2010
DOI: 10.1007/978-3-642-15031-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

Abstract: Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as "Hardware Trojan", has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured side-channel parameter, such as supply current. Besides, existing side-channel approaches suffer from reduced Trojan d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(41 citation statements)
references
References 10 publications
(13 reference statements)
0
41
0
Order By: Relevance
“…Most existing HT detection techniques consider HTs inserted during fabrication and use side-channel analysis for HT detection (e.g., power-based analysis [6], timing-based analysis [7], and current-based analysis [8]). To reduce the sensitivity of SCA-based HT detection methods on the process variation, several gate-level characterization (GLC) techniques were proposed for HT detection recently [9,10].…”
Section: Verification For Hardware Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…Most existing HT detection techniques consider HTs inserted during fabrication and use side-channel analysis for HT detection (e.g., power-based analysis [6], timing-based analysis [7], and current-based analysis [8]). To reduce the sensitivity of SCA-based HT detection methods on the process variation, several gate-level characterization (GLC) techniques were proposed for HT detection recently [9,10].…”
Section: Verification For Hardware Trustmentioning
confidence: 99%
“…Most prior works on HT detection are based on side-channel analysis (SCA) (e.g., [6][7][8][9][10]). The idea behind is that a HT will affect some side-channel signatures, such as path delay and supply current, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%
“…Hardware Trojan is also used to cause or amplify side-channel leakage of cryptographic hardware [25]. Note that using side channels to detect a hardware Trojan has also been the subject of several studies [26], [27], [28].…”
Section: Salware Vs Malwarementioning
confidence: 99%
“…Since traditional VLSI testing techniques are not suitable for HT detection without knowledge of the HT and trigger conditions [3], the mainstream HT detection method is side-channel analysis. The idea behind is that HTs must affect some side-channel signatures, e.g., path delay [4,5], supply current [6,7,8] or power consumption [9], even when functionally-unactivated.…”
Section: Introductionmentioning
confidence: 99%