Abstract
System security has always been associated with the software being used on it. The hardware has been by default considered trusted. This root of trust for hardware has been violated after the emergence of Hardware Trojan (HT) attacks. Such attacks can be used by an adversary to leak important or secret information or to conduct a system failure. This paper gives a broad overview on different techniques that can be used to detect HT inside a circuit in place of destructive reverse engineering. Further a detailed literature survey has been presented which gives an overview of the efficiency of the detection techniques used in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247
Ngo XT, Hoang VP, Le Duc H (2018, November) Hardware trojan threat and its countermeasures. In: 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 35–40
Wang SJ, Wei JY, Huang SH, Li KSM (2016, December) Test generation for combinational hardware trojans. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6
Shende R, Ambawade DD (2016, July) A side channel based power analysis technique for hardware trojan detection using statistical learning approach. In: 2016 Thirteenth international conference on wireless and optical communications networks (WOCN). IEEE, pp 1–4
Sharifi E, Mohammadiasl K, Havasi M, Yazdani A (2015) Performance analysis of hardware trojan detection methods. Int J Open Inf Technol 3(5)
Cornell N, Nepal K (2017, August) Combinational hardware trojan detection using logic implications. In: 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 571–574
Kumar P, Srinivasan R (2014, March) Detection of hardware trojan in SEA using path delay. In: 2014 IEEE students’ conference on electrical, electronics and computer science. IEEE, pp 1–6
Hou B, He C, Wang L, En Y, Xie S (2014, August) Hardware trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International conference on reliability, maintainability and safety (ICRMS). IEEE, pp 1039–1042
Exurville I, Zussa L, Rigaud JB, Robisson B (2015, May) Resilient hardware trojans detection based on path delay measurements. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 151–156
Li J, Lach J (2008, June) At-speed delay characterization for IC authentication and trojan horse detection. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 8–14
Potkonjak M, Nahapetian A, Nelson M, Massey T (2009, July) Hardware trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE design automation conference. IEEE, pp 688–693
Jin Y, Makris Y (2008, June) Hardware trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 51–57
Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39
Kumagai J (2000) Chip detectives [reverse engineering]. IEEE Spectr 37(11):43–48
Collins DR (2008) Trust in integrated circuits. Defense advanced research projects agency Arlington VA microsystems technology office
Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007, May) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 296–310
Tehranipoor M, Koushanfar F (1900) A survey of hardware trojan taxonomy and detection. IEEE Ann Hist Comput 01:1
Chakraborty RS, Narasimhan S, Bhunia S (2009, November) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop. IEEE, pp 166–171
Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009, September) MERO: a statistical approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 396–410
Alkabani Y, Koushanfar F (2009, November) Consistency-based characterization for IC trojan detection. In: Proceedings of the 2009 international conference on computer-aided design, pp 123–127
Banga M, Hsiao MS (2009, July) VITAMIN: voltage inversion technique to ascertain malicious insertions in ICs. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 104–107
Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008, November) Power supply signal calibration techniques for improving detection resolution to hardware trojans. In: 2008 IEEE/ACM international conference on computer-aided design. IEEE, pp 632–639
Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008, October) Hardware trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE international symposium on defect and fault tolerance of VLSI systems. IEEE, pp 87–95
Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008, March) Towards trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, automation and test in Europe. IEEE, pp 1362–1365
Banga M, Hsiao MS (2008, June) A region based approach for the identification of hardware trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 40–47
Banga M, Hsiao MS (2009, January) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International conference on VLSI design. IEEE, pp 327–332
Karunakaran DK, Mohankumar N (2014, July) Malicious combinational hardware trojan detection by gate level characterization in 90 nm technology. In: Fifth international conference on computing, communications and networking technologies (ICCCNT). IEEE, pp 1–7
Lin L, Kasper M, Gneysu T, Paar C, Burleson W (2009, September) Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 382–395
Qin Y, Xia T (2017, October) Sensitivity analysis of ring oscillator based hardware trojan detection. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1979–1983
Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011, June) TeSR: a robust temporal self-referencing approach for hardware trojan detection. In: 2011 IEEE international symposium on hardware-oriented security and trust. IEEE, pp 71–74
Lin L, Burleson W, Paar C (2009, November) MOLES: malicious off-chip leakage enabled by side-channels. In: 2009 IEEE/ACM international conference on computer-aided design-digest of technical papers. IEEE, pp 117–122
Courbon F, Loubet-Moundi P, Fournier JJ, Tria A (2015, August) SEMBA: a SEM based acquisition technique for fast invasive hardware trojan detection. In: 2015 European conference on circuit theory and design (ECCTD). IEEE, pp 1–4
Vaikuntapu R, Bhargava L, Sahula V (2016, May) Golden IC free methodology for hardware trojan detection using symmetric path delays. In: 2016 20th International symposium on VLSI design and test (VDAT). IEEE, pp 1–2
Xia D, Zhu YF (2012, November) A research on detection algorithm of failure-type hardware trojan. In: 2012 Fourth international conference on multimedia information networking and security. IEEE, pp 918–921
Dhar T, Roy SK, Giri C (2019, January) Hardware trojan detection by stimulating transitions in rare nets. In: 2019 32nd international conference on VLSI design and 2019 18th international conference on embedded systems (VLSID). IEEE, pp 537–538
Salmani H, Tehranipoor M, Plusquellic J (2011) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(1):112–125
Qu K, Wu L, Zhang X (2015, December) A novel detection algorithm for ring oscillator network based hardware Trojan detection with tactful FPGA implementation. In: 2015 11th International conference on computational intelligence and security (CIS). IEEE, pp 299–302
Rad R, Plusquellic J, Tehranipoor M (2008, June) Sensitivity analysis to hard-ware trojans using power supply transient signals. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 3–7
Chipworks Inc. Semiconductor manufacturing reverse engineering of semiconductor components, parts and process. [Online]. Available: http://www.chipworks.com
Kash JA, Tsang JC, Knebel DR (2002) US Patent No 6,496,022. Washington, DC, US Patent and Trademark Office
Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, … Bhunia S (2012) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62(11):2183–2195
Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf forensics and Secur 5(4):893–904
Du D, Narasimhan S, Chakraborty RS, Bhunia S (2010, August) Self-referencing: a scalable side-channel approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 173–187
Rai D, Lach J (2009, July) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 58–65
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saini, A., Kundra, G., Kalra, S. (2021). A Survey on Hardware Trojan Detection: Alternatives to Destructive Reverse Engineering. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Ganzha, M., Rodrigues, J.J.P.C. (eds) Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 203. Springer, Singapore. https://doi.org/10.1007/978-981-16-0733-2_63
Download citation
DOI: https://doi.org/10.1007/978-981-16-0733-2_63
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-0732-5
Online ISBN: 978-981-16-0733-2
eBook Packages: EngineeringEngineering (R0)