A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement

36Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Hardware Trojan Horses (HTHs) are malicious modifications inserted in Integrated Circuit during fabrication steps. The HTHs are very small and can cause damages in circuit function. They cannot be detected by conventional testing methods. Due to dangerous effects of them, Hardware Trojan Detection has become a major concern in hardware security. In this paper, a new HTH detection method is presented based on side-channel analysis that uses path delay measurement. In this method, we find and observe the paths that Trojans have most effect on them. Most of the previous works add some structures to the circuit and need a large overhead cost. But, in our method, there is no modification in the circuit and we can use it for testing the circuits received after fabrication. The proposed method is evaluated with Xilinx FPGA over a number of test circuits. The results show that measuring the delays on 20 paths with an accuracy of 0.01ns can detect more than 80% of Trojans.

Cite

CITATION STYLE

APA

Amelian, A., & Borujeni, S. E. (2018). A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement. Journal of Circuits, Systems and Computers, 27(9). https://doi.org/10.1142/S0218126618501384

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free