A region based approach for the identification of hardware Trojans

  • Authors:
  • Mainak Banga;Michael S. Hsiao

  • Affiliations:
  • Bradley Department of Electrical and Computer Engineering, Virginia Tech., Blacksburg, 24061, USA;Bradley Department of Electrical and Computer Engineering, Virginia Tech., Blacksburg, 24061, USA

  • Venue:
  • HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Outsourcing of SoC fabrication units has created the potential threat of design tampering using hardware Trojans. Methods based on side-channel analysis exist to differentiate such maligned ICs from the genuine ones but process variation in the foundries limit the effectiveness of such approaches. In this work, we propose a circuit partition based approach to detect and locate the embedded Trojan. Results show that our approach is effective in separating out candidate Trojans in the circuit. In addition, we provide a power profile based method for refining the candidate regions that may contain a Trojan. In many cases, such an isolation method leads to noticeable manifestation of the anomalous behavior of the circuit due to the presence of the Trojan thereby enhancing chances of their detection.