Performance of delay-based Trojan detection techniques under parameter variations

  • Authors:
  • Devendra Rai;John Lach

  • Affiliations:
  • Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Road, PO Box 400743, Charlottesville, 22904, USA;Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Road, PO Box 400743, Charlottesville, 22904, USA

  • Venue:
  • HST '09 Proceedings of the 2009 IEEE International Workshop on Hardware-Oriented Security and Trust
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Various schemes utilizing path delay information have been proposed to determine the authenticity of a given integrated circuit. However, the performance of these techniques under parameter variations must be evaluated, as delay variations may mask the delay impact of design alterations, such as hardware Trojan horses. This paper examines how path delay characterization performs under extensive delay variations, and results reveal that it remains a powerful tool for detecting design alterations by leveraging statistical techniques.