Detection and Location of Hardware Trojans Using Path Delays

International Journal of Electrical and Electronics Engineering
© 2024 by SSRG - IJEEE Journal
Volume 11 Issue 6
Year of Publication : 2024
Authors : Allagadda Seetharamaraju, Arun Raaza, Omprakash Laxmanappa Mandge, M. Meena
pdf
How to Cite?

Allagadda Seetharamaraju, Arun Raaza, Omprakash Laxmanappa Mandge, M. Meena, "Detection and Location of Hardware Trojans Using Path Delays," SSRG International Journal of Electrical and Electronics Engineering, vol. 11,  no. 6, pp. 101-107, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I6P111

Abstract:

The IC industry transition to a decentralized and outsourced business strategy, wherein design, inclusion, production, packaging, testing, and assembly are being performed by numerous firms around the world, must have generated issues pertaining to IP rights piracy, reverse engineering threats on IC netlists as well as layouts, cloning of ICs, and detecting deceptive chips and also Hardware Trojans (HT). Threats posed by the injection of HTs have developed as a major issue for different vendors, governmental entities, and their vendors. This paper offers a new strategy for identifying HT using path-delaydependent parametric techniques. The key advantage of this technique is that there is no requirement to compare the HT-inserted circuit to the golden reference circuit. The proposed method has been implemented in 4-bit RCA for detecting and locating the HTs.

Keywords:

IC, Hardware Trojan, RCA, Path-delay, Netlist.

References:

[1] Thomas Lengaue, Combinatorial Algorithms for Integrated Circuit Layout, 1st ed., Springer Science & Business Media, 1990.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Se-Hwa Wu, The Dynamic Cooperation between Government and Enterprise: The Development of Taiwan’s Integrated Circuit Industry, 1st ed., Routledge, 1992.
[Google Scholar] [Publisher Link]
[3] Cherry Bhargava, and Gaurav Mani Khanal, IC Fabrication Technology, 1st ed., River Publishers, pp. 1-22, 2020.
[Google Scholar] [Publisher Link]
[4]  Swarup Bhunia, and Mark M. Tehranipoor, The Hardware Trojan War, Attacks, Myths, and Defenses, 1st ed., Springer Cham, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Vivek Venugopalan, and Cameron D. Patterson, “Surveying the Hardware Trojan Threat Landscape for the Internet-of-Things,” Journal of Hardware and Systems Security, vol. 2, pp. 131-141, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Travis Boraten, and Avinash Kodi, “Mitigation of Hardware Trojan Based Denial-of-Service Attack for Secure NOCs,” Journal of Parallel and Distributed Computing, vol. 111, pp. 24-38, 2018.
[CrossRef] [Google Scholar] [Publisher Link]  
[7] Anshuman Tripathi, “The Economics of Hardware Trojans: An Expert’s Opinion,” Journal of Information Technology Case and Application Research, vol. 22, no. 3, pp. 159-174, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] William D. Toronto, “Fake News and Kill-Switches: The US Government’s Fight to Respond to and Prevent Fake News,” Air Force Law Review, no. 79, 2018.
[Google Scholar] [Publisher Link]
[9] Konstantinos G. Liakos et al., “Conventional and Machine Learning Approaches as Countermeasures against Hardware Trojan Attacks,” Microprocessors and Microsystems, vol. 79, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Ashkan Vakil et al., “Learning Assisted Side Channel Delay Analysis for Hardware Trojan Detection,” 2020 21st International Symposium on Quality Electronic Design (ISQED), Santa Clara, USA, pp. 40-45, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Samaneh Ghandali et al., “Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 28, no. 6, pp. 1435-1448, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Yidong Yuan et al., “Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel,” Security and Communication Networks, vol. 2021, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Jiaji He et al., “Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors,” 2020 57th ACM/IEEE Design Automation Conference (DAC), San Francisco, USA, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Kento Hasegawa, Masao Yanagisawa, and Nozomu Togawa, “Trojan-Feature Extraction at Gate-Level Netlists and Its Application to Hardware-Trojan Detection Using Random Forest Classifier,” 2017 IEEE International Symposium on Circuits and Systems (ISCAS), Baltimore, USA, pp. 1-4, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Krishnendu Guha et al., “Dynamic Power-Aware Scheduling of Real-Time Tasks for FPGA-Based Cyber Physical Systems against Power Draining Hardware Trojan Attacks,” The Journal of Supercomputing, vol. 76, pp. 8972-9009, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Joseph Clements, and Yingjie Lao, “Hardware Trojan Design on Neural Networks,” 2019 IEEE International Symposium on Circuits and Systems (ISCAS), Sapporo, Japan, pp. 1-5, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Wei Hu et al., “Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks,” 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), Xi’an, China, pp. 1-6, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Lei Zhang et al., “A Hardware Trojan Detection Method Based on the Electromagnetic Leakage,” China Communications, vol. 16, no. 12, pp. 100-110, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Samaneh Ghandali, Daniel Holcomb, and Christof Paar, “Temperature-Based Hardware Trojan for Ring-Oscillator-Based TRNGs,” arXiv, pp. 1-7, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Ajat Subhra Chakraborty, Seetharam Narasimhan, and Swarup Bhunia, “Hardware Trojan: Threats and Emerging Solutions,” 2019 IEEE International High Level Design Validation and Test Workshop, San Francisco, USA, pp. 166-171, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Tamzidul Hoque et al., “Golden-Free Hardware Trojan Detection with High Sensitivity under Process Noise,” Journal of Electronic Testing, vol. 33, pp. 107-124, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Mingfu Xue et al., “Ten Years of Hardware Trojans: A Survey from the Attacker’s Perspective,” IET Computers & Digital Techniques, vol. 14, no. 6, pp. 231-246, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Yajun Yang et al., “How Secure is Split Manufacturing in Preventing Hardware Trojan,” ACM Transactions on Design Automation of Electronic Systems, vol. 25, no. 2, pp. 1-23, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Zhixin Pan, and Prabhat Mishra, “Automated Test Generation for Hardware Trojan Detection Using Reinforcement Learning,” 2021 26th Asia and South Pacific Design Automation Conference (ASP-DAC), Tokyo, Japan, pp. 408-413, 2021.
[Google Scholar] [Publisher Link]
[25] Yangdi Lyu, and Prabhat Mishra, “Efficient Test Generation for Trojan Detection Using Side Channel Analysis,” 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), Florence, Italy, pp. 408-413, 2019.
[CrossRef] [Google Scholar] [Publisher Link]