Academia.eduAcademia.edu

Outline

FPGA Trojan Detection Using Length-Optimized Ring Oscillators

2014, 2014 17th Euromicro Conference on Digital System Design

https://doi.org/10.1109/DSD.2014.74

Abstract

Hardware Trojan horses are a realistic threat for both ASIC and FPGA systems. Ring Oscillators (ROs) can be used to detect the presence of malicious hardware functionality. The length of an RO is a significant parameter for detecting efficiently malicious logic (sensitivity) while maintaining a low space and power profile. We explore through simulation the effect of the RO length on detecting different classes of Trojan horses on an FPGA.

References (20)

  1. M. Tehranipoor and F. Koushanfar, "A Survey of Hardware Trojan Taxonomy and Detection", IEEE Design and Test of Computers, Vol. 27, No. 1, pp. 10-25, January 2010.
  2. P. Kitsos and A. G. Voyiatzis, "Towards a Hardware Trojan Detection Methodology", 2nd EUROMICRO/IEEE Workshop on Embedded and Cyber-Physica Systems (ECYPS 2014), Budva, Montenegro, 15-19, June 2014.
  3. X. Wang, M. Tehranipoor and J. Plusquellic, "Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions", in Proc. of the 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, Washington, DC, USA, pp. 15-19, 2008.
  4. R. S. Chakraborty, S. Paul, S. Bhunia, "On-demand Transparency for Improving Hardware Trojan Detectability", IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp. 48-50, 2008
  5. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint", in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp. 51-57, 2008.
  6. R. M. Rad, J. Plusquellic, M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans Using Power Supply Transient Signals", in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST'08), pp. 3-7, 2008.
  7. S. Dutt and L. Li, "Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures", ACM Transactions on Reconfigurable Technology and Systems (TRETS), Volume 2 Issue 1, March 2009.
  8. K. Xiao, X. Zhang, and M. Tehranipoor, "A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay", IEEE Design & Test, Vol. 30, Issue. 2, pp. 26-34, 2013.
  9. F. C. Bao and A. Srivastava, "Temperature Tracking: An Innovative Run-Time Approach for Hardware Trojan Detection", IEEE/ACM International Conference on Computer-Aided Design (ICCAD), November 2013.
  10. I. Exurville, J. Fournier, J.-M. Dutertre, B. Robisson, A. Tria, "Practical Measurements of Data Path Delays for IP Authentication & Integrity Verification", 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC 2013), pp. 1- 6, 2013.
  11. S. Bhasin, J.-L. Danger, S. Guilley, X. T. Ngo and Laurent Sauvge, "Hardware Trojan Horses in Cryptographic IP Cores", Tenth Workshop on Fault Diagnosis and Tolerance in Cryptography, August 20, 2013, Santa Barbara, CA, USA.
  12. C. E. Irvine and K. Levitt, "Trusted Hardware: Can it be Trustworthy?", 44th annual Design Automation Conference, pp. 1-4, June 2007.
  13. J. Rajendran, V. Jyothi, O. Sinanoglu, R. Karri, , "Design and Analysis of Ring Oscillator Based Design-for-Trust Technique", VLSI Test Symposium (VTS), 2011 IEEE 29th , pp. 105-110, 1-5 May 2011.
  14. X. Zhang and M. Tehranipoor, "RON: An On-chip Ring Oscillator Network for Hardware Trojan Detection", Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011, pp.1,6, 14-18 March 2011.
  15. J. Rilling, D. Graziano, J. Hitchcock, T. Meyer, X. Wang; P. Jones, J. Zambreno, "Circumventing a Ring Oscillator Approach to FPGA-based Hardware Trojan Detection", Computer Design (ICCD), 2011 IEEE 29th International Conference on , pp.289,292, 9-12 Oct. 2011.
  16. A. Ferraiuolo, X. Zhang, and M. Tehranipoor, "Experimental Analysis of a Ring Oscillator Network for Hardware Trojan Detection in a 90nm ASIC", Computer-Aided Design (ICCAD), 2012 IEEE/ACM International Conference on, pp.37,42, 5-8 Nov. 2012.
  17. A.Maiti, J. Casarona, L. Mchale, and P. Schaumont, "A Large Scale Characterization of RO-PUF", IEEE International Symposium on Hardware Oriented Security and Trust, pp. 94-99, June 2010.
  18. X. Zhang, A. Ferraiulo and M. Tehranipoor, "Detection of Trojans Using a Combined Ring Oscillator Network and Off-Chip Transient Power Analysis", ACM Journal on Emerging Technologies in Computing Systems (JETC), Volume 9 Issue 3, Article No. 25, September 2013.
  19. J. Daemen and P. Kitsos, "The Self-synchronizing Stream Cipher Mosquito", First Phase of ECRYPT Stream Cipher Project Report 2005/018, 2005, Scandinavian Congress Center, Aarhus, Denmark, 26- 27 May 2005.
  20. W. Xinmu, S. Narasimhan, A. Krishna, T. Mal-Sarkar, S. Bhunia, "Sequential Hardware Trojan: Side-channel Aware Design and Placement" Computer Design (ICCD), 2011 IEEE 29th International Conference on , pp.297,300, 9-12 Oct. 2011.