Abstract
Currently, hardware Trojans have posed a serious threat to the integrated circuit security. A novel approach using chips’ infrared radiation to detect Trojans on a second scale was proposed in 2014. However, the temperature differences can be distinguishable on a microsecond scale between the normal areas in normal chips and the corresponding infected areas in chips with Trojans. As a result, the second-level detection can influence the detection accuracy reversely because of the temperature balance. On the other hand, infrared cameras’ ability to detect Trojans is determined by three parameters. They are the noise equivalent temperature difference (NETD), the pixel size and the frame frequency. It will be of benefit to Trojans detection using infrared cameras, if we determine the influences of the three parameters on detection. In this paper, we utilize finite element analysis to simulate the microsecond-level temperature variations of a fixed pixel-size silicon substrate while logic circuits on this size silicon substrate vary and operate under different challenges. Then, we find that the distinguishable time between different cases is on a microsecond scale according to a normal NETD. Based on our simulation results, an increasing step size (ISS) approach is proposed to capture dies’ microsecond-level infrared maps accurately using the low frame frequency infrared cameras. Finally, we analyze the temperature variations while a fixed logic circuit under a fixed challenge is operating on the different pixel-size silicon substrates. Based on the results, we get the link between NETD and the pixel size on the Trojan detection.
This work was supported by the National Natural Science Foundation of China (NSFC, grants no. 61471375).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdullah, N.N., Hu, K.Q., Farinaz, K., et al.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 32, 1792–1805 (2014)
Tang, Y.K., Wang, J.Y.: Built-in self-monitor-based finite state machines Trojans detection and self-lock defence. IET J. Eng. (2016). doi:10.1049/joe.2016.0012
Agrawal, D., Baktir, S., Karakoyunlu, D.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296–310 (2007)
Jin, Y.E., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51–57 (2008)
Kelly, S., Zhang, X.H., Tehranipoor, M.: Detecting hardware Trojan using on-chip sensors in an ASIC design. J. Electron. Test 31(1), 11–26 (2015)
Wang, X.X., Tehranipoor, M., Plusqeullic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 15–19 (2008)
Cha, B., Gupta, S.K.: Trojan detection via delay measurement: a new approach to select paths and vectors to maximize effectiveness and minimize cost. In: EDAA (2013)
Chen, X.M., Liu, Y., Li, S.S.: A method of obtaining ASIC schematic using scan chain. In: International Industrial Informatics and Computer Engineering Conference, pp. 985–990 (2015)
Rabaey, J.M., Chandrakasan, A., Nikolic, B.: Digital Integrated Circuits: A Design Perspective. Publishing House of Eelctronics Industry, Beijing (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Tang, Y., Wang, J., Li, S., Chen, J., Yang, B. (2016). Microsecond-Level Temperature Variation of Logic Circuits and Influences of Infrared Cameras’ Parameters on Hardware Trojans Detection. In: Xu, W., Xiao, L., Li, J., Zhang, C., Zhu, Z. (eds) Computer Engineering and Technology. NCCET 2016. Communications in Computer and Information Science, vol 666. Springer, Singapore. https://doi.org/10.1007/978-981-10-3159-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-3159-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3158-8
Online ISBN: 978-981-10-3159-5
eBook Packages: Computer ScienceComputer Science (R0)