Detecting hardware trojan through time domain constrained estimator based unified subspace technique
Hardware Trojan (HT) has emerged as an impending security threat to hardware systems. However, conventional functional tests fail to detect HT since Trojans are triggered by rare events. Most of the existing side-channel based HT detection techniques just simply compare and analyze circuit's pa...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/100815 http://hdl.handle.net/10220/19687 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-100815 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1008152020-03-07T14:00:32Z Detecting hardware trojan through time domain constrained estimator based unified subspace technique Xue, Mingfu Liu, Wei Hu, Aiqun Wang, Youdong School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Hardware Trojan (HT) has emerged as an impending security threat to hardware systems. However, conventional functional tests fail to detect HT since Trojans are triggered by rare events. Most of the existing side-channel based HT detection techniques just simply compare and analyze circuit's parameters and offer no signal calibration or error correction properties, so they suffer from the challenge and interference of large process variations (PV) and noises in modern nanotechnology which can completely mask Trojan's contribution to the circuit. This paper presents a novel HT detection method based on subspace technique which can detect tiny HT characteristics under large PV and noises. First, we formulate the HT detection problem as a weak signal detection problem, and then we model it as a feature extraction model. After that, we propose a novel subspace HT detection technique based on time domain constrained estimator. It is proved that we can distinguish the weak HT from variations and noises through particular subspace projections and reconstructed clean signal analysis. The reconstructed clean signal of the proposed algorithm can also be used for accurate parameter estimation of circuits, e.g. power estimation. The proposed technique is a general method for related HT detection schemes to eliminate noises and PV. Both simulations on benchmarks and hardware implementation validations on FPGA boards show the effectiveness and high sensitivity of the new HT detection technique. Published version 2014-06-12T02:52:43Z 2019-12-06T20:28:49Z 2014-06-12T02:52:43Z 2019-12-06T20:28:49Z 2014 2014 Journal Article XUE, M., LIU, W., HU, A., & WANG, Y. (2014). Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique. IEICE Transactions on Information and Systems, E97.D(3), 606-609. 0916-8532 https://hdl.handle.net/10356/100815 http://hdl.handle.net/10220/19687 10.1587/transinf.E97.D.606 en IEICE transactions on information and systems © 2014 The Institute of Electronics, Information and Communication Engineers. This paper was published in IEICE Transactions on Information and Systems and is made available as an electronic reprint (preprint) with permission of The Institute of Electronics, Information and Communication Engineers. The paper can be found at the following official DOI: http://dx.doi.org/10.1587/transinf.E97.D.606. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper is prohibited and is subject to penalties under law. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
country |
Singapore |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering::Computer hardware, software and systems Xue, Mingfu Liu, Wei Hu, Aiqun Wang, Youdong Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
description |
Hardware Trojan (HT) has emerged as an impending security threat to hardware systems. However, conventional functional tests fail to detect HT since Trojans are triggered by rare events. Most of the existing side-channel based HT detection techniques just simply compare and analyze circuit's parameters and offer no signal calibration or error correction properties, so they suffer from the challenge and interference of large process variations (PV) and noises in modern nanotechnology which can completely mask Trojan's contribution to the circuit. This paper presents a novel HT detection method based on subspace technique which can detect tiny HT characteristics under large PV and noises. First, we formulate the HT detection problem as a weak signal detection problem, and then we model it as a feature extraction model. After that, we propose a novel subspace HT detection technique based on time domain constrained estimator. It is proved that we can distinguish the weak HT from variations and noises through particular subspace projections and reconstructed clean signal analysis. The reconstructed clean signal of the proposed algorithm can also be used for accurate parameter estimation of circuits, e.g. power estimation. The proposed technique is a general method for related HT detection schemes to eliminate noises and PV. Both simulations on benchmarks and hardware implementation validations on FPGA boards show the effectiveness and high sensitivity of the new HT detection technique. |
author2 |
School of Electrical and Electronic Engineering |
author_facet |
School of Electrical and Electronic Engineering Xue, Mingfu Liu, Wei Hu, Aiqun Wang, Youdong |
format |
Article |
author |
Xue, Mingfu Liu, Wei Hu, Aiqun Wang, Youdong |
author_sort |
Xue, Mingfu |
title |
Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
title_short |
Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
title_full |
Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
title_fullStr |
Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
title_full_unstemmed |
Detecting hardware trojan through time domain constrained estimator based unified subspace technique |
title_sort |
detecting hardware trojan through time domain constrained estimator based unified subspace technique |
publishDate |
2014 |
url |
https://hdl.handle.net/10356/100815 http://hdl.handle.net/10220/19687 |
_version_ |
1681034243326607360 |