y, Koushanfar F (2009) Consistency-based characterization for IC Trojan detection. In: Proceedings of the International Conference on Computer-Aided Design
Potkonjak M, Nahapetian A, Nelson M, Massey T (2009) Hardware Trojan horse detection using gate-level characterization. In: Proceedings of the Design Automation Conference
Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007) Trojan detection using IC fingerprinting. In: Proceedings of the Symposium on Security and Privacy pp 296–310
Banga M, Hsiao M (2008) A region based approach for the identification of hardware Trojans. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust
Banga M, Hsiao M (2009) A novel sustained vector technique for the detection of hardware Trojans. In: Proceedings of the International Conference on VLSI Design
Salmani H, Tehranipoor M, Plusquellic J (2010) A layout-aware approach for improving localized switching to detect hardware Trojans in Integrated Circuits. In: Proceedings of the IEEE International Test Conference
Du D, Narasimhan S, Chakraborty RS, Bhunia S (2010) Self-referencing: a scalable side-channel approach for hardware Trojan detection. In: Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems
Jin Y, Makris Y (2008) Hardware Trojan detection using path delay fingerprint. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust
Li J, Lach J (2008) At-speed delay characterization for IC authentication and Trojan horse detection. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, pp 8–14
Narasimhan S et al. (2010) Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach. In: Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust
Tehranipoor M, Koushanfar F (2010) A survey of hardware Trojan taxonomy and detection. IEEE Design Test Comput 27(1): 10–25
Borkar S et al. (2003) Parameter variations and impact on circuits and microarchitecture. In: Proceedings of the Design Automation Conference, pp 338–342
Pomeranz I, Reddy SM (2004) A measure of quality for n-detection test sets. IEEE Trans Comput 53(11): 1497–1503
Chakraborty RS, Bhunia S (2009) Security against hardware Trojan through a novel application of design obfuscation. In: Proceedings of the International Conference on Computer-Aided Design
Chakraborty RS, Paul S, Bhunia S (2008) On-demand transparency for improving hardware Trojan detectability. In: Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, pp 48–50
Rad R, Plusquellic J, Tehranipoor M (2010) A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Transaction on Very Large Scale Integration Systems
Smith S, Di J (2007) Detecting malicious logic through structural checking. In: Proceedings of IEEE Region 5 Technical Conference
Potkonjak M (2010) Synthesis of trustable ICs using untrusted CAD tools. In: Proceedings of Design Automation Conference
Banga M, Hsiao M (2010) Trusted RTL: Trojan detection methodology in pre-silicon designs. In: Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust
Ali S, Mukhopadhyay D, Chakraborty RS, Bhunia S (2011) Multi-level attack: an emerging threat model for cryptographic hardware. In: Proc Design Automation and Test in Europe
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Narasimhan, S., Bhunia, S. (2012). Hardware Trojan Detection. In: Tehranipoor, M., Wang, C. (eds) Introduction to Hardware Security and Trust. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-8080-9_15
Download citation
DOI: https://doi.org/10.1007/978-1-4419-8080-9_15
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-8079-3
Online ISBN: 978-1-4419-8080-9
eBook Packages: EngineeringEngineering (R0)