{"title":"基于压缩感知算法的硬件恶意电路检测","authors":"M. Priyatharishini, M. Nirmala Devi","doi":"10.1109/ICAECC.2018.8479492","DOIUrl":null,"url":null,"abstract":"It has been observed very critically in the hardware that robust Trojans are inserted in outsourced products resulting in security vulnerabilities. It is more important to note that some areas are in need to be more reliable and trust worthy with respect to security. A perpetrator in any possible location could alter the circuit behavior by including an unintended module in the circuit which can be very hard or impossible to detect until triggered. In this paper, a self-referencing approach is proposed that measures the leakage power of the circuit at different time windows. This approach can efficiently and reliably detect the leakage power that the Trojan creates and also avoids the requirement of golden chip by mapping a chip’s leakage power at different time window. The proposed method is also formulated using compressive sensing algorithm for selecting Trojan revealing test vectors and compresses the chip output. The proposed method is validated on ISCAS’85 benchmark circuits, in which 82% reduction in the output dimensions for the leakage power measurement is achieved for a compression ratio of 0.75.","PeriodicalId":106991,"journal":{"name":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Detection of Malicious Circuit in Hardware using Compressive Sensing Algorithm\",\"authors\":\"M. Priyatharishini, M. Nirmala Devi\",\"doi\":\"10.1109/ICAECC.2018.8479492\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It has been observed very critically in the hardware that robust Trojans are inserted in outsourced products resulting in security vulnerabilities. It is more important to note that some areas are in need to be more reliable and trust worthy with respect to security. A perpetrator in any possible location could alter the circuit behavior by including an unintended module in the circuit which can be very hard or impossible to detect until triggered. In this paper, a self-referencing approach is proposed that measures the leakage power of the circuit at different time windows. This approach can efficiently and reliably detect the leakage power that the Trojan creates and also avoids the requirement of golden chip by mapping a chip’s leakage power at different time window. The proposed method is also formulated using compressive sensing algorithm for selecting Trojan revealing test vectors and compresses the chip output. The proposed method is validated on ISCAS’85 benchmark circuits, in which 82% reduction in the output dimensions for the leakage power measurement is achieved for a compression ratio of 0.75.\",\"PeriodicalId\":106991,\"journal\":{\"name\":\"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"volume\":\"93 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAECC.2018.8479492\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC.2018.8479492","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of Malicious Circuit in Hardware using Compressive Sensing Algorithm
It has been observed very critically in the hardware that robust Trojans are inserted in outsourced products resulting in security vulnerabilities. It is more important to note that some areas are in need to be more reliable and trust worthy with respect to security. A perpetrator in any possible location could alter the circuit behavior by including an unintended module in the circuit which can be very hard or impossible to detect until triggered. In this paper, a self-referencing approach is proposed that measures the leakage power of the circuit at different time windows. This approach can efficiently and reliably detect the leakage power that the Trojan creates and also avoids the requirement of golden chip by mapping a chip’s leakage power at different time window. The proposed method is also formulated using compressive sensing algorithm for selecting Trojan revealing test vectors and compresses the chip output. The proposed method is validated on ISCAS’85 benchmark circuits, in which 82% reduction in the output dimensions for the leakage power measurement is achieved for a compression ratio of 0.75.