A novel hardware Trojan detection method based on side-channel analysis and PCA algorithm

Malicious modification of integrated circuits, namely Hardware Trojan, has emerged as a major security threat. Since it is extremely difficult to detect the presence of such small Trojan circuits using only logic test or side-channel analysis, this paper presents a novel test method combining logic test and side-channel test together. An 18-bit CORDIC IP core is adopted as a golden circuit, while a 2-bit counter is applied as a Trojan circuit. The automatic test platform is set up with Xilinx FPGA, LabVIEW software, and high precision oscilloscope. Meanwhile, the power traces of power supplies Vccint or Vccaux in FPGA are both monitored to enhance the detection sensitivity. The relevant test flow chart is also depicted in detail. Experimental results demonstrate that the novel test method can easily achieve about 0.1% Trojan detection sensitivity when principal component analysis approach is adopted as the data processing algorithm.

[1]  Mark Mohammad Tehranipoor,et al.  An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities , 2011, IEEE Transactions on Information Forensics and Security.

[2]  Swarup Bhunia,et al.  Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.

[3]  Christos A. Papachristou,et al.  MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.

[4]  Sally Adee,et al.  The Hunt For The Kill Switch , 2008, IEEE Spectrum.

[5]  Hai Xie,et al.  A novel analysis method of power signal for integrated circuits Trojan detection , 2013, Proceedings of the 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA).

[6]  Hongwei Luo,et al.  Malicious circuitry detection using transient power analysis for IC security , 2013, 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE).

[7]  Kaushik Roy,et al.  Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis , 2013, IEEE Transactions on Computers.

[8]  Jie Li,et al.  At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[9]  Kaushik Roy,et al.  Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[10]  Jeyavijayan Rajendran,et al.  Towards a comprehensive and systematic classification of hardware Trojans , 2010, Proceedings of 2010 IEEE International Symposium on Circuits and Systems.