Title :
Performance of delay-based Trojan detection techniques under parameter variations
Author :
Rai, Devendra ; Lach, John
Author_Institution :
Charles L. Brown Dept. of Electr. & Comput. Eng., Univ. of Virginia, Charlottesville, VA, USA
Abstract :
Various schemes utilizing path delay information have been proposed to determine the authenticity of a given integrated circuit. However, the performance of these techniques under parameter variations must be evaluated, as delay variations may mask the delay impact of design alterations, such as hardware Trojan horses. This paper examines how path delay characterization performs under extensive delay variations, and results reveal that it remains a powerful tool for detecting design alterations by leveraging statistical techniques.
Keywords :
integrated circuits; security of data; statistical analysis; delay-based Trojan detection techniques; hardware Trojan horses; integrated circuit; parameter variations; path delay characterization; path delay information; statistical techniques; Clocks; Delay; Displays; Electric variables; Hardware; Integrated circuit interconnections; Invasive software; Manufacturing; Signal processing; Timing;
Conference_Titel :
Hardware-Oriented Security and Trust, 2009. HOST '09. IEEE International Workshop on
Conference_Location :
Francisco, CA
Print_ISBN :
978-1-4244-4805-0
Electronic_ISBN :
978-1-4244-4804-3
DOI :
10.1109/HST.2009.5224966