Abstract
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empirical Analysis of the Security Threats and Risks that Drones Face, Represent, and Mitigation;2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS);2024-04-24
2. FPGA Based Intelligent Hardware Trojan Design and its SoC Implementation;2023 30th IEEE International Conference on Electronics, Circuits and Systems (ICECS);2023-12-04
3. Application of LSTM Auto Encoder in Hardware Trojan Detection;2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC);2023-03-08
4. An Efficient Machine Learning Approach for Hardware Trojan Detection;2022 25th International Conference on Computer and Information Technology (ICCIT);2022-12-17
5. A Non-Destructive Method for Hardware Trojan Detection Based on Radio Frequency Fingerprinting;Electronics;2022-11-17