Detecting hardware trojan through heuristic partition and activity driven test pattern generation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Scopus citations

Abstract

Hardware Trojan has emerged as an impending security threat to many critical systems. However, detecting hardware Trojan is extremely difficult due to Trojans are always triggered by rare events. Side-channel signal analysis is effective in detecting Trojan but facing the challenge with process variation and environment noise in nano-technology. Moreover, side-channel approaches that analyze global signals cannot scale well to large circuits. This paper presents a heuristic partition and test pattern generation based localized signal analysis method for hardware Trojan detection. First, we partition the design into regions controlled by scan chains. Then a test vector ordering algorithm is used to generate optimized vectors which can magnify the activity in the target region where Trojan may be located. At last, power ports are placed in each region to measure the localized transient current anomalies for Trojan detection, while a signal calibration technique is used to eliminate the negative effect of process variation and noise. We evaluate our approach on ISCAS89 benchmark circuits and the results show that the proposed scheme can magnify the detection sensitivity in multiples from the state-of-the-art. Two further benefits of this method are that it can scale well to large circuits and determine Trojan's location.

Original languageEnglish
Title of host publicationIET Conference Publications
PublisherInstitution of Engineering and Technology
EditionCP653
ISBN (Print)9781849198448
DOIs
StatePublished - 2014
Externally publishedYes
Event2014 Communications Security Conference, CSC 2014 - Beijing, China
Duration: 22 May 201424 May 2014

Publication series

NameIET Conference Publications
NumberCP653
Volume2014

Conference

Conference2014 Communications Security Conference, CSC 2014
Country/TerritoryChina
CityBeijing
Period22/05/1424/05/14

Keywords

  • Hardware Trojan detection
  • Hardware security
  • Heuristic partition
  • Test pattern generation

Fingerprint

Dive into the research topics of 'Detecting hardware trojan through heuristic partition and activity driven test pattern generation'. Together they form a unique fingerprint.

Cite this