Behavior profiling of power distribution networks for runtime hardware trojan detection

Runtime hardware Trojan detection techniques are required in third party IP based SoCs as a last line of defense. Traditional techniques rely on golden data model or exotic signal processing techniques such as utilizing Choas theory or machine learning. Due to cumbersome implementation of such techniques, it is highly impractical to embed them on the hardware, which is a requirement in some mission critical applications. In this paper, we propose a methodology that generates a digital power profile during the manufacturing test phase of the circuit under test. A simple processing mechanism, which requires minimal computation of measured power signals, is proposed. For the proof of concept, we have applied the proposed methodology on a classical Advanced Encryption Standard circuit with 21 available Trojans. The experimental results show that the proposed methodology is able to detect 75% of the intrusions with the potential of implementing the detection mechanism on-chip with minimal overhead compared to the state-of-the-art techniques.

[1]  Hongwei Luo,et al.  Malicious circuitry detection using transient power analysis for IC security , 2013, 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE).

[2]  Mark Mohammad Tehranipoor,et al.  A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[3]  Mark Mohammad Tehranipoor,et al.  A study on the effectiveness of Trojan detection techniques using a red team blue team approach , 2013, 2013 IEEE 31st VLSI Test Symposium (VTS).

[4]  Syed Rafay Hasan,et al.  Tenacious hardware trojans due to high temperature in middle tiers of 3-D ICs , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).

[5]  Syed Rafay Hasan,et al.  Hardware Trojans in asynchronous FIFO-buffers: From clock domain crossing perspective , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).

[6]  Ankur Srivastava,et al.  Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[7]  Hong Zhao,et al.  Applying chaos theory for runtime Hardware Trojan detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).

[8]  Faiq Khalid,et al.  A self-learning framework to detect the intruded integrated circuits , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[9]  Li-Wei Wang,et al.  A power analysis based approach to detect Trojan circuits , 2011, 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.

[10]  Michael S. Hsiao,et al.  A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.

[11]  Naoya Onizawa,et al.  A Low-Energy Variation-Tolerant Asynchronous TCAM for Network Intrusion Detection Systems , 2013, 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems.

[12]  Osman Hasan,et al.  Power profiling of microcontroller's instruction set for runtime hardware Trojans detection without golden circuit models , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[13]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[14]  Ankur Srivastava,et al.  Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[15]  Osman Hasan,et al.  Hardware Trojan detection in soft error tolerant macro synchronous micro asynchronous (MSMA) pipeline , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).

[16]  Mark Mohammad Tehranipoor,et al.  Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[17]  Chip-Hong Chang,et al.  Cluster-based distributed active current timer for hardware Trojan detection , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).