Temperature tracking: An innovative run-time approach for hardware Trojan detection

The hardware Trojan threat has motivated development of Trojan detection schemes at all stages of the integrated circuit (IC) lifecycle. While the majority of existing schemes focus on ICs at test-time, there are many unique advantages offered by post-deployment/run-time Trojan detection. However, run-time approaches have been underutilized with prior work highlighting the challenges of implementing them with limited hardware resources. In this paper, we propose innovative low-overhead approaches for run-time Trojan detection which exploit the thermal sensors already available in many modern systems to detect deviations in power/thermal profiles caused by Trojan activation. Simulation results using state-of-the-art tools on publicly available Trojan benchmarks verify that our approaches can detect active Trojans quickly and with few false positives.

[1]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[2]  Sarita V. Adve,et al.  The impact of technology scaling on lifetime reliability , 2004, International Conference on Dependable Systems and Networks, 2004.

[3]  Kevin Skadron,et al.  Temperature-aware microarchitecture: Modeling and implementation , 2004, TACO.

[4]  Yufu Zhang,et al.  Adaptive and autonomous thermal tracking for high performance computing systems , 2010, Design Automation Conference.

[5]  Kofi A. A. Makinwa,et al.  A 1.2V 10µW NPN-based temperature sensor in 65nm CMOS with an inaccuracy of ±0.2°C (3s) from −70°C to 125°C , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).

[6]  Jie Li,et al.  At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[7]  Sarma B. K. Vrudhula,et al.  Battery Modeling for Energy-Aware System Design , 2003, Computer.

[8]  Yufu Zhang,et al.  On-chip sensor-driven efficient thermal profile estimation algorithms , 2010, TODE.

[9]  Yufu Zhang,et al.  Statistical characterization of chip power behavior at post-fabrication stage , 2011, 2011 International Green Computing Conference and Workshops.

[10]  J. Junkins,et al.  Optimal Estimation of Dynamic Systems , 2004 .

[11]  Farinaz Koushanfar,et al.  High-sensitivity hardware Trojan detection using multimodal characterization , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[12]  Cynthia E. Irvine,et al.  Evaluating security requirements in a general-purpose processor by combining assertion checkers with code coverage , 2012, 2012 IEEE International Symposium on Hardware-Oriented Security and Trust.

[13]  Ankur Srivastava,et al.  Energy and thermal-aware video coding via encoder/decoder workload balancing , 2010, 2010 ACM/IEEE International Symposium on Low-Power Electronics and Design (ISLPED).

[14]  Milo M. K. Martin,et al.  Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically , 2010, 2010 IEEE Symposium on Security and Privacy.

[15]  Yufu Zhang,et al.  Statistical Framework for Designing On-Chip Thermal Sensing Infrastructure in Nanoscale Systems , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[16]  Swarup Bhunia,et al.  Improving IC Security Against Trojan Attacks Through Integration of Security Monitors , 2012, IEEE Design & Test of Computers.

[17]  Yufu Zhang,et al.  Accurate temperature estimation using noisy thermal sensors , 2009, 2009 46th ACM/IEEE Design Automation Conference.

[18]  Miodrag Potkonjak,et al.  Hardware Trojan horse benchmark via optimal creation and placement of malicious circuitry , 2012, DAC Design Automation Conference 2012.

[19]  Mark Mohammad Tehranipoor,et al.  Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution , 2013, IEEE Design & Test.

[20]  Mark Mohammad Tehranipoor,et al.  A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[21]  Tajana Simunic,et al.  Accurate Temperature Estimation for Efficient Thermal Management , 2008, 9th International Symposium on Quality Electronic Design (isqed 2008).

[22]  Miron Abramovici,et al.  Integrated circuit security: new threats and solutions , 2009, CSIIRW '09.

[23]  David Harris,et al.  CMOS VLSI Design: A Circuits and Systems Perspective , 2004 .

[24]  Mark Mohammad Tehranipoor,et al.  A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[25]  Farinaz Koushanfar,et al.  A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.

[26]  Yufu Zhang,et al.  Leakage-aware Kalman filter for accurate temperature tracking , 2011, 2011 International Green Computing Conference and Workshops.

[27]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.