Hardware Trojan detection using path delay fingerprint

  • Authors:
  • Yier Jin;Yiorgos Makris

  • Affiliations:
  • Department of Electrical Engineering, Yale University, New Haven, CT 06520, USA;Department of Electrical Engineering, Yale University, New Haven, CT 06520, USA

  • Venue:
  • HST '08 Proceedings of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan detection method to complement traditional testing methods, a new behavior-oriented category method is proposed to divide Trojans into two categories: explicit payload Trojan and implicit payload Trojan. This categorization method makes it possible to construct Trojan models and then lower the cost of testing. Path delays of nominal chips are collected to construct a series of fingerprints, each one representing one aspect of the total characteristics of a genuine design. Chips are validated by comparing their delay parameters to the fingerprints. The comparison of path delays makes small Trojan circuits significant from a delay point of view. The experiment’s results show that the detection rate on explicit payload Trojans is 100%, while this method should be developed further if used to detect implicit payload Trojans.