Advertisement

A Start to Fail Frequency Technique for Detecting Hardware Trojan

  • Sharmila Durai
  • Prasanna Kumar
  • Srinivasan Ramasamy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 324)

Abstract

Rapid development of portable devices plays a major role in communication sector, which has led to a significant concern for cryptology. Cryptographic circuits are vulnerable to various side-channel attacks by the hardware Trojan horses (HTHs). HTHs are the malicious design modification that either alters the actual behavior of the design or reveals the secret information. In this work, we proposed a technique which is elusively for detection of hardware Trojans based on Start to Fail (STF) frequency concept. We inferred that this detection technique is efficient based on the experimental results observed, using ISCAS benchmark circuits and scalable encryption algorithm (SEA).

Keywords

GDSII Hardware Trojan horses (HTH) HTH detection and insertion Scalable encryption algorithm (SEA) Path delay 

References

  1. 1.
    B. Sharkey, DARPA TRUST in Integrated Circuits Industry Day Brief (2007)Google Scholar
  2. 2.
    R. Karri, J. Rajendran, K. Rosenfeld, M. Tehranipoor, Trustworthy hardware: identifying and classifying hardware Trojans. IEEE Comput. Mag. 43, 39–46 (2010)CrossRefGoogle Scholar
  3. 3.
    R.S. Chakraborty, S. Narasimhan, S. Bhunia, in Hardware Trojan: Threats and Emerging Solutions. High Level Design Validation and Test Workshop, HLDVT2009 (2009), pp. 166–171Google Scholar
  4. 4.
    D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, in Trojan detection using IC fingerprinting. Proceedings IEEE Symposium Security Privacy (SP) (2007), pp. 296–310Google Scholar
  5. 5.
    R. Rad, M. Tehranipoor, J. Plusquellic, A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Trans. Very Large Scale Integr. 18(12), 1735–1744 (2009)CrossRefGoogle Scholar
  6. 6.
    H. Salmani, M. Tehranipoor, J. Plusquellic, in New design strategy for improving hardware Trojan detection and reducing Trojan activation time. Proceedings of IEEE International Symposium on Hardware-Oriented Security Trust (HOST) (2009), pp. 66–73Google Scholar
  7. 7.
    Y. Jin, Y. Makris, in Hardware Trojan detection using path delay fingerprint. Proceedings IEEE International Workshop on Hardware-Oriented Security Trust (HOST) (2008), pp. 51–57Google Scholar
  8. 8.
    J. Li, J. Lach, in At-speed delay characterization for IC authentication and Trojan horse detection. Proceedings of IEEE International Workshop on Hardware-Oriented Security Trust (HOST). (2008) 8–14Google Scholar
  9. 9.
    G. Xu, A. Singh, in Achieving high transition delay fault coverage with partial DTSFF scan chains. Proceedings of IEEE International Test Conference (ITC) (2007), pp. 1–9Google Scholar
  10. 10.
    L. Fang, L. Li, Z. Li, A practical test pattern generation technique for hardware Trojan detection. Elektrotechniski vestnik, J. Electr. Eng. Comput. Sci. (2013)Google Scholar
  11. 11.
    F.-X. Standaert, G. Piret, N. Gershenfeld, J.-J. Quisquater, in SEA: a scalable encryption algorithm for small embedded applications. Proceedings of CARDIS (2006), pp. 222–236Google Scholar
  12. 12.
    F. Mace, F.-X. Standaert, J.-J. Quisquaterr, in ASIC implementations of the block cipher SEA for constrained applications. Proceedings of RFIDSEC’07 (2007), pp. 103–114Google Scholar
  13. 13.
    M. Tehranipoor, F. Koushanfar, A survey of hardware Trojan taxonomy and detection. IEEE Des. Test Comput. (2010), pp. 10–25Google Scholar
  14. 14.
    S. Adee, The hunt for the kill switch. IEEE Spectr. 45(5), 34–39 (2008)CrossRefGoogle Scholar
  15. 15.
    C. Bradford Barber, D.P. Dobkin, H. Huhdanpaa, The quickhull algorithm for convex hulls. ACM Trans. Math. Software. 22(4), 469–483 (1996)CrossRefMATHMathSciNetGoogle Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Sharmila Durai
    • 1
  • Prasanna Kumar
    • 2
  • Srinivasan Ramasamy
    • 2
  1. 1.Department of Electronics and Communication EngineeringRMD Engineering CollegeChennaiIndia
  2. 2.Department of Electronics and Communication EngineeringRMK Engineering CollegeThiruvallurIndia

Personalised recommendations