Visible to the public Behavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection

TitleBehavior Profiling of Power Distribution Networks for Runtime Hardware Trojan Detection
Publication TypeConference Paper
Year of Publication2017
AuthorsKhalid, F., Hasan, S. R., Hasan, O., Awwadl, F.
Conference Name2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS)
Keywordsbehavior profiling, circuit under test, classical Advanced Encryption Standard circuit, composability, cryptography, cyber physical systems, digital power profile, golden data model, Hardware, integrated circuits, Intrusion detection, invasive software, IP based SoC, manufacturing test phase, mission critical applications, Monitoring, power distribution networks, pubcrawl, resilience, Resiliency, Runtime, runtime hardware Trojan detection techniques, simple processing mechanism, system-on-chip, Temperature sensors, traditional techniques, trojan horse detection, Trojan horses
Abstract

Runtime hardware Trojan detection techniques are required in third party IP based SoCs as a last line of defense. Traditional techniques rely on golden data model or exotic signal processing techniques such as utilizing Choas theory or machine learning. Due to cumbersome implementation of such techniques, it is highly impractical to embed them on the hardware, which is a requirement in some mission critical applications. In this paper, we propose a methodology that generates a digital power profile during the manufacturing test phase of the circuit under test. A simple processing mechanism, which requires minimal computation of measured power signals, is proposed. For the proof of concept, we have applied the proposed methodology on a classical Advanced Encryption Standard circuit with 21 available Trojans. The experimental results show that the proposed methodology is able to detect 75% of the intrusions with the potential of implementing the detection mechanism on-chip with minimal overhead compared to the state-of-the-art techniques.

URLhttps://ieeexplore.ieee.org/document/8053173/
DOI10.1109/MWSCAS.2017.8053173
Citation Keykhalid_behavior_2017