Variability aware Golden Reference Free methodology for Hardware Trojan Detection Using Robust Delay Analysis

01/16/2022
by   Ramakrishna Vaikuntapu, et al.
0

Many fabless semiconductor companies outsource their designs to third-party fabrication houses. As trustworthiness of chain after outsourcing including fabrication houses is not established, any adversary in between, with malicious intent may tamper the design by inserting Hardware Trojans (HTs). Detection of such HTs is of utmost importance to assure the trust and integrity of the chips. However, the efficiency of detection techniques based on side-channel analysis is largely affected by process variations. In this paper, a methodology for detecting HTs by analyzing the delays of topologically symmetric paths is proposed. The proposed technique, rather than depending on golden ICs as a reference for HT detection, employs the concept of self-referencing. In this work, the fact that delays of topologically symmetric paths in an IC will be affected similarly by process variations is exploited. A procedure to chose topologically symmetric paths that are minimally affected by process variations is presented. Further, a technique is proposed to create topologically symmetric paths by inserting extra logic gates if such paths do not exist in the design intrinsically. Simulations performed on ISCAS-85 benchmarks establish that the proposed method is able to achieve a true positive rate of 100 experimentation, We have considered the maximum of 15 inter-die variations in threshold voltage (Vth).

READ FULL TEXT

page 1

page 8

page 13

page 15

page 16

research
04/06/2020

Hardware Trojan Detection Using Controlled Circuit Aging

This paper reports a novel approach that uses transistor aging in an int...
research
04/25/2022

Hardware Trojan Detection using Graph Neural Networks

The globalization of the Integrated Circuit (IC) supply chain has moved ...
research
07/05/2023

A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

A major security threat to an integrated circuit (IC) design is the Hard...
research
10/23/2020

Learning Assisted Side Channel Delay Test for Detection of Recycled ICs

With the outsourcing of design flow, ensuring the security and trustwort...
research
01/17/2020

LASCA: Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection

In this paper, we introduce a Learning Assisted Side Channel delay Analy...
research
10/11/2020

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

The emergence of distributed manufacturing ecosystems for electronic har...
research
07/14/2022

Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network

The globalization of the Integrated Circuit (IC) supply chain has moved ...

Please sign up or login with your details

Forgot password? Click here to reset