skip to main content
research-article

Golden Chip-Free Trojan Detection Leveraging Trojan Trigger’s Side-Channel Fingerprinting

Published:07 December 2020Publication History
Skip Abstract Section

Abstract

Hardware Trojans (HTs) have become a major threat for the integrated circuit industry and supply chain and have motivated numerous developments of HT detection schemes. Although the side-channel HT detection approach is among the most promising solutions, most of the previous methods require a trusted golden chip reference. Furthermore, detection accuracy is often influenced by environmental noise and process variations. In this article, a novel electromagnetic (EM) side-channel fingerprinting-based HT detection method is proposed. Different from previous methods, the proposed solution eliminates the requirement of a trusted golden fabricated chip. Rather, only the genuine RTL code is required to generate the EM signatures as references. A factor analysis method is utilized to extract the spectral features of the HT trigger’s EM radiation, and then a k-means clustering method is applied for HT detection. Experimentation on two selected sets of Trust-Hub benchmarks has been performed on FPGA platforms, and the results show that the proposed framework can detect all dormant HTs with a high confidence level.

References

  1. J. Aarestad, D. Acharyya, R. Rad, and J. Plusquellic. 2010. Detecting Trojans through leakage current analysis using multiple supply pad s. IEEE Transactions on Information Forensics and Security 5, 4 (Dec. 2010), 893--904. DOI:https://doi.org/10.1109/TIFS.2010.2061228Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Atieh Amelian and Shahram Etemadi Borujeni. 2018. A side-channel analysis for hardware Trojan detection based on path delay measurement. Journal of Circuits Systems and Computers 27, 9 (Aug. 2018), 1850138. DOI:https://doi.org/10.1142/S0218126618501384Google ScholarGoogle ScholarCross RefCross Ref
  3. J. Balasch, B. Gierlichs, and I. Verbauwhede. 2015. Electromagnetic circuit fingerprints for hardware Trojan detection. In Proceedings of the 2015 IEEE International Symposium on Electromagnetic Compatibility (EMC’15). 246--251. DOI:https://doi.org/10.1109/ISEMC.2015.7256167Google ScholarGoogle ScholarCross RefCross Ref
  4. C. Bao, D. Forte, and A. Srivastava. 2014. On application of one-class SVM to reverse engineering-based hardware Trojan detection. In Proceedings of the 15th International Symposium on Quality Electronic Design. 47--54. DOI:https://doi.org/10.1109/ISQED.2014.6783305Google ScholarGoogle Scholar
  5. C. Bao, D. Forte, and A. Srivastava. 2015. Temperature tracking: Toward robust run-time detection of hardware Trojans. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, 10 (Oct. 2015), 1577--1585. DOI:https://doi.org/10.1109/TCAD.2015.2424929Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Barry R. Masters, Rafael C. Gonzalez, and Richard Woods. 2009. Book Review: Digital Image Processing, Third Edition. Journal of Biomedical Optics 14, 2 (2009), 029901. DOI:https://doi.org/10.1117/1.3115362Google ScholarGoogle ScholarCross RefCross Ref
  7. Eric Brier, Christophe Clavier, and Francis Olivier. 2004. Correlation power analysis with a leakage model. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. 16--29.Google ScholarGoogle ScholarCross RefCross Ref
  8. B. Cha and S. K. Gupta. 2012. Efficient Trojan detection via calibration of process variations. In Proceedings of the 2012 IEEE 21st Asian Test Symposium. 355--361. DOI:https://doi.org/10.1109/ATS.2012.64Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. Chen, L. Wang, Y. Wang, Y. Liu, and H. Yang. 2017. A general framework for hardware Trojan detection in digital circuits by statistical learning algorithms. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 36, 10 (Oct. 2017), 1633--1646. DOI:https://doi.org/10.1109/TCAD.2016.2638442Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Z. Chen, S. Guo, J. Wang, Y. Li, and Z. Lu. 2019. Toward FPGA security in IoT: A new detection technique for hardware Trojans. IEEE Internet of Things Journal 6, 4 (2019), 7061--7068.Google ScholarGoogle ScholarCross RefCross Ref
  11. F. N. Esirci and A. A. Bayrakci. 2017. Hardware Trojan detection based on correlated path delays in defiance of variations with spatial correlations. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE’17) 163--168. DOI:https://doi.org/10.23919/DATE.2017.7926976Google ScholarGoogle Scholar
  12. K. Hasegawa, M. Yanagisawa, and N. Togawa. 2017. Hardware Trojans classification for gate-level netlists using multi-layer neural networks. In Proceedings of the 2017 IEEE 23rd International Symposium on On-Line Testing and Robust System Design (IOLTS’17). 227--232. DOI:https://doi.org/10.1109/IOLTS.2017.8046227Google ScholarGoogle ScholarCross RefCross Ref
  13. Jiaji He, Yanjiang Liu, Yidong Yuan, Kai Hu, Xianzhao Xia, and Yiqiang Zhao. 2018. Golden chip free Trojan detection leveraging electromagnetic side channel fingerprinting. IEICE Electronics Express 16, 2 (2018), 20181065.Google ScholarGoogle ScholarCross RefCross Ref
  14. Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, and Yier Jin. 2020. Design for EM side-channel security through quantitative assessment of RTL implementations. In Proceedings of the 2020 25th Asia and South Pacific Design Automation Conference (ASP-DAC’20). IEEE, Los Alamitos, CA, 62--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. He, Y. Zhao, X. Guo, and Y. Jin. 2017. Hardware Trojan detection through chip-free electromagnetic side-channel statistical analysis. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, 10 (Oct. 2017), 2939--2948. DOI:https://doi.org/10.1109/TVLSI.2017.2727985Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Hou, C. He, L. Wang, Y. En, and S. Xie. 2014. Hardware Trojan detection via current measurement: A method immune to process variation effects. In Proceedings of the International Conference on Reliability, Maintainability, and Safety (ICRMS’14). 1039--1042. DOI:https://doi.org/10.1109/ICRMS.2014.7107361Google ScholarGoogle Scholar
  17. Y. Huang, S. Bhunia, and P. Mishra. 2018. Scalable test generation for Trojan detection using side channel analysis. IEEE Transactions on Information Forensics and Security 13, 11 (Nov. 2018), 2746--2760. DOI:https://doi.org/10.1109/TIFS.2018.2833059Google ScholarGoogle ScholarCross RefCross Ref
  18. D. Jap, Wei He, and S. Bhasin. 2016. Supervised and unsupervised machine learning for side-channel based Trojan detection. In Proceedings of the 2016 IEEE 27th International Conference on Application-Specific Systems, Architectures, and Processors (ASAP’16). 17--24. DOI:https://doi.org/10.1109/ASAP.2016.7760768Google ScholarGoogle Scholar
  19. Yier Jin. 2015. Introduction to hardware security. Electronics 4, 4 (2015), 763--784.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Kulkarni, Y. Pino, and T. Mohsenin. 2016. Adaptive real-time Trojan detection framework through machine learning. In Proceedings of the 2016 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’16). IEEE, Los Alamitos, CA, 120--123. DOI:https://doi.org/10.1109/HST.2016.7495568Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Lecomte, J. Fournier, and P. Maurine. 2017. An on-chip technique to detect hardware Trojans and assist counterfeit identification. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25, 12 (Dec. 2017), 3317--3330. DOI:https://doi.org/10.1109/TVLSI.2016.2627525Google ScholarGoogle ScholarCross RefCross Ref
  22. Jun Li, Lin Ni, Jihua Chen, and E. Zhou. 2016. A novel hardware Trojan detection based on BP neural network. In Proceedings of the 2016 2nd IEEE International Conference on Computer and Communications (ICCC’16). 2790--2794. DOI:https://doi.org/10.1109/CompComm.2016.7925206Google ScholarGoogle Scholar
  23. Hongfu Liu, Junjie Wu, Tongliang Liu, Dacheng Tao, and Yun Fu. 2017. Spectral ensemble clustering via weighted k-means: Theoretical and practical evidence. IEEE Transactions on Knowledge 8 Data Engineering 29, 5 (2017), 1129--1143.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yu Liu, Ke Huang, and Yiorgos Makris. 2014. Hardware Trojan detection through golden chip-free statistical side-channel fingerprinting. In Proceedings of the 51st Annual Design Automation Conference (DAC’14). Article 155, 6 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Patrick Lysaght, Brandon Blodget, Jeff Mason, Jay Young, and Brendan Bridgford. 2006. Enhanced architectures, design methodologies and CAD tools for dynamic reconfiguration of Xilinx FPGAs. In Proceedings of the 2006 International Conference on Field Programmable Logic and Applications. IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  26. Abhranil Maiti, Jeff Casarona, Luke McHale, and Patrick Schaumont. 2010. A large scale characterization of RO-PUF. In Proceedings of the 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’10). IEEE, Los Alamitos, CA, 94--99.Google ScholarGoogle ScholarCross RefCross Ref
  27. F. Menichelli, R. Menicocci, M. Olivieri, and A. Trifiletti. 2008. High-level side-channel attack modeling and simulation for security-critical systems on chips. IEEE Transactions on Dependable and Secure Computing 5, 3 (July 2008), 164--176. DOI:https://doi.org/10.1109/TDSC.2007.70234Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. Moein, J. Subramnian, T. A. Gulliver, F. Gebali, and M. W. El-Kharashi. 2015. Classification of hardware Trojan detection techniques. In Proceedings of the 2015 10th International Conference on Computer Engineering Systems (ICCES’15). 357--362. DOI:https://doi.org/10.1109/ICCES.2015.7393075Google ScholarGoogle Scholar
  29. S. Narasimhan, X. Wang, D. Du, R. S. Chakraborty, and S. Bhunia. 2011. TeSR: A robust Temporal Self-Referencing approach for hardware Trojan detection. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’11). Los Alamitos, CA, 71--74. DOI:https://doi.org/10.1109/HST.2011.5954999Google ScholarGoogle Scholar
  30. J. Park and I. W. Sandberg. 2014. Universal approximation using radial-basis-function networks. Neural Computation 3, 2 (2014), 246--257.Google ScholarGoogle ScholarCross RefCross Ref
  31. Youngok Pino, Vinayaka Jyothi, and Matthew French. 2014. Intra-die process variation aware anomaly detection in FPGAs. In Proceedings of the 2014 International Test Conference. IEEE, Los Alamitos, CA, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  32. R. Rad, J. Plusquellic, and M. Tehranipoor. 2008. Sensitivity analysis to hardware Trojans using power supply transient signals. In Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust (HOST’08). Los Alamitos, CA, 3–7.Google ScholarGoogle Scholar
  33. Siddika Berna Ors, Frank Grkaynak, Elisabeth Oswald, and Bart Preneel. 2004. Power-analysis attack on an ASIC AES implementation. In Proceedings of the International Conference on Information Technology: Coding and Computing. 546.Google ScholarGoogle ScholarCross RefCross Ref
  34. Bicky Shakya, Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, and Mark Tehranipoor. 2017. Benchmarking of hardware Trojans and maliciously affected circuits. Journal of Hardware and Systems Security 1, 1 (March 2017), 85--102. DOI:https://doi.org/10.1007/s41635-017-0001-6Google ScholarGoogle ScholarCross RefCross Ref
  35. O. Söll, T. Korak, M. Muehlberghuber, and M. Hutter. 2014. EM-based detection of hardware Trojans on FPGAs. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). Los Alamitos, CA, 84--87. DOI:https://doi.org/10.1109/HST.2014.6855574Google ScholarGoogle Scholar
  36. F. Stellari, P. Song, A. J. Weger, J. Culp, A. Herbert, and D. Pfeiffer. 2014. Verification of untrusted chips using trusted layout and emission measurements. In Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST’14). Los Alamitos, CA, 19--24. DOI:https://doi.org/10.1109/HST.2014.6855562Google ScholarGoogle Scholar
  37. M. Tehranipoor and F. Koushanfar. 2010. A survey of hardware Trojan taxonomy and detection. IEEE Design 8 Test of Computers 27, 1 (Jan. 2010), 10--25. DOI:https://doi.org/10.1109/MDT.2010.7Google ScholarGoogle Scholar
  38. K. Tiri and I. Verbauwhecle. 2005. Simulation models for side-channel information leaks. In Proceedings of the 2005 42nd Design Automation Conference. 228--233.Google ScholarGoogle Scholar
  39. S. Wang, X. Dong, K. Sun, Q. Cui, D. Li, and C. He. 2016. Hardware Trojan detection based on ELM neural network. In Proceedings of the 2016 1st IEEE International Conference on Computer Communication and the Internet (ICCCI’16). 400--403. DOI:https://doi.org/10.1109/CCI.2016.7778952Google ScholarGoogle Scholar
  40. H. Xue and S. Ren. 2018. Self-reference-based hardware Trojan detection. IEEE Transactions on Semiconductor Manufacturing 31, 1 (Feb. 2018), 2--11. DOI:https://doi.org/10.1109/TSM.2017.2763088Google ScholarGoogle ScholarCross RefCross Ref
  41. M. Yoshimura, T. Bouyashiki, and T. Hosokawa. 2017. A hardware Trojan circuit detection method using activation sequence generations. In Proceedings of the 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC’17). 221--222. DOI:https://doi.org/10.1109/PRDC.2017.40Google ScholarGoogle ScholarCross RefCross Ref
  42. Yang Zhang, Houde Quan, Xiongwei Li, and Kaiyan Chen. 2018. Golden-free processor hardware Trojan detection using bit power consistency analysis. Journal of Electronic Testing 34, 3 (2018), 305--312.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Golden Chip-Free Trojan Detection Leveraging Trojan Trigger’s Side-Channel Fingerprinting

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!