A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions

  • Authors:
  • Reza Rad;Jim Plusquellic;Mohammad Tehranipoor

  • Affiliations:
  • University of Maryland, Baltimore, MD;Department of Electrical and Computer Engineering, University of New Mexico, Albuquerque, NM;Department of Electrical and Computer Engineering, University of Connecticut, Storrs, CT

  • Venue:
  • IEEE Transactions on Very Large Scale Integration (VLSI) Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Trust in reference to integrated circuits addresses the concern that the design and/or fabrication of the integrated circuit (IC) may be purposely altered by an adversary. The insertion of a hardware Trojan involves a deliberate and malicious change to an IC that adds or removes functionality or reduces its reliability. Trojans are designed to disable and/or destroy the IC at some future time or they may serve to leak confidential information covertly to the adversary. Trojans can be cleverly hidden by the adversary to make it extremely difficult for chip validation processes, such as manufacturing test, to accidentally discover them. This paper investigates the sensitivity of a power supply transient signal analysis method for detecting Trojans. In particular, we focus on determining the smallest detectable Trojan, i.e., the least number of gates a Trojan may have and still be detected, using a set of process simulation models that characterize a TSMC 0.18 µm process. We also evaluate the sensitivity of our Trojan detection method in the presence of measurement noise and background switching activity.