Multiple-Parameter Side-Channel Analysis: A Non-invasive Hardware Trojan Detection Approach

HOST(2010)

引用 172|浏览14
暂无评分
摘要
Malicious alterations of integrated circuits during fabrication in untrusted foundries pose major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover such alterations, also referred to as “hardware Trojans” using conventional structural or functional testing strategies. In this paper, we propose a novel non-invasive, multiple-parameter side-channel analysis based Trojan detection approach that is capable of detecting malicious hardware modifications in the presence of large process variation induced noise. We exploit the intrinsic relationship between dynamic current (I DDT ) and maximum operating frequency (F max ) of a circuit to distinguish the effect of a Trojan from process induced fluctuations in I DDT . We propose a vector generation approach for I DDT measurement that can improve the Trojan detection sensitivity for arbitrary Trojan instances. Simulation results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit Advanced Encryption System (AES) cipher, show a detection resolution of 0.04% can be achieved in presence of ±20% parameter (V th ) variations. The approach is also validated with experimental results using 120nm FPGA (Xilinx Virtex-II) chips.
更多
查看译文
关键词
cryptography,field programmable gate arrays,invasive software,128 bit advanced encryption system cipher,32 bit integer execution unit,FPGA chips,Xilinx Virtex-II,dynamic current,functional testing strategies,integrated circuits,maximum operating frequency,multiple parameter side channel analysis,noninvasive hardware trojan detection,process variation induced noise,untrusted foundries,Hardware Trojan,Multiple-parameter test,Side channel analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要