Hardware Trojan detection based on the side-channel signal analysis

With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware...

Full description

Saved in:
Bibliographic Details
Main Author: Lee, Liang Yuan
Other Authors: Chang Chip Hong
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/61286
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-61286
record_format dspace
spelling sg-ntu-dr.10356-612862023-07-07T17:10:34Z Hardware Trojan detection based on the side-channel signal analysis Lee, Liang Yuan Chang Chip Hong School of Electrical and Electronic Engineering DRNTU::Engineering With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and even worse situation will be a fatal damage on the system. These vulnerabilities would cause serious impact on various ways like military system, hardware security, and so on. Over the year, side channel analysis which is one of most popular method in hardware Trojan detection has been used to detect the presence of hardware Trojan due to its advantages such as non-invasiveness, simplicity and low cost. This work presents a proposed novel technology how to detect hardware Trojan is based on power side channel analysis. This method is about designing a current sensing circuit to generate a current waveform on the power grid respect to timing pulse to check whether the circuit is infected by hardware Trojan or uninfected by hardware Trojan. It also will increase the sensitivity of hardware Trojan detection by combining the current waveform with path sensitization abnormalities into a single side channel signal that result can be easily obtained by using this current sensing circuit design. The main advantage of this current sensing circuit design is that the impact of process variation can be reduced. The different current waveforms between the infected circuit and original circuit can be observed through the current sensing circuit. The result will be a significant difference regardless of considering the process variation. This proposed sensing circuit has been executed by using the 65 nanometer of Chartered Semiconductor Manufacturing (CSM 65nm). The ISCAS-85 test benchmark with high level gate design circuits are used in this experiment by software of CADENCE System Design, Virtuoso. Bachelor of Engineering 2014-06-09T02:35:59Z 2014-06-09T02:35:59Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/61286 en Nanyang Technological University 57 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering
spellingShingle DRNTU::Engineering
Lee, Liang Yuan
Hardware Trojan detection based on the side-channel signal analysis
description With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and even worse situation will be a fatal damage on the system. These vulnerabilities would cause serious impact on various ways like military system, hardware security, and so on. Over the year, side channel analysis which is one of most popular method in hardware Trojan detection has been used to detect the presence of hardware Trojan due to its advantages such as non-invasiveness, simplicity and low cost. This work presents a proposed novel technology how to detect hardware Trojan is based on power side channel analysis. This method is about designing a current sensing circuit to generate a current waveform on the power grid respect to timing pulse to check whether the circuit is infected by hardware Trojan or uninfected by hardware Trojan. It also will increase the sensitivity of hardware Trojan detection by combining the current waveform with path sensitization abnormalities into a single side channel signal that result can be easily obtained by using this current sensing circuit design. The main advantage of this current sensing circuit design is that the impact of process variation can be reduced. The different current waveforms between the infected circuit and original circuit can be observed through the current sensing circuit. The result will be a significant difference regardless of considering the process variation. This proposed sensing circuit has been executed by using the 65 nanometer of Chartered Semiconductor Manufacturing (CSM 65nm). The ISCAS-85 test benchmark with high level gate design circuits are used in this experiment by software of CADENCE System Design, Virtuoso.
author2 Chang Chip Hong
author_facet Chang Chip Hong
Lee, Liang Yuan
format Final Year Project
author Lee, Liang Yuan
author_sort Lee, Liang Yuan
title Hardware Trojan detection based on the side-channel signal analysis
title_short Hardware Trojan detection based on the side-channel signal analysis
title_full Hardware Trojan detection based on the side-channel signal analysis
title_fullStr Hardware Trojan detection based on the side-channel signal analysis
title_full_unstemmed Hardware Trojan detection based on the side-channel signal analysis
title_sort hardware trojan detection based on the side-channel signal analysis
publishDate 2014
url http://hdl.handle.net/10356/61286
_version_ 1772827994128121856