Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-04138-9_28guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

MERO: A Statistical Approach for Hardware Trojan Detection

Published: 30 August 2009 Publication History

Abstract

In order to ensure trusted in---field operation of integrated circuits, it is important to develop efficient low---cost techniques to detect malicious tampering (also referred to as <em>Hardware Trojan</em> ) that causes undesired change in functional behavior. Conventional post--- manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection. In this paper, we propose a test pattern generation technique based on multiple excitation of rare logic conditions at internal nodes. Such a statistical approach maximizes the probability of inserted Trojans getting triggered and detected by logic testing, while drastically reducing the number of vectors compared to a weighted random pattern based test generation. Moreover, the proposed test generation approach can be effective towards increasing the sensitivity of Trojan detection in existing <em>side---channel</em> approaches that monitor the impact of a Trojan circuit on power or current signature. Simulation results for a set of ISCAS benchmarks show that the proposed test generation approach can achieve comparable or better Trojan detection coverage with about 85% reduction in test length on average over random patterns.

References

[1]
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: IEEE Symp. on Security and Privacy, pp. 296-310 (2007)
[2]
Ravi, S., Raghunathan, A., Chakradhar, S.: Tamper resistance mechanisms for secure embedded systems. In: Intl. Conf. on VLSI Design, pp. 605-611 (2006)
[3]
DARPA BAA06-40: TRUST for Integrated Circuits, http://www.darpa.mil/BAA/BAA06-40mod1/html
[4]
Kumagai, J.: Chip Detectives. IEEE Spectrum 37, 43-49 (2000)
[5]
Amyeen, M.E., Venkataraman, S., Ojha, A., Lee, S.: Evaluation of the Quality of N-Detect Scan ATPG Patterns on a Processor. In: Intl. Test Conf., pp. 669-678 (2004)
[6]
Pomeranz, I., Reddy, S.M.: A Measure of Quality for n-Detection Test Sets. IEEE. Trans. on Computers. 53, 1497-1503 (2004)
[7]
Mathew, B., Saab, D.G.: Combining multiple DFT schemes with test generation. IEEE Trans. on CAD. 18, 685-696 (1999)
[8]
Adee, S.: The Hunt for the Kill Switch. IEEE Spectrum 45, 34-39 (2008)
[9]
Banga, M., Hsiao, M.S.: A Region Based Approach for the Identification of Hardware Trojans. In: Intl. Workshop on Hardware-oriented Security and Trust, pp. 40-47 (2008)
[10]
Jin, Y., Makris, Y.: Hardware Trojan Detection Using Path Delay Fingerprint. In: Intl. Workshop on Hardware-oriented Security and Trust, pp. 51-57 (2008)
[11]
Rad, R.M., Wang, X., Tehranipoor, M., Plusqellic, J.: Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans. In: Intl. Conf. on CAD, pp. 632-639 (2008)
[12]
Chakraborty, R.S., Paul, S., Bhunia, S.: On-Demand Transparency for Improving Hardware Trojan Detectability. In: Intl. Workshop on Hardware-oriented Security and Trust, pp. 48-50 (2008)
[13]
Wolff, F., Papachristou, C., Bhunia, S., Chakraborty, R.S.: Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. In: Design, Automation and Test in Europe, pp. 1362-1365 (2008)
[14]
Geuzebroek, M.J., Van der Linden, J.T., Van de Goor, A.J.: Test Point Insertion that Facilitates ATPG in Reducing Test Time and Data Volume. In: Intl. Test Conf., pp. 138-147 (2002)

Cited By

View all
  • (2024)TROP: TRust-aware OPportunistic Routing in NoC with Hardware TrojansACM Transactions on Design Automation of Electronic Systems10.1145/363982129:2(1-25)Online publication date: 15-Feb-2024
  • (2024)Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detectionThe Journal of Supercomputing10.1007/s11227-024-05963-880:10(14295-14329)Online publication date: 1-Jul-2024
  • (2023)Directed Test Generation for Hardware Validation: A SurveyACM Computing Surveys10.1145/363804656:5(1-36)Online publication date: 19-Dec-2023
  • Show More Cited By
  1. MERO: A Statistical Approach for Hardware Trojan Detection

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CHES '09: Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems
    August 2009
    469 pages
    ISBN:9783642041372
    • Editors:
    • Christophe Clavier,
    • Kris Gaj

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 30 August 2009

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)TROP: TRust-aware OPportunistic Routing in NoC with Hardware TrojansACM Transactions on Design Automation of Electronic Systems10.1145/363982129:2(1-25)Online publication date: 15-Feb-2024
    • (2024)Trojan playground: a reinforcement learning framework for hardware Trojan insertion and detectionThe Journal of Supercomputing10.1007/s11227-024-05963-880:10(14295-14329)Online publication date: 1-Jul-2024
    • (2023)Directed Test Generation for Hardware Validation: A SurveyACM Computing Surveys10.1145/363804656:5(1-36)Online publication date: 19-Dec-2023
    • (2023)LEGO: Empowering Chip-Level Functionality Plug-and-Play for Next-Generation IoT DevicesProceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 310.1145/3582016.3582050(404-418)Online publication date: 25-Mar-2023
    • (2022)ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement LearningProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560690(1275-1289)Online publication date: 7-Nov-2022
    • (2022)Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field ImagesACM Journal on Emerging Technologies in Computing Systems10.1145/353101018:4(1-25)Online publication date: 13-Oct-2022
    • (2021)Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side ChannelSecurity and Communication Networks10.1155/2021/88392222021Online publication date: 1-Jan-2021
    • (2021)Hardware Trust and Assurance through Reverse Engineering: A Tutorial and Outlook from Image Analysis and Machine Learning PerspectivesACM Journal on Emerging Technologies in Computing Systems10.1145/346495917:4(1-53)Online publication date: 30-Jun-2021
    • (2021)Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic AlgorithmACM Transactions on Embedded Computing Systems10.1145/344683720:4(1-20)Online publication date: 26-Mar-2021
    • (2021)TAALACM Transactions on Design Automation of Electronic Systems10.1145/344237926:4(1-22)Online publication date: 9-Mar-2021
    • Show More Cited By

    View Options

    View options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media