A Non-Invasive Hardware Trojan Detection Approach Based on Side-Channel Analysis

Article Preview

Abstract:

Aim at the feasibility of using electromagnetic emanation side-channel to detect hardware Trojan in IC chips, the structure of EM side-channel signal of chip is analyzed and the leaked model about signal is designed. With explaining the principle of Karhunen-Loeve transform, a method that uses KL transform to obtain characteristic signal of EM emanation side-channel is introduced. It detects hardware Trojan by analyzing the difference between the characteristic signal of chip with and without Trojan. Experiments of detecting hardware Trojan in FPGA cipher chip show that we can distinguish effectively the difference between the EM signals of Trojan chip and genuine chip, then the Trojan in chip can be detected.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1776-1780

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] F. Kiamilev, R. Hoover: Demonstration of Hardware Trojans[C]. In: DEFCON 16, LasVegas, (2008).

Google Scholar

[2] King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware[C]/ Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). San Francisco, 2008: 1-8.

Google Scholar

[3] S. Adee, The hunt for the kill switch[C], IEEE Spectrum, p.34–39, May (2008).

Google Scholar

[4] Wang X, Tehranipoor M, Plusquellic J. Detecting malicious inclusions in secure hardware: challenges and solutions[C]/ 1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), US A: California, 2008: 15-19.

DOI: 10.1109/hst.2008.4559039

Google Scholar

[5] P. Kocher Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[C]. In: Proc. of the Advances in Cryptology—CRYPTO'96. LNCS 1109, Springer-Verlag, 1996. 104−113.

DOI: 10.1007/3-540-68697-5_9

Google Scholar

[6] M. Banga, M. S. Hsiao. A Region Based Approach for the Identification of Hardware Trojans[C]/ 1st IEEE International Workshop on Hardware-Oriented Security and Trust (HOST), p.40–47, (2008).

DOI: 10.1109/hst.2008.4559047

Google Scholar

[7] Y. Alkabani and F. Koushanfar. Efficient approximations for IC Trojan detection. [C]/ International Conference on Computer-Aided Design (ICCAD), (2009).

DOI: 10.1145/1687399.1687426

Google Scholar

[8] M. Potkonjak, A. Nahapetian, M. Nelson, and T. Massey. Hardware Trojan horse detection using gate-level characterization. In Design Automation Conference (DAC), (2009).

DOI: 10.1145/1629911.1630091

Google Scholar