212 Hits in 7.1 sec

Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps

Abdullah Nazma Nowroz, Kangqiao Hu, Farinaz Koushanfar, Sherief Reda
2014 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
In this paper, we propose a completely new post-silicon multimodal approach using runtime thermal and power maps for Trojan detection and localization.  ...  We introduce 1 regularization in the thermal to power inversion procedure which improves Trojan detection accuracy.  ...  Our proposed detection method utilizes these very high resolution thermal and power maps in order to detect IC Trojans which results into a very high sensitivity Trojan detection technique. III.  ... 
doi:10.1109/tcad.2014.2354293 fatcat:mxguhksnsfbpzanvrm6kd5em3u

High-Sensitivity Hardware Trojan Detection Using Multimodal Characterization

Kangqiao Hu, Abdullah Nazma Nowroz, Sherief Reda, Farinaz Koushanfar
2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013  
In this paper, we present new accurate methods for Trojan detection that are based upon post-silicon multimodal thermal and power characterization techniques.  ...  Our approach first estimates the detailed post-silicon spatial power consumption using thermal maps of the IC, then applies 2DPCA to extract features of the spatial power consumption, and finally uses  ...  Acknowledgments: This work is partially supported by NSF grant numbers 1115424 and 1116858.  ... 
doi:10.7873/date.2013.263 dblp:conf/date/HuNRK13 fatcat:bf7swv6sqrbjtavcg4ry6z6oje

Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric – Detection Methodology and Mitigation

Sohaib Aslam, Ian K Jennions, Mohammad Samie, Suresh Perinpanayagam, Yisen Fang
2020 IEEE Access  
Accordingly, we present a comprehensive FPGA security scheme, comprising novel elements of hardware Trojan infection, detection, and mitigation, to protect FPGA applications against the hardware Trojan  ...  The hardware Trojan detection sub-scheme provides a unique lightweight threshold voltage-aware sensor with a detection sensitivity of 0.251mV/nA.  ...  SENSOR AND HARDWARE TROJAN DETECTION SCHEME -TESTING AND ANALYSIS The correct verification of the effectiveness and sensitivity of threshold voltage based sensor for a hardware Trojan detection scheme  ... 
doi:10.1109/access.2020.2973260 fatcat:n2kjanchovhqhbpxaytynf65jy

Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images [article]

Maitreyi Ashok, Matthew J. Turner, Ronald L. Walsworth, Edlyn V. Levine, Anantha P. Chandrakasan
2022 arXiv   pre-print
This paper presents a method for hardware trojan detection in integrated circuits.  ...  QDM magnetic imaging is enhanced using quantum control techniques and improved diamond material to increase magnetic field sensitivity by a factor of 4 and measurement speed by a factor of 16 over previous  ...  BACKGROUND Hardware Trojan Detection Prior research on nondestructive methods for hardware trojan detection spans functional testing, side channel testing, and use of localized detection circuitry within  ... 
arXiv:2204.14228v1 fatcat:gnousig5gzdihgqmkcrkqtakra

Hardware Trojan Attacks: Threat Analysis and Countermeasures

Swarup Bhunia, Michael S. Hsiao, Mainak Banga, Seetharam Narasimhan
2014 Proceedings of the IEEE  
This paper is a survey of the state-of-the-art Trojan attacks, modeling, and countermeasures.  ...  Region-based approach using current measurements from multiple power ports can be used for isolating Trojan effect with high sensitivity [40] .  ...  Such a temporal selfreferencing approach can provide high detection sensitivity for Trojans of varying sizes.  ... 
doi:10.1109/jproc.2014.2334493 fatcat:kxnyfwrk6jgqrmdpga33odvofq

Intelligent Electromagnetic Sensors for Non-Invasive Trojan Detection

Ethan Chen, John Kan, Bo-Yuan Yang, Jimmy Zhu, Vanessa Chen
2021 Sensors  
Many devices at the extreme edge collect and transmit sensitive information wirelessly for remote computing.  ...  The built-in threat detection approach using the intelligent EM sensors distributed on the power lines is developed to detect abnormal data activities without degrading the performance while achieving  ...  Hardware Trojan Detection Hardware trojan detection methods are broadly categorized as destructive and nondestructive [11, 12] .  ... 
doi:10.3390/s21248288 pmid:34960382 pmcid:PMC8708266 fatcat:2kp2lrthebhv5ixzabfbhnpxca

A Survey on Hardware Vulnerability Analysis Using Machine Learning

Zhixin Pan, Prabhat Mishra
2022 IEEE Access  
There are recent surveys on hardware Trojan detection using machine learning.  ...  To the best of our knowledge, there are no comprehensive surveys on utilization of machine learning techniques for detection and mitigation of a wide variety of hardware vulnerabilities including malicious  ...  SCA is typically used for hardware Trojan detection in integrated circuits by analyzing various sidechannel signatures, such as timing, power and path delay.  ... 
doi:10.1109/access.2022.3173287 fatcat:yri7ggwdnjffzmpgojiuvr54ta

On Reliability Trojan Injection and Detection

Aswin Sreedhar, Sandip Kundu, Israel Koren
2012 Journal of Low Power Electronics  
In this paper we present examples of such reliability Trojans and describe testing approaches for detecting these reliability tampering attempts.  ...  This raises the question of trustable manufactured products for highly sensitive applications.  ...  Perform N-detect test for each such rare nodesFig. 11. Rare event identification and test pattern generation technique. Table I . I Trojan circuit area and power consumption.  ... 
doi:10.1166/jolpe.2012.1225 fatcat:4uesxkklyjf7jlj6qkjbfkiy6m

Towards Energy-Efficient and Secure Computing Systems

Zhiming Zhang, Qiaoyan Yu
2018 Journal of Low Power Electronics and Applications  
Countermeasures against diverse security threats typically incur noticeable hardware cost and power overhead, which may become the obstacle for those countermeasures to be applicable in energy-efficient  ...  This work also uses examples to discuss practical methods for securing the hardware for computing systems to achieve energy efficiency.  ...  We use power consumption per effective packet delivery as a metric to compare different Trojan detection and mitigation methods for NoCs.  ... 
doi:10.3390/jlpea8040048 fatcat:o4gs7zqkyveyflqcp4zioge63i

Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise

Tamzidul Hoque, Seetharam Narasimhan, Xinmu Wang, Sanchita Mal-Sarkar, Swarup Bhunia
2016 Journal of electronic testing  
Side-channel analysis has emerged as an effective approach for detection of hardware Trojans.  ...  Since it uses a chip as a reference to itself, the method completely eliminates the effect of process noise and other design marginalities (e.g. capacitive coupling), thus providing high detection sensitivity  ...  Since for any S x , corresponding T x (s) exists: it can be stated that: P ower e,k,n = P ower e,k,n+1 .  ... 
doi:10.1007/s10836-016-5632-y fatcat:tqg3mhnw35fnnmsp4zrevkxtiq

Hardware Trojans in Chips: A Survey for Detection and Prevention

Chen Dong, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, Yuzhong Chen
2020 Sensors  
In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques.  ...  Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality  ...  the redundant thermal map.  ... 
doi:10.3390/s20185165 pmid:32927772 fatcat:doxvl4ai3nfchgdji6zo7z4sdm

Paper Title

2021 2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)  
Smart vehicle monitoring for detecting anomalies on CAN bus A MUX based Latch Technique for the detection of Hardware Trojan using Path Delay Analysis Empirical Performance Analysis of Speech Based Age  ...  model over a cell in wireless network for efficient resource planning Thermal Aware Power Save Policy For Hot And Cold Jobs Channel Model for Indian Regional Navigation Satellite System (IRNSS) using  ... 
doi:10.1109/conecct52877.2021.9622649 fatcat:y65u5a3sqrg2jmi74gebh5mjc4

Analog hardware trojan design and detection in OFDM based wireless cryptographic ICs

Liakot Ali, Farshad, Jun Ma
2021 PLoS ONE  
Additive White Gaussian Channel (AWGN) and developed a Cyclic Prefix (CP) checker based detection mechanism named "SENTRY" to detect such trojans once it is triggered.  ...  Over the last decade, extensive research has been carried on HT detection methods for digital circuits.  ...  Acknowledgments We gratefully acknowledge that this research work has been performed using all the facilities of the embedded system laboratory of IICT, BUET.  ... 
doi:10.1371/journal.pone.0254903 pmid:34324521 pmcid:PMC8321131 fatcat:5z5k6ic4wzfylo55bdq5xprgvq

Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network [article]

Rozhin Yasaei, Sina Faezi, Mohammad Abdullah Al Faruque
2022 arXiv   pre-print
The risk of using untrusted third-Party Intellectual Property (3PIP) is the possibility for adversaries to insert malicious modifications known as Hardware Trojans (HTs).  ...  Afterward, the graph convolution performs automatic feature extraction for nodes to classify the nodes as Trojan or benign.  ...  precision Symbolic algebra [2] Pre-S No No High High HT localization with 100% recall and 74% precision Thermal map [3] Post-S results on their limited sets of benchmarks.  ... 
arXiv:2207.06664v1 fatcat:ynfzmkg3mfbejm6g3cln5y6jx4

A Survey on Machine Learning against Hardware Trojan Attacks: Recent Advances and Challenges

Zhao Huang, Quan Wang, Yin Chen, Xiaohong Jiang
2020 IEEE Access  
INDEX TERMS Machine learning, hardware Trojan detection, design-for-security, bus security, secure architecture. 10796 This work is licensed under a Creative Commons Attribution 4.0 License.  ...  In particular, we first provide a classification of all possible HT attacks and then review recent developments from four perspectives, i.e., HT detection, design-for-security (DFS), bus security, and  ...  Dang, and so on for their suggestions during the revision of the article.  ... 
doi:10.1109/access.2020.2965016 fatcat:dqh376eosnefbl4pyk6ad4sxjq
« Previous Showing results 1 — 15 out of 212 results