Fakir Sharif Hossain, Mohammed Abdul Kader, T. Yoneda
{"title":"EqSA: A Golden-IC Free Equal Power Self-Authentication for Hardware Trojan Detection","authors":"Fakir Sharif Hossain, Mohammed Abdul Kader, T. Yoneda","doi":"10.1109/ICISET.2018.8745594","DOIUrl":null,"url":null,"abstract":"Due to outsourcing of numerous stages of IC manufacturing process in different foundries, the security risk such as hardware Trojan becomes a potential threat. This work presents a power based side-channel analysis framework, which magnifies the detection sensitivity and does not rely on a Golden IC. This method exhibits design for security (DFS) addressing scan chain partitioning and segmentation technique for scalability. An equal-power self-referencing approach is proposed in order to detect Trojans. The detection process uses parametric comparison of at least two neighboring regions, which consumes equal power for a set of selected patterns. We generate launch-on-capture test patterns and apply them with modification so as to restrict the switching activities (noises) from other regions. A theoretical analysis in the presence of die-to-die and intra-die process variations with the help of other existing methods is addressed. In our experiments, conducted for both combinational and sequential small Trojan circuits, we report a high detection rate thus substantiating its effectiveness in realizing an equal power self-authentication technique which is independent of any Golden IC.","PeriodicalId":6608,"journal":{"name":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","volume":"15 1","pages":"86-91"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Innovations in Science, Engineering and Technology (ICISET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISET.2018.8745594","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Due to outsourcing of numerous stages of IC manufacturing process in different foundries, the security risk such as hardware Trojan becomes a potential threat. This work presents a power based side-channel analysis framework, which magnifies the detection sensitivity and does not rely on a Golden IC. This method exhibits design for security (DFS) addressing scan chain partitioning and segmentation technique for scalability. An equal-power self-referencing approach is proposed in order to detect Trojans. The detection process uses parametric comparison of at least two neighboring regions, which consumes equal power for a set of selected patterns. We generate launch-on-capture test patterns and apply them with modification so as to restrict the switching activities (noises) from other regions. A theoretical analysis in the presence of die-to-die and intra-die process variations with the help of other existing methods is addressed. In our experiments, conducted for both combinational and sequential small Trojan circuits, we report a high detection rate thus substantiating its effectiveness in realizing an equal power self-authentication technique which is independent of any Golden IC.