Hardware Trojan detection based on the side-channel signal analysis
With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/61286 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-61286 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-612862023-07-07T17:10:34Z Hardware Trojan detection based on the side-channel signal analysis Lee, Liang Yuan Chang Chip Hong School of Electrical and Electronic Engineering DRNTU::Engineering With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and even worse situation will be a fatal damage on the system. These vulnerabilities would cause serious impact on various ways like military system, hardware security, and so on. Over the year, side channel analysis which is one of most popular method in hardware Trojan detection has been used to detect the presence of hardware Trojan due to its advantages such as non-invasiveness, simplicity and low cost. This work presents a proposed novel technology how to detect hardware Trojan is based on power side channel analysis. This method is about designing a current sensing circuit to generate a current waveform on the power grid respect to timing pulse to check whether the circuit is infected by hardware Trojan or uninfected by hardware Trojan. It also will increase the sensitivity of hardware Trojan detection by combining the current waveform with path sensitization abnormalities into a single side channel signal that result can be easily obtained by using this current sensing circuit design. The main advantage of this current sensing circuit design is that the impact of process variation can be reduced. The different current waveforms between the infected circuit and original circuit can be observed through the current sensing circuit. The result will be a significant difference regardless of considering the process variation. This proposed sensing circuit has been executed by using the 65 nanometer of Chartered Semiconductor Manufacturing (CSM 65nm). The ISCAS-85 test benchmark with high level gate design circuits are used in this experiment by software of CADENCE System Design, Virtuoso. Bachelor of Engineering 2014-06-09T02:35:59Z 2014-06-09T02:35:59Z 2014 2014 Final Year Project (FYP) http://hdl.handle.net/10356/61286 en Nanyang Technological University 57 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering |
spellingShingle |
DRNTU::Engineering Lee, Liang Yuan Hardware Trojan detection based on the side-channel signal analysis |
description |
With the globalization of integrated circuit design and fabrication process, the main concerned issue is that a malicious logic component which can be intentionally embedded into circuit during the manufacturing and fabrication processes. The malicious logic component can be referred to as hardware Trojan. It will leak the users’ confidential information out to the adversary, reduce the overall system performance and even worse situation will be a fatal damage on the system. These vulnerabilities would cause serious impact on various ways like military system, hardware security, and so on.
Over the year, side channel analysis which is one of most popular method in hardware Trojan detection has been used to detect the presence of hardware Trojan due to its advantages such as non-invasiveness, simplicity and low cost. This work presents a proposed novel technology how to detect hardware Trojan is based on power side channel analysis. This method is about designing a current sensing circuit to generate a current waveform on the power grid respect to timing pulse to check whether the circuit is infected by hardware Trojan or uninfected by hardware Trojan. It also will increase the sensitivity of hardware Trojan detection by combining the current waveform with path sensitization abnormalities into a single side channel signal that result can be easily obtained by using this current sensing circuit design.
The main advantage of this current sensing circuit design is that the impact of process variation can be reduced. The different current waveforms between the infected circuit and original circuit can be observed through the current sensing circuit. The result will be a significant difference regardless of considering the process variation. This proposed sensing circuit has been executed by using the 65 nanometer of Chartered Semiconductor Manufacturing (CSM 65nm). The ISCAS-85 test benchmark with high level gate design circuits are used in this experiment by software of CADENCE System Design, Virtuoso. |
author2 |
Chang Chip Hong |
author_facet |
Chang Chip Hong Lee, Liang Yuan |
format |
Final Year Project |
author |
Lee, Liang Yuan |
author_sort |
Lee, Liang Yuan |
title |
Hardware Trojan detection based on the side-channel signal analysis |
title_short |
Hardware Trojan detection based on the side-channel signal analysis |
title_full |
Hardware Trojan detection based on the side-channel signal analysis |
title_fullStr |
Hardware Trojan detection based on the side-channel signal analysis |
title_full_unstemmed |
Hardware Trojan detection based on the side-channel signal analysis |
title_sort |
hardware trojan detection based on the side-channel signal analysis |
publishDate |
2014 |
url |
http://hdl.handle.net/10356/61286 |
_version_ |
1772827994128121856 |