Skip to main content

Reverse Engineering-Based Hardware Trojan Detection

  • Chapter
  • First Online:
The Hardware Trojan War

Abstract

Reverse engineering of integrated circuits is the process of examining and analyzing the internal structures of the chip to extract the schematic or reveal some information about the fabrication process. Though it is destructive, it is arguably the strongest method to detect hardware Trojans. However, reverse-engineering process usually involves excessive manual effort and is time-consuming and error-prone. Thus, the challenge is how to use reverse engineering to detect Trojans in an efficient way while not harming accuracy. In this chapter, we provide a survey of current state-of-the-art reverse engineering-based hardware Trojan detection methods. We introduce one machine learning-based method that can achieve over 99% accuracy in greater detail. We also explore some design-time strategies that can help improve Trojan detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. R. Karri, J. Rajendran, K. Rosenfeld, Trojan taxonomy, in Introduction to Hardware Security and Trust, ed. by M. Tehranipoor, C. Wang (Springer, New York, 2012), pp. 325–338

    Chapter  Google Scholar 

  2. X. Zhang, M. Tehranipoor, Case study: detecting hardware trojans in third-party digital IP cores, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (IEEE, 2011), pp. 67–70

    Google Scholar 

  3. F. Wolff, C. Papachristou, S. Bhunia, R. Chakraborty, Towards trojan-free trusted ICs: problem analysis and detection scheme, in Proceedings of the Conference on Design, Automation and test in Europe (ACM, 2008), pp. 1362–1365

    Google Scholar 

  4. R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, MERO: a statistical approach for hardware trojan detection, in Cryptographic Hardware and Embedded Systems – CHES 2009, ed. by C. Clavier, K. Gaj. Lecture Notes in Computer Science, vol 5747 (Springer, Berlin/Heidelberg, 2009), pp. 396–410

    Google Scholar 

  5. Y. Jin, Y. Makris, Hardware trojans in wireless cryptographic integrated circuits. Des. Test IEEE (99), 1–1 (2013)

    Article  Google Scholar 

  6. S. Narasimhan, S. Bhunia, Hardware trojan detection, in Introduction to Hardware Security and Trust (Springer, New York, 2012), pp. 339–364

    Book  Google Scholar 

  7. R. Torrance, D. James, The state-of-the-art in semiconductor reverse engineering, in Proceedings of the 48th Design Automation Conference (ACM, 2011), pp. 333–338

    Google Scholar 

  8. Y. Shiyanovskii, F. Wolff, A. Rajendran, C. Papachristou, D. Weyer, W. Clay, Process reliability based Trojans through NBTI and HCI effects, in 2010 NASA/ESA Conference on Adaptive Hardware and Systems (AHS) (IEEE, 2010), pp. 215–222

    Google Scholar 

  9. Y. Jin, Y. Makris, Proof carrying-based information flow tracking for data secrecy protection and hardware trust, in 2012 IEEE 30th VLSI Test Symposium (VTS) (IEEE, 2012), pp. 252–257

    Google Scholar 

  10. H. Salmani, M. Tehranipoor, J. Plusquellic, A novel technique for improving hardware Trojan detection and reducing Trojan activation time. IEEE Trans. Very Large Scale Integr. VLSI Syst. 20(1), 112–125 (2012)

    Article  Google Scholar 

  11. S. Narasimhan, X. Wang, D. Du, R. Chakraborty, S. Bhunia, TeSR: a robust temporal self-referencing approach for hardware Trojan detection, in 2011 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST) (June 2011), pp. 71–74

    Google Scholar 

  12. S. Narasimhan, D. Du, R. Chakraborty, S. Paul, F. Wolff, C. Papachristou, K. Roy, S. Bhunia, Multiple-parameter side-channel analysis: a non-invasive hardware Trojan detection approach, in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), (IEEE, 2010), pp. 13–18

    Google Scholar 

  13. C. Bao, D. Forte, A. Srivastava, On application of one-class SVM to reverse engineering-based hardware Trojan detection, in 2014 15th International Symposium on Quality Electronic Design (ISQED) (IEEE, 2014), pp. 47–54

    Google Scholar 

  14. C. Bao, D. Forte, A. Srivastava, On reverse engineering-based hardware Trojan detection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(1), 49–57 (2016)

    Article  Google Scholar 

  15. C. Bao, Y. Xie, A. Srivastava, A security-aware design scheme for better hardware trojan detection sensitivity, in 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, 2015), pp. 52–55

    Google Scholar 

  16. S.M. Plaza, I.L. Markov, Solving the third-shift problem in IC piracy with test-aware logic locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6), 961–971 (2015)

    Article  Google Scholar 

  17. V. Vapnik, The Nature of Statistical Learning Theory (Springer, New York, 2000)

    Book  MATH  Google Scholar 

  18. M. Tehranipoor, F. Koushanfar, A survey of hardware trojan taxonomy and detection. IEEE Design Test Comput 27(1), 10–25 (2010)

    Article  Google Scholar 

  19. F. Brglez, D. Bryan, K. Kozminski, Combinational profiles of sequential benchmark circuits, in IEEE International Symposium on Circuits and Systems, 1989 (IEEE, 1989), pp. 1929–1934

    Google Scholar 

  20. trust HUB.org, http://trust-hub.org/resources/benchmarks

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chongxi Bao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Bao, C., Xie, Y., Liu, Y., Srivastava, A. (2018). Reverse Engineering-Based Hardware Trojan Detection. In: Bhunia, S., Tehranipoor, M. (eds) The Hardware Trojan War. Springer, Cham. https://doi.org/10.1007/978-3-319-68511-3_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68511-3_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68510-6

  • Online ISBN: 978-3-319-68511-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics