DocumentCode :
1278270
Title :
Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad {I}_{\\rm DDQ} s
Author :
Aarestad, Jim ; Acharyya, Dhruva ; Rad, Reza ; Plusquellic, Jim
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of New Mexico, Albuquerque, NM, USA
Volume :
5
Issue :
4
fYear :
2010
Firstpage :
893
Lastpage :
904
Abstract :
Hardware Trojans have emerged as a new threat to the security and trust of computing systems. Hardware Trojans are deliberate and malicious modifications to the logic function implemented within digital and mixed signal chips. In contrast to software Trojans, it is not possible to simply "scan the hard drive" to eradicate a hardware Trojan. Hardware Trojans can be designed to shutdown the chip at some predetermined time and/or when some specific signal or data pattern is received. They may also be designed to remain hidden while leaking confidential information covertly to the adversary. Determining whether a hardware Trojan has been inserted into a chip is extremely difficult for a variety of reasons, e.g., nanometer feature sizes and chip design complexity combine to make optical inspection difficult or impossible. This paper presents experimental results demonstrating the effectiveness of a Trojan detection method that is based on the analysis of a chip\´s Jddqs (steady-state current), which are measured simultaneously from multiple places on the chip. The proposed method also incorporates a technique for virtually eliminating process and test environment variations effects which act to reduce detection sensitivity of traditional testing approaches. Used together, resolution enhancements of up to a 1000 x are possible over conventional single power supply current measurement techniques. A regression-based statistical technique is applied to the data collected from a set of chips fabricated in a 65-nm process to illustrate the detection capabilities and limitations of this type of approach.
Keywords :
invasive software; leakage currents; microprocessor chips; regression analysis; hardware trojans; leakage current analysis; logic function; malicious modifications; multiple supply pad IDDQs; regression based statistical technique; software Trojans; steady state current; trojan detection method; Chip scale packaging; Current measurement; Hardware; Leak detection; Leakage current; Logic functions; Power grids; Power supplies; Security; Signal design; Testing; Trojan horses; Ultraviolet sources; ${I}_{rm DDQ}$ testing; Hardware; Trojan; hardware Trojan detection; hardware intrusion detection; hardware security; hardware-oriented security and trust (HOST); leakage current;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2010.2061228
Filename :
5530381
Link To Document :
بازگشت