Title :
Hardware trojan detection by symmetry breaking in path delays
Author :
Yoshimizu, Norimasa
Author_Institution :
NanoMason Inc., Martinez, CA, USA
Abstract :
This paper discusses the detection of hardware Trojans (HTs) by their breaking of symmetries within integrated circuits (ICs), as measured by path delays. Typically, path delay or side channel methods rely on comparisons to a golden, or trusted, sample. However, golden standards are affected by inter-and intra-die variations which limit the confidence in such comparisons. Symmetry is a way to detect modifications to an IC with increased confidence by confirming subcircuit consistencies within as it was originally designed. The difference in delays from a given path to a set of symmetric paths will be the same unless an inserted HT breaks symmetry. Symmetry can naturally exist in ICs or be artificially added. We describe methods to find and measure path delays against symmetric paths, as well as the advantages and disadvantages of this method. We discuss results of examples from benchmark circuits demonstrating the detection of hardware Trojans.
Keywords :
delays; electronic engineering computing; integrated circuits; invasive software; HT; IC; benchmark circuits; detect modifications; hardware Trojan detection; integrated circuits; inter-and intra-die variations; path delays; side channel methods; subcircuit consistencies; symmetric paths; symmetry breaking; Delays; Hardware; Integrated circuits; Logic gates; Sensitivity; Transistors; Trojan horses; circuit symmetries; hardware trojan; integrated circuits; path delay;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4799-4114-8
DOI :
10.1109/HST.2014.6855579