Hardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis

نویسندگان

  • Christopher Bell
  • Matthew Lewandowski
  • Richard Meana
چکیده

A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design and statistical comparison to determine which designs have been compromised. We also briefly discuss a supplemental method of confirming our results using a targeted method of FPGA design analysis. This method is proposed for consideration in the CSAW 2012 Embedded Systems Challenge as the submission for the University of South Florida team.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...

متن کامل

Detection of Malicious Insertions in Hardware through an Integrative Validation Approach

Integrated Circuit (IC) manufacturing has become an increasingly global process, which leads to the growing threat of hardware Trojan attacks. In the absence of a trusted supply chain model, post-manufacturing detection of hardware Trojans has gained relevance in commercial and military applications, where trusted field operation is critical. In a distributed manufacturing chain, there are seve...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

MERO: A Statistical Approach for Hardware Trojan Detection

In order to ensure trusted in–field operation of integrated circuits, it is important to develop efficient low–cost techniques to detect malicious tampering (also referred to as Hardware Trojan) that causes undesired change in functional behavior. Conventional post–manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012