[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2429384.2429392acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedingsconference-collections
research-article

Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC

Published: 05 November 2012 Publication History

Abstract

The modern integrated circuit (IC) manufacturing process has exposed chip designers to hardware Trojans which threaten circuits bound for critical applications. This paper details the implementation and analysis of a novel ring oscillator network technique for Trojan detection in an application specific integrated circuit (ASIC). The ring oscillator network serves as a power supply monitor by detecting fluctuations in characteristic frequencies due to malicious modifications (i.e. hardware Trojans) in the circuit under authentication. The ring oscillator network was implemented and fabricated in 40 IBM 90nm ASICs with controlled hardware Trojans. This work analyzes the impact of Trojans with varied partial activity, area, and location on the proposed ring oscillator structure and demonstrates that stealthy Trojans can be efficiently detected with this technique even while obfuscated by process variations, background noise, and environment noise.

References

[1]
"Report of the Defense Science Board Task Force on High Performance Microchip Supply," Defense Science Board, US DoD, http://www.acq.osd.mil/dsb/reports/2005-02-HPMSi_Report_Final.pdf, Feb, 2005.
[2]
X. Zhang and M. Tehranipoor, "RON: An On-chip Ring Oscillator Network for Hardware Trojan Detection," in Proc. Design, Automation, and Test in Europe (DATE), pp. 1--6, 2011.
[3]
R. Karri, J. Rajendran, K Rosenfeild, M. Tehranipoor "Trustworthy Hardware: Identifying and Classifying Hardware Trojans", IEEE Design and Test of Computers, pp. 39--46, 2010
[4]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan Detection using IC Fingerprinting," in in Proc. IEEE Symposium on Security and Privacy (SP), pp. 296--310, 2007.
[5]
R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans using Power Supply Transient Signals," IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), pp. 3--7, June, 2008.
[6]
M. Potkonjak et al., "Hardware Trojan Horse Detection Using Gate-Level Characterization," in Proc. Design Automation Conf. (DAC), ACM Press, pp. 688--693, 2009.
[7]
X. Wang, H. Salmani, M. Tehranipoor, and J. Plusquellic, "Hardware Trojan Detection and Isolation using Current Integration and Localized Current Analysis," in in Proc. IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (DFT), pp. 87--95, 2008.
[8]
Y. Jin and Y. Makris, "Hardware Trojan Detection using Path Delay Fingerprint," in Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 51--57, 2008.
[9]
J. Li and J. Lach, "At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection," in Proc. IEEE Int. Hardware-Oriented Security and Trust (HOST), pp. 8--14, 2008.
[10]
M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection," IEEE Design and Test of Computers, pp. 10--25, 2010.
[11]
S. Jha and S. K. Jha, "Randomization Based Probabilistic Approach to Detect Trojan Circuits," in Proc. IEEE High Assurance System Engineering Symposium, pp. 117--124, 2008.
[12]
M. Banga and M. Hsiao, "A Region based Approach for the Identification of Hardware Trojans," in Proc. IEEE Int. Symposium on Hardware-Oriented Security and Trust (HOST), pp. 40--47, 2008.
[13]
F. Wolff, C. Papachristou, S. Bhunia, and R. S. Chakraborty, "Towards Trojan-free Trusted ICs: Problem Analysis and Detection Scheme" in in Proc. Design, Automation and Test in Europe (DATE), pp. 1362--1365, 2008.
[14]
H. Salmani, M. Tehranipoor, and J. Plusquellic, "A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time,"
[15]
M. Abramovici and P. Bradley, "Integrated Circuit Security: new Threats and Solutions," in 5th Annual Workshop on Cyber Security and information intelligence Research: Cyber Security and information intelligence Challenges and Strategies, pp. 13--15, April. 2009.
[16]
I. T. Jolliffe, "Principal Component Analysis (2ed Edition)," Springer, pp. 150--165, 2002.

Cited By

View all
  • (2024)Sensors for Remote Power Attacks: New Developments and Challenges2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASP-DAC58780.2024.10473890(333-340)Online publication date: 22-Jan-2024
  • (2023)Circuit Topology-Aware Vaccination-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.323444042:9(2852-2862)Online publication date: Sep-2023
  • (2023)Unsupervised IC Security with Machine Learning for Trojan Detection2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)10.1109/MWSCAS57524.2023.10406045(20-24)Online publication date: 6-Aug-2023
  • Show More Cited By

Index Terms

  1. Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm ASIC

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ICCAD '12: Proceedings of the International Conference on Computer-Aided Design
    November 2012
    781 pages
    ISBN:9781450315739
    DOI:10.1145/2429384
    • General Chair:
    • Alan J. Hu
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 05 November 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IC trust
    2. hardware Trojan detection
    3. on-chip measurement
    4. process variations

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ICCAD '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 457 of 1,762 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Sensors for Remote Power Attacks: New Developments and Challenges2024 29th Asia and South Pacific Design Automation Conference (ASP-DAC)10.1109/ASP-DAC58780.2024.10473890(333-340)Online publication date: 22-Jan-2024
    • (2023)Circuit Topology-Aware Vaccination-Based Hardware Trojan DetectionIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2023.323444042:9(2852-2862)Online publication date: Sep-2023
    • (2023)Unsupervised IC Security with Machine Learning for Trojan Detection2023 IEEE 66th International Midwest Symposium on Circuits and Systems (MWSCAS)10.1109/MWSCAS57524.2023.10406045(20-24)Online publication date: 6-Aug-2023
    • (2022)A Primer on Hardware Trojans including Platform Specific Attacks and Machine Learning for DetectionSoutheastCon 202210.1109/SoutheastCon48659.2022.9763966(479-486)Online publication date: 26-Mar-2022
    • (2022)A comprehensive survey of physical and logic testing techniques for Hardware Trojan detection and preventionJournal of Cryptographic Engineering10.1007/s13389-022-00295-w12:4(495-522)Online publication date: 16-Jul-2022
    • (2021)Side-channel Analysis for Hardware Trojan Detection using Machine Learning2021 IEEE International Test Conference India (ITC India)10.1109/ITCIndia52672.2021.9532888(1-6)Online publication date: 18-Jul-2021
    • (2021)Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey2021 IEEE International Symposium on Circuits and Systems (ISCAS)10.1109/ISCAS51556.2021.9401254(1-5)Online publication date: May-2021
    • (2020)Survey of Hardware Trojan Threats and Detection2020 International Symposium on Electromagnetic Compatibility - EMC EUROPE10.1109/EMCEUROPE48519.2020.9245675(1-5)Online publication date: 23-Sep-2020
    • (2020)Detecting Hardware Trojans by Monitoring Powersupply Noise Based on Ring Oscillator Network in FPGA2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE)10.1109/AEMCSE50948.2020.00095(410-413)Online publication date: Apr-2020
    • (2020)Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and MitigationIEEE Access10.1109/ACCESS.2020.29732608(31371-31397)Online publication date: 2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media