Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2744769.2744822acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article

Detecting hardware trojans using backside optical imaging of embedded watermarks

Published: 07 June 2015 Publication History

Abstract

Hardware Trojans are a critical security threat to integrated circuits. We propose an optical method to detect and localize Trojans inserted during the chip fabrication stage. We engineer the fill cells in a standard cell library to be highly reflective at near-IR wavelengths so that they can be readily observed in an optical image taken through the backside of the chip. The pattern produced by their locations produces an easily measured watermark of the circuit layout. Replacement, modification or re-arrangement of these cells to add a Trojan can therefore be detected through rapid post-fabrication backside imaging. We evaluate our approach using various hardware blocks where the Trojan circuit area is less than 0.1% of the total area and it consumes less than 2% leakage power of the entire chip. In addition, we evaluate the tolerance of our methodology to background measurement noise and process variation.

References

[1]
DARPA. (2007) Trust in integrated circuits (tic) - proposer information pamphlet. {Online}. Available: http://www.darpa.mil/MTO/solicitations/baa07-24/index.html
[2]
R. Chakraborty et al., "Hardware trojan: Threats and emerging solutions," in Proc. HLDVT, Nov 2009, pp. 166--171.
[3]
R. Karri et al., "Trustworthy hardware: Identifying and classifying hardware trojans," Computer, vol. 43, no. 10, pp. 39--46, Oct 2010.
[4]
M. Rostami et al., "A primer on hardware security: Models, methods, and metrics," Proceedings of the IEEE, vol. 102, no. 8, pp. 1283--1295, 2014.
[5]
N. Tsoutsos and M. Maniatakos, "Fabrication attacks: Zero-overhead malicious modifications enabling modern microprocessor privilege escalation," Emerging Topics in Computing, IEEE Transactions on, vol. 2, no. 1, pp. 81--93, March 2014.
[6]
M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," Design Test of Computers, IEEE, vol. 27, no. 1, pp. 10--25, Jan 2010.
[7]
L. Lin et al., "Trojan side-channels: Lightweight hardware trojans through side-channel engineering," in Proc. CHES, 2009, pp. 382--395.
[8]
S. Wei et al., "Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry," in Proc. DAC, 2012, pp. 90--95.
[9]
R. Rad et al., "Power supply signal calibration techniques for improving detection resolution to hardware trojans," in Proc. ICCAD, Nov 2008, pp. 632--639.
[10]
Y. Alkabani and F. Koushanfar, "Consistency-based characterization for ic trojan detection," in Proc. ICCAD, Nov 2009, pp. 123--127.
[11]
M. Potkonjak et al., "Hardware trojan horse detection using gate-level characterization," in Proc. DAC, July 2009, pp. 688--693.
[12]
S. Wei and M. Potkonjak, "Scalable hardware trojan diagnosis," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 20, no. 6, pp. 1049--1057, June 2012.
[13]
J. Li and J. Lach, "At-speed delay characterization for ic authentication and trojan horse detection," in Proc. HST, 2008, pp. 8--14.
[14]
Y. Jin and Y. Makris, "Hardware trojan detection using path delay fingerprint," in Proc. HOST, June 2008, pp. 51--57.
[15]
P. Song, F. Stellari, D. Pfeiffer, J. Culp, A. Weger, A. Bonnoit, B. Wisnieff, and M. Taubenblatt, "Marvel---malicious alteration recognition and verification by emission of light," in Hardware-Oriented Security and Trust (HOST), 2011 IEEE International Symposium on. IEEE, 2011, pp. 117--121.
[16]
F. Stellari, P. Song, and H. A. Ainspan, "Functional block extraction for hardware security detection using time-integrated and time-resolved emission measurements," in VLSI Test Symposium (VTS), 2014 IEEE 32nd. IEEE, 2014, pp. 1--6.
[17]
A. N. Nowroz, K. Hu, F. Koushanfar, and S. Reda, "Novel techniques for high-sensitivity hardware trojan detection using thermal and power maps," Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on, vol. 33, no. 12, pp. 1792--1805, 2014.
[18]
D. Forte et al., "Temperature tracking: An innovative run-time approach for hardware trojan detection," in Proc. ICCAD, 2013, pp. 532--539.
[19]
K. Hu et al., "High-sensitivity hardware trojan detection using multimodal characterization," in Proc. DATE, March 2013, pp. 1271--1276.
[20]
J. Kong et al., "Pufatt: Embedded platform attestation based on novel processor-based pufs," in Proc. DAC, 2014, pp. 1--6.
[21]
K. Xiao and M. Tehranipoor, "Bisa: Built-in self-authentication for preventing hardware trojan insertion," in Hardware-Oriented Security and Trust (HOST), 2013 IEEE International Symposium on. IEEE, 2013, pp. 45--50.
[22]
R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, "Physical one-way functions," Science, vol. 297, no. 5589, pp. 2026--2030, 2002.
[23]
S. B. Ippolito et al., "High spatial resolution subsurface thermal emission microscopy," Applied Physics Letters, vol. 84, no. 22, p. 4529, 2004.
[24]
U. Kindereit et al., "Quantitative Investigation of Laser Beam Modulation in Electrically Active Devices as Used in Laser Voltage Probing," IEEE Transactions on Device and Materials Reliability, vol. 7, no. 1, pp. 19--30, Mar. 2007.
[25]
F. H. Köklü and M. S. Unlü, "Subsurface microscopy of interconnect layers of an integrated circuit." Optics letters, vol. 35, no. 2, pp. 184--6, Jan. 2010.
[26]
S. B. Ippolito, B. B. Goldberg, and M. S. Ünlü, "Theoretical analysis of numerical aperture increasing lens microscopy," Journal of Applied Physics, vol. 97, no. 5, p. 053105, 2005.
[27]
L. Novotny and B. Hecht, Principles of Nano-Optics. Cambridge, UK: Cambridge University Press, 2006.
[28]
"Trust-hub website," https://www.trust-hub.org/, accessed: 2014-11-30.
[29]
H. Pohl et al., "Arrangement for control of aerial cameras," Dec. 14 1976, uS Patent 3,997,795.
[30]
T. Keating, P. Wolf, and F. Scarpace, "An improved method of digital image correlation," Photogrammetric Engineering and Remote Sensing, vol. 41, no. 8, 1975.
[31]
L. Sorgi and K. Daniilidis, "Normalized cross-correlation for spherical images," in Computer Vision-ECCV 2004. Springer, 2004, pp. 542--553.

Cited By

View all
  • (2023)Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive AttacksElectronics10.3390/electronics1221450712:21(4507)Online publication date: 2-Nov-2023
  • (2023)T-TER: Defeating A2 Trojans with Targeted Tamper-Evident RoutingProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582837(746-759)Online publication date: 10-Jul-2023
  • (2022)An Efficient Framework with Node Filtering and Load Expansion for Machine-Learning-Based Hardware Trojan DetectionElectronics10.3390/electronics1113205411:13(2054)Online publication date: 30-Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '15: Proceedings of the 52nd Annual Design Automation Conference
June 2015
1204 pages
ISBN:9781450335201
DOI:10.1145/2744769
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 2015

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

DAC '15
Sponsor:
DAC '15: The 52nd Annual Design Automation Conference 2015
June 7 - 11, 2015
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Hardware-Based Methods for Electronic Device Protection against Invasive and Non-Invasive AttacksElectronics10.3390/electronics1221450712:21(4507)Online publication date: 2-Nov-2023
  • (2023)T-TER: Defeating A2 Trojans with Targeted Tamper-Evident RoutingProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3582837(746-759)Online publication date: 10-Jul-2023
  • (2022)An Efficient Framework with Node Filtering and Load Expansion for Machine-Learning-Based Hardware Trojan DetectionElectronics10.3390/electronics1113205411:13(2054)Online publication date: 30-Jun-2022
  • (2022)Detecting Hardware Trojans Using Combined Self-Testing and ImagingIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2021.309874041:6(1730-1743)Online publication date: Jun-2022
  • (2022)Trust Validation of Chiplets using a Physical Inspection based Certification Authority2022 IEEE 72nd Electronic Components and Technology Conference (ECTC)10.1109/ECTC51906.2022.00365(2311-2320)Online publication date: May-2022
  • (2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
  • (2022)Embedded WatermarksHardware Security Primitives10.1007/978-3-031-19185-5_11(185-211)Online publication date: 12-Oct-2022
  • (2021)HTnet: Transfer Learning for Golden Chip-Free Hardware Trojan Detection2021 Design, Automation & Test in Europe Conference & Exhibition (DATE)10.23919/DATE51398.2021.9474076(1484-1489)Online publication date: 1-Feb-2021
  • (2021)Hardware Trojan Detection Based on Ordered Mixed Feature GEPSecurity and Communication Networks10.1155/2021/66826742021Online publication date: 1-Jan-2021
  • (2021)A Few Shot Learning based Approach for Hardware Trojan Detection using Deep Siamese CNN2021 34th International Conference on VLSI Design and 2021 20th International Conference on Embedded Systems (VLSID)10.1109/VLSID51830.2021.00033(163-168)Online publication date: Feb-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media