A hardware Trojan embedded in the Inverse Widlar reference generator

Architectural vulnerabilities in basic analog circuits that can be exploited to embed analog hardware Trojans are identified. Challenges of detecting the presence of analog hardware Trojans are discussed. An example is presented of a simple widely used reference generator that incorporates an embedded analog hardware Trojan that requires no extra circuit components, no area overhead, and that leaves no signature in the power bus. An implementation of this reference generator in a 0.13μm CMOS process with a 1.2V voltage supply is described along with simulation results.

[1]  Farinaz Koushanfar,et al.  A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.

[2]  Randall L. Geiger,et al.  Challenges and opportunities for determining presence of multiple equilibrium points with circuit simulators , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).

[3]  Degang Chen,et al.  Practical methods for verifying removal of Trojan stable operating points , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).

[4]  Randall L. Geiger,et al.  Temperature signatures for performance assessment of circuits with undesired equilibrium states , 2015 .

[5]  Susmit Jha,et al.  Randomization Based Probabilistic Approach to Detect Trojan Circuits , 2008, 2008 11th IEEE High Assurance Systems Engineering Symposium.

[6]  G. Wilson A monolithic junction FET-n-p-n operational amplifier , 1968 .

[7]  Michael S. Hsiao,et al.  A region based approach for the identification of hardware Trojans , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.

[8]  Degang Chen,et al.  A programmable temperature trigger circuit , 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS).

[9]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[10]  Jie Li,et al.  At-speed delay characterization for IC authentication and Trojan Horse detection , 2008, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust.