Skip to main content

Wire Load Variation-Based Hardware Trojan Detection Using Machine Learning Techniques

  • Conference paper
  • First Online:
Soft Computing and Signal Processing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 900))

Abstract

Detection of malicious form of hardware is commonly referred to as hardware Trojan and had become a major challenge. Especially when we go down to deep submicron technology, it becomes really difficult to detect the presence of Trojan using conventional testing approaches. Logic testing proves to be effective only when the number of inputs to trigger the Trojan is of small number. Further using side-channel approaches, the complexity of triggering the entire Trojan circuit is reduced because partial activation of Trojan will cause a considerable change in the measured parameter that is used to differentiate between the original circuit and circuit infected with Trojan. This work provides a non-invasive hardware Trojan detection methodology which uses side-channel power of the circuit to detect the presence of the Trojan. Moreover, the proposed method deviates from other existing techniques by accounting the change in side-channel power, due to interconnects that is the distributed resistance and capacitance of the wire connecting different standard cells in the circuit, by taking wire load variations into consideration. The power profile from Trojan-infected and Trojan-free circuits is used for training the machine. The machine predicts with much accuracy whether the circuit consists of Trojan or not based on data we have trained, therefore effectively categorizing the circuits and thus eliminating the errors caused due to manual intervention. The proposed work is validated by using ISCAS 85 and ISCAS 89 benchmark circuits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. R.S. Chakraborty, F. Wolff, S. Paul, MERO: a statistical approach for hardware Trojan detection, in Proceedings of Cryptographic Hardware and Embedded Systems Workshop (2009), pp. 396–410

    Google Scholar 

  2. A. Thakur, P. Sivaraj, R. Periasamy, N. Mohankumar, Hardware Trojan detection-a survey, in 4th National Conference on Recent Trends in Communication Computation and Signal Processing (2013), pp. 99–102

    Google Scholar 

  3. X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in HOST (2011)

    Google Scholar 

  4. D. Karunakaran, N. Mohankumar, Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology, in Proceeding of International Conference on Computing, Communications and Networking Technology (2014), pp. 1–7. https://doi.org/10.1109/icccnt.2014.6963036

  5. P.K. Maneesh, M. Nirmala Devi, Power based self-referencing scheme for hardware Trojan detection and diagnosis. Indian J. Sci. Technol. 8(24) (2015)

    Google Scholar 

  6. A. Kulkarni, Y. Pino, T. Mohsenin, Svm-based real-time hardware Trojan detection for many-core platform, in 2016 17th International Symposium on Quality Electronic Design (ISQED) (2016)

    Google Scholar 

  7. T. Iwase, Y. Nozaki, M. Yoshikawa, T. Kumaki, Detection technique for hardware Trojans using machine learning in frequency domain, in 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE) (2015), pp. 185–186

    Google Scholar 

  8. S. Kamala Nandhini et.al., Delay-based reference free hardware Trojan detection using virtual intelligence, in 4th International Conference on Information System Design and Intelligent Applications, (India–2017) (Vietnam, 2017)https://doi.org/10.1007/978-981-10-7512-4_50

    Google Scholar 

  9. V.R.R. Koneru, B.K. Teja, K.D.B. Reddy, M.V. GnanaSwaroop, B. Ramanidharan, N. Mohankumar, HAPMAD.: hardware-based authentication platform for malicious activity detection in digital circuits, Advances in Intelligent Systems and Computing, vol. 672 (Springer, Singapore, 2018). https://doi.org/10.1007/978-981-10-7512-4_60

    Chapter  Google Scholar 

  10. R. Bharath et al., Malicious circuit detection for improved hardware security, in SSCC 2015. Communications in Computer and Information Science, vol. 536 (2015). https://doi.org/10.1007/978-3-319-22915-7_42

    Google Scholar 

  11. G. Aishwarya, H. Revalla, S. Shruthi, V.P. Ananth, N. Mohankumar, Virtual instrumentation-based malicious circuit detection using weighted average voting, in Electromagnetics and Telecommunications, Proceedings of ICMEET 2017, vol. 471, p. 423 (2018). https://doi.org/10.1007/978-981-10-7329-8_43

    Google Scholar 

  12. N. Mohankumar, M. Jayakumar, M.N. Devi, MCRC-based hardware Trojan detection for improved hardware security, in Electromagnetics and Telecommunications. Lecture notes in electrical engineering, vol. 471 (Springer, Singapore, 2018). https://doi.org/10.1007/978-981-10-7329-8_39

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Mohankumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Suresh Babu, N., Mohankumar, N. (2019). Wire Load Variation-Based Hardware Trojan Detection Using Machine Learning Techniques. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_58

Download citation

Publish with us

Policies and ethics