Skip to main content

A Survey on Hardware Trojan Detection: Alternatives to Destructive Reverse Engineering

  • Conference paper
  • First Online:
Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 203))

Abstract

System security has always been associated with the software being used on it. The hardware has been by default considered trusted. This root of trust for hardware has been violated after the emergence of Hardware Trojan (HT) attacks. Such attacks can be used by an adversary to leak important or secret information or to conduct a system failure. This paper gives a broad overview on different techniques that can be used to detect HT inside a circuit in place of destructive reverse engineering. Further a detailed literature survey has been presented which gives an overview of the efficiency of the detection techniques used in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bhunia S, Hsiao MS, Banga M, Narasimhan S (2014) Hardware trojan attacks: threat analysis and countermeasures. Proc IEEE 102(8):1229–1247

    Article  Google Scholar 

  2. Ngo XT, Hoang VP, Le Duc H (2018, November) Hardware trojan threat and its countermeasures. In: 5th NAFOSTED conference on information and computer science (NICS). IEEE, pp 35–40

    Google Scholar 

  3. Wang SJ, Wei JY, Huang SH, Li KSM (2016, December) Test generation for combinational hardware trojans. In: 2016 IEEE Asian hardware-oriented security and trust (AsianHOST). IEEE, pp 1–6

    Google Scholar 

  4. Shende R, Ambawade DD (2016, July) A side channel based power analysis technique for hardware trojan detection using statistical learning approach. In: 2016 Thirteenth international conference on wireless and optical communications networks (WOCN). IEEE, pp 1–4

    Google Scholar 

  5. Sharifi E, Mohammadiasl K, Havasi M, Yazdani A (2015) Performance analysis of hardware trojan detection methods. Int J Open Inf Technol 3(5)

    Google Scholar 

  6. Cornell N, Nepal K (2017, August) Combinational hardware trojan detection using logic implications. In: 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS). IEEE, pp 571–574

    Google Scholar 

  7. Kumar P, Srinivasan R (2014, March) Detection of hardware trojan in SEA using path delay. In: 2014 IEEE students’ conference on electrical, electronics and computer science. IEEE, pp 1–6

    Google Scholar 

  8. Hou B, He C, Wang L, En Y, Xie S (2014, August) Hardware trojan detection via current measurement: a method immune to process variation effects. In: 2014 10th International conference on reliability, maintainability and safety (ICRMS). IEEE, pp 1039–1042

    Google Scholar 

  9. Exurville I, Zussa L, Rigaud JB, Robisson B (2015, May) Resilient hardware trojans detection based on path delay measurements. In: 2015 IEEE international symposium on hardware oriented security and trust (HOST). IEEE, pp 151–156

    Google Scholar 

  10. Li J, Lach J (2008, June) At-speed delay characterization for IC authentication and trojan horse detection. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 8–14

    Google Scholar 

  11. Potkonjak M, Nahapetian A, Nelson M, Massey T (2009, July) Hardware trojan horse detection using gate-level characterization. In: 2009 46th ACM/IEEE design automation conference. IEEE, pp 688–693

    Google Scholar 

  12. Jin Y, Makris Y (2008, June) Hardware trojan detection using path delay fingerprint. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 51–57

    Google Scholar 

  13. Adee S (2008) The hunt for the kill switch. IEEE Spectr 45(5):34–39

    Google Scholar 

  14. Kumagai J (2000) Chip detectives [reverse engineering]. IEEE Spectr 37(11):43–48

    Article  Google Scholar 

  15. Collins DR (2008) Trust in integrated circuits. Defense advanced research projects agency Arlington VA microsystems technology office

    Google Scholar 

  16. Agrawal D, Baktir S, Karakoyunlu D, Rohatgi P, Sunar B (2007, May) Trojan detection using IC fingerprinting. In: 2007 IEEE symposium on security and privacy (SP’07). IEEE, pp 296–310

    Google Scholar 

  17. Tehranipoor M, Koushanfar F (1900) A survey of hardware trojan taxonomy and detection. IEEE Ann Hist Comput 01:1

    Google Scholar 

  18. Chakraborty RS, Narasimhan S, Bhunia S (2009, November) Hardware trojan: threats and emerging solutions. In: 2009 IEEE international high level design validation and test workshop. IEEE, pp 166–171

    Google Scholar 

  19. Chakraborty RS, Wolff F, Paul S, Papachristou C, Bhunia S (2009, September) MERO: a statistical approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 396–410

    Google Scholar 

  20. Alkabani Y, Koushanfar F (2009, November) Consistency-based characterization for IC trojan detection. In: Proceedings of the 2009 international conference on computer-aided design, pp 123–127

    Google Scholar 

  21. Banga M, Hsiao MS (2009, July) VITAMIN: voltage inversion technique to ascertain malicious insertions in ICs. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 104–107

    Google Scholar 

  22. Rad RM, Wang X, Tehranipoor M, Plusquellic J (2008, November) Power supply signal calibration techniques for improving detection resolution to hardware trojans. In: 2008 IEEE/ACM international conference on computer-aided design. IEEE, pp 632–639

    Google Scholar 

  23. Wang X, Salmani H, Tehranipoor M, Plusquellic J (2008, October) Hardware trojan detection and isolation using current integration and localized current analysis. In: 2008 IEEE international symposium on defect and fault tolerance of VLSI systems. IEEE, pp 87–95

    Google Scholar 

  24. Wolff F, Papachristou C, Bhunia S, Chakraborty RS (2008, March) Towards trojan-free trusted ICs: problem analysis and detection scheme. In: 2008 Design, automation and test in Europe. IEEE, pp 1362–1365

    Google Scholar 

  25. Banga M, Hsiao MS (2008, June) A region based approach for the identification of hardware trojans. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 40–47

    Google Scholar 

  26. Banga M, Hsiao MS (2009, January) A novel sustained vector technique for the detection of hardware trojans. In: 2009 22nd International conference on VLSI design. IEEE, pp 327–332

    Google Scholar 

  27. Karunakaran DK, Mohankumar N (2014, July) Malicious combinational hardware trojan detection by gate level characterization in 90 nm technology. In: Fifth international conference on computing, communications and networking technologies (ICCCNT). IEEE, pp 1–7

    Google Scholar 

  28. https://www.trust-hub.org

  29. Lin L, Kasper M, Gneysu T, Paar C, Burleson W (2009, September) Trojan side-channels: lightweight hardware trojans through side-channel engineering. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 382–395

    Google Scholar 

  30. Qin Y, Xia T (2017, October) Sensitivity analysis of ring oscillator based hardware trojan detection. In: 2017 IEEE 17th international conference on communication technology (ICCT). IEEE, pp 1979–1983

    Google Scholar 

  31. Narasimhan S, Wang X, Du D, Chakraborty RS, Bhunia S (2011, June) TeSR: a robust temporal self-referencing approach for hardware trojan detection. In: 2011 IEEE international symposium on hardware-oriented security and trust. IEEE, pp 71–74

    Google Scholar 

  32. Lin L, Burleson W, Paar C (2009, November) MOLES: malicious off-chip leakage enabled by side-channels. In: 2009 IEEE/ACM international conference on computer-aided design-digest of technical papers. IEEE, pp 117–122

    Google Scholar 

  33. Courbon F, Loubet-Moundi P, Fournier JJ, Tria A (2015, August) SEMBA: a SEM based acquisition technique for fast invasive hardware trojan detection. In: 2015 European conference on circuit theory and design (ECCTD). IEEE, pp 1–4

    Google Scholar 

  34. Vaikuntapu R, Bhargava L, Sahula V (2016, May) Golden IC free methodology for hardware trojan detection using symmetric path delays. In: 2016 20th International symposium on VLSI design and test (VDAT). IEEE, pp 1–2

    Google Scholar 

  35. Xia D, Zhu YF (2012, November) A research on detection algorithm of failure-type hardware trojan. In: 2012 Fourth international conference on multimedia information networking and security. IEEE, pp 918–921

    Google Scholar 

  36. Dhar T, Roy SK, Giri C (2019, January) Hardware trojan detection by stimulating transitions in rare nets. In: 2019 32nd international conference on VLSI design and 2019 18th international conference on embedded systems (VLSID). IEEE, pp 537–538

    Google Scholar 

  37. Salmani H, Tehranipoor M, Plusquellic J (2011) A novel technique for improving hardware trojan detection and reducing trojan activation time. IEEE Trans Very Large Scale Integr (VLSI) Syst 20(1):112–125

    Google Scholar 

  38. Qu K, Wu L, Zhang X (2015, December) A novel detection algorithm for ring oscillator network based hardware Trojan detection with tactful FPGA implementation. In: 2015 11th International conference on computational intelligence and security (CIS). IEEE, pp 299–302

    Google Scholar 

  39. Rad R, Plusquellic J, Tehranipoor M (2008, June) Sensitivity analysis to hard-ware trojans using power supply transient signals. In: 2008 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 3–7

    Google Scholar 

  40. Chipworks Inc. Semiconductor manufacturing reverse engineering of semiconductor components, parts and process. [Online]. Available: http://www.chipworks.com

  41. Kash JA, Tsang JC, Knebel DR (2002) US Patent No 6,496,022. Washington, DC, US Patent and Trademark Office

    Google Scholar 

  42. Narasimhan S, Du D, Chakraborty RS, Paul S, Wolff FG, Papachristou CA, … Bhunia S (2012) Hardware trojan detection by multiple-parameter side-channel analysis. IEEE Trans Comput 62(11):2183–2195

    Google Scholar 

  43. Aarestad J, Acharyya D, Rad R, Plusquellic J (2010) Detecting trojans through leakage current analysis using multiple supply pad IDDQs. IEEE Trans Inf forensics and Secur 5(4):893–904

    Article  Google Scholar 

  44. Du D, Narasimhan S, Chakraborty RS, Bhunia S (2010, August) Self-referencing: a scalable side-channel approach for hardware trojan detection. In: International workshop on cryptographic hardware and embedded systems. Springer, Berlin, pp 173–187

    Google Scholar 

  45. Rai D, Lach J (2009, July) Performance of delay-based trojan detection techniques under parameter variations. In: 2009 IEEE international workshop on hardware-oriented security and trust. IEEE, pp 58–65

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shruti Kalra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saini, A., Kundra, G., Kalra, S. (2021). A Survey on Hardware Trojan Detection: Alternatives to Destructive Reverse Engineering. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Ganzha, M., Rodrigues, J.J.P.C. (eds) Proceedings of Second International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems, vol 203. Springer, Singapore. https://doi.org/10.1007/978-981-16-0733-2_63

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-0733-2_63

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-0732-5

  • Online ISBN: 978-981-16-0733-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics