SoK: Physical and Logic Testing Techniques for Hardware Trojan Detection

Hardware Trojans have emerged as great threat to the trustability of modern electronic systems. A deployed electronic system with one or more undetected Hardware Trojan-infected components can cause grave harm, ranging from personal information loss to destruction of national infrastructure. The inherently surreptitious nature and bewildering variety of Hardware Trojans makes their detection an extremely challenging exercise. In this paper, we explore the state-of-the-art of non-destructive testing for Hardware Trojan detection, with our coverage including both physical measurement based testing, as well as logic testing. We present systematic classification of Hardware Trojans and their detection techniques, and describe these techniques in details, including their stand-out features and strengths and weaknesses. We conclude the paper with an evaluation of the current status of progress, and major directions of future research.

[1]  Mark Mohammad Tehranipoor,et al.  Power supply signal calibration techniques for improving detection resolution to hardware Trojans , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.

[2]  M. Nirmala Devi,et al.  Malicious hardware detection and design for trust: An analysis , 2017 .

[3]  Sylvain Guilley,et al.  Hardware Trojan detection by delay and electromagnetic measurements , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[4]  Mark Mohammad Tehranipoor,et al.  RON: An on-chip ring oscillator network for hardware Trojan detection , 2011, 2011 Design, Automation & Test in Europe.

[5]  Mark Mohammad Tehranipoor,et al.  Experimental analysis of a ring oscillator network for hardware Trojan detection in a 90nm ASIC , 2012, 2012 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[6]  Azadeh Davoodi,et al.  A sensor-assisted self-authentication framework for hardware trojan detection , 2012, 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[7]  Michael S. Hsiao,et al.  Trusted RTL: Trojan detection methodology in pre-silicon designs , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[8]  Christos A. Papachristou,et al.  MERO: A Statistical Approach for Hardware Trojan Detection , 2009, CHES.

[9]  Kaushik Roy,et al.  Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approach , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[10]  Milos Prvulovic,et al.  Near-Field Backscattering-Based Sensing for Hardware Trojan Detection , 2020, IEEE Transactions on Antennas and Propagation.

[11]  M. Nirmala Devi,et al.  Golden-chip free power metric based hardware trojan detection and diagnosis , 2017 .

[12]  Enamul Amyeen,et al.  Evaluation of the quality of N-detect scan ATPG patterns on a processor , 2004, 2004 International Conferce on Test.

[13]  John Lach,et al.  Performance of delay-based Trojan detection techniques under parameter variations , 2009, 2009 IEEE International Workshop on Hardware-Oriented Security and Trust.

[14]  Yiqiang Zhao,et al.  Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[15]  Yu Liu,et al.  Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[16]  James F. Plusquellic,et al.  Trojan detection based on delay variations measured using a high-precision, low-overhead embedded test structure , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[17]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[18]  Prabhat Mishra,et al.  Automated Test Generation for Trojan Detection using Delay-based Side Channel Analysis , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[19]  Swarup Bhunia,et al.  Scalable Test Generation for Trojan Detection Using Side Channel Analysis , 2018, IEEE Transactions on Information Forensics and Security.

[20]  Michael S. Hsiao,et al.  Guided test generation for isolation and detection of embedded trojans in ics , 2008, GLSVLSI '08.

[21]  Sandeep K. Gupta,et al.  Trojan detection via delay measurements: A new approach to select paths and vectors to maximize effectiveness and minimize cost , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[22]  Giorgio Di Natale,et al.  New testing procedure for finding insertion sites of stealthy Hardware Trojans , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[23]  Farinaz Koushanfar,et al.  High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[24]  Yiorgos Makris,et al.  Hardware Trojan detection using path delay fingerprint , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[25]  Ingrid Verbauwhede,et al.  Electromagnetic circuit fingerprints for Hardware Trojan detection , 2015, 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC).

[26]  Georg Sigl,et al.  Hardware Trojans: current challenges and approaches , 2014, IET Comput. Digit. Tech..

[27]  Ramesh Karri,et al.  Hardware Trojan Detection Using the Order of Path Delay , 2018, ACM J. Emerg. Technol. Comput. Syst..

[28]  James F. Plusquellic,et al.  GDS-II Trojan detection using multiple supply pad VDD and GND IDDQs in ASIC functional units , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[29]  Farinaz Koushanfar,et al.  Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps , 2014, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[30]  Swarup Bhunia,et al.  Hardware IP Security and Trust , 2017 .

[31]  Mark Mohammad Tehranipoor,et al.  Case study: Detecting hardware Trojans in third-party digital IP cores , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[32]  Giorgio Di Natale,et al.  Using outliers to detect stealthy hardware trojan triggering? , 2016, 2016 1st IEEE International Verification and Security Workshop (IVSW).

[33]  T. Saran,et al.  A region based fingerprinting for hardware Trojan detection and diagnosis , 2017, 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN).

[34]  Jian Wang,et al.  A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[35]  Yu Zheng,et al.  SeMIA: Self-Similarity-Based IC Integrity Analysis , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[36]  Mark Mohammad Tehranipoor,et al.  Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.

[37]  Mark Mohammad Tehranipoor,et al.  On design vulnerability analysis and trust benchmarks development , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).

[38]  Milos Prvulovic,et al.  Creating a Backscattering Side Channel to Enable Detection of Dormant Hardware Trojans , 2019, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[39]  James F. Plusquellic,et al.  On detecting delay anomalies introduced by hardware Trojans , 2016, 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[40]  Michael S. Hsiao,et al.  Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.

[41]  Swarup Bhunia,et al.  The Hardware Trojan War Attacks, Myths, and Defenses , 2018 .

[42]  Prabhat Mishra,et al.  Efficient Test Generation for Trojan Detection using Side Channel Analysis , 2019, 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[43]  Debdeep Mukhopadhyay,et al.  Improved Test Pattern Generation for Hardware Trojan Detection Using Genetic Algorithm and Boolean Satisfiability , 2015, CHES.

[44]  Jian Wang,et al.  An enhanced classification-based golden chips-free hardware Trojan detection technique , 2016, 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST).

[45]  Norimasa Yoshimizu Hardware trojan detection by symmetry breaking in path delays , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[46]  Michael S. Hsiao,et al.  A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[47]  M. Tehranipoor,et al.  Hardware Trojans: Lessons Learned after One Decade of Research , 2016, TODE.

[48]  Phillip H. Jones,et al.  Circumventing a ring oscillator approach to FPGA-based hardware Trojan detection , 2011, 2011 IEEE 29th International Conference on Computer Design (ICCD).

[49]  Jian Wang,et al.  Toward FPGA Security in IoT: A New Detection Technique for Hardware Trojans , 2019, IEEE Internet of Things Journal.

[50]  Ankur Srivastava,et al.  Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans , 2015, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[51]  Susmit Jha,et al.  Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[52]  Paris Kitsos,et al.  Efficient triggering of Trojan hardware logic , 2016, 2016 IEEE 19th International Symposium on Design and Diagnostics of Electronic Circuits & Systems (DDECS).

[53]  Jian Wang,et al.  Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs , 2019, IET Comput. Digit. Tech..

[54]  Bruno Robisson,et al.  Resilient hardware Trojans detection based on path delay measurements , 2015, 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[55]  Mark Mohammad Tehranipoor,et al.  Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis , 2008, 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems.

[56]  Farinaz Koushanfar,et al.  A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.

[57]  Philippe Maurine,et al.  An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification , 2017, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[58]  Ankur Srivastava,et al.  Temperature tracking: An innovative run-time approach for hardware Trojan detection , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[59]  Jie Li,et al.  At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[60]  Swarup Bhunia,et al.  MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection , 2016, CCS.

[61]  Mark Mohammad Tehranipoor,et al.  Benchmarking of Hardware Trojans and Maliciously Affected Circuits , 2017, Journal of Hardware and Systems Security.

[62]  Alex Orailoglu,et al.  Test Pattern Superposition to Detect Hardware Trojans , 2020, 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[63]  Qiang Liu,et al.  A survey of hardware Trojan threat and defense , 2016, Integr..

[64]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[65]  PlusquellicJim,et al.  Detecting Trojans through leakage current analysis using multiple supply pad IDDQS , 2010 .

[66]  Mark Mohammad Tehranipoor,et al.  Counterfeit Integrated Circuits: A Rising Threat in the Global Semiconductor Supply Chain , 2014, Proceedings of the IEEE.

[67]  Bo Hou,et al.  Hardware Trojan detection via current measurement: A method immune to process variation effects , 2014, 2014 10th International Conference on Reliability, Maintainability and Safety (ICRMS).

[68]  Sylvain Guilley,et al.  Method taking into account process dispersion to detect hardware Trojan Horse by side-channel analysis , 2016, Journal of Cryptographic Engineering.

[69]  Swarup Bhunia,et al.  Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme , 2008, 2008 Design, Automation and Test in Europe.

[70]  Saiyu Ren,et al.  Self-Reference-Based Hardware Trojan Detection , 2018, IEEE Transactions on Semiconductor Manufacturing.

[71]  Apostolos P. Fournaris,et al.  An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).

[72]  Dhruva Acharyya,et al.  Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$s , 2010, IEEE Transactions on Information Forensics and Security.

[73]  Alp Arslan Bayrakci,et al.  Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations , 2017, Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017.

[74]  Michael S. Hsiao,et al.  A Novel Sustained Vector Technique for the Detection of Hardware Trojans , 2009, 2009 22nd International Conference on VLSI Design.

[75]  Wei He,et al.  Supervised and unsupervised machine learning for side-channel based Trojan detection , 2016, 2016 IEEE 27th International Conference on Application-specific Systems, Architectures and Processors (ASAP).

[76]  Swarup Bhunia,et al.  Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.

[77]  Jie Zhang,et al.  HTOutlier: Hardware Trojan detection with side-channel signature outlier identification , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[78]  Shahram Etemadi Borujeni,et al.  A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement , 2018, J. Circuits Syst. Comput..

[79]  Lawrence L. Harada Semiconductor Technology and U.S. National Security , 2010 .

[80]  Prabhat Mishra,et al.  Hardware Trojan Detection Using ATPG and Model Checking , 2018, 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID).

[81]  Bruno Rouzeyre,et al.  Protection Against Hardware Trojans With Logic Testing: Proposed Solutions and Challenges Ahead , 2018, IEEE Design & Test.

[82]  Michael Hutter,et al.  EM-based detection of hardware trojans on FPGAs , 2014, 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).

[83]  Mark Mohammad Tehranipoor,et al.  Sensitivity analysis to hardware Trojans using power supply transient signals , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[84]  Swarup Bhunia,et al.  TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection , 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust.

[85]  Swarup Bhunia,et al.  The Hardware Trojan War , 2018 .

[86]  Youhua Shi,et al.  Hardware Trojan Detection Utilizing Machine Learning Approaches , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).