SlideShare a Scribd company logo
1 of 32
Detection of Hardware Trojans using Side Channel
Analysis
Presented by
Ashish Maurya
(2015vlsi-13)
ABV-Indian Institute of Information Technology and Management Gwalior,
Morena Link Road, Gwalior, Madhya Pradesh, INDIA - 474015.
January 7, 2016
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 1 / 32
Contents
1 Introduction
2 Detection Techniques
3 Conclusion
4 References
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 2 / 32
Introduction
Electronic systems available in today’s commercial, industrial and military sectors are
massive networks of ICs.
A part or whole of the IC supply chain is situated on different land, which is not
under surveillance.
This provides an opportunity for an adversary to embed functionality not stated in
the specification of the device.
With HT an adversary can extract the secret information by exploiting a physical
modality i.e.
- Power consumption,
- Delay,
- Electromagnetic emission
of the hardware that executes the target application.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 3 / 32
Introduction(contd.)
Figure: General structure of Hardware Trojan
The trigger acts like a sensing circuitry, which activates a Trojan to perform a
specific task.
The payload is responsible for the malicious activity of the Trojan or effect of the
Trojan.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 4 / 32
Introduction(contd.)
Figure: Different Payload insertion approaches
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 5 / 32
Introduction(contd.)
Figure: Trojans with capability of leaking secret information from inside a crypto chip through
power side channels
MOLES circuit is designed to consume data-dependent power as a power
side-channel to leak multi-bit secret keys.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 6 / 32
Introduction(contd.)
Side-channels are the inherent physical properties of a running IC, including timing,
power consumption, electromagnetic radiation and even sound wave.
During testing or normal operation, for a very brief period of time the Trojan circuit
may receive input patterns which activate some of its gates.
Occurrence of signal transition at the input of the Trojan gates is very likely to cause
power or delay variation.
Side channel analysis though promising, must deal with major challenges due to rare
activating nets in the circuit, process variations, and measurement noise.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 7 / 32
Introduction(contd.)
To improve the effectiveness of these detection methods, ICs must be designed with
some detection strategies in mind.
Trust must be considered as an important design criterion in the design flow of
modern ICs instead of being an afterthought.
A golden or Trojan free IC signature is required for comparison purpose in many of
these side channel analysis.
Such signature might be obtained by destructive reverse engineering approach or
from the software simulation of the original design.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 8 / 32
Detection Techniques
DETECTION USING POWER ANALYSIS
Source: Assessment of NAND based ring oscillator for hardware Trojan detection,
IEEE 58th International Midwest Symposium 2015 Circuits and Systems
(MWSCAS), 2015
DETECTION USING ACTIVE CURRENT SENSING CIRCUIT
Source: A Cluster-Based Distributed Active Current Sensing Circuit for Hardware
Trojan Detection, IEEE Transactions on Information Forensics and Security, VOL. 9,
NO. 12, DECEMBER 2014
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 9 / 32
Detection using Power Analysis
Assuming..
- All ICs can be tested under the same temperature,
- The environmental variation will not be considered in this work.
The detection of Trojans using power based analysis, NOT and NAND gate based
ring oscillator (RO) network models are used.
Figure: NOT gate based RO
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 10 / 32
Detection using Power Analysis(contd.)
NAND gate based RO as a power monitor which is more sensitive to voltage
fluctuation shows that the impact of Trojans on the frequency of nearby ROs is
noticeably larger,which is helpful in detection of the Trojan.
If two gates share the same VDD line, transition induced noise in one gate impacts
the supply voltage of the other gate .
Taking advantage of this behavior, it was surmised that any addition or removal of
gates should impact the nearby RO which is sourced by the VDD line connected to
the tempered area of the IC.
Figure: NAND gate based RO
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 11 / 32
Detection using Power Analysis (contd.)
The delay of each gate varies according to parameters such as temperature, supply
voltage (VDD), load capacitance (CL), threshold voltage (Vth),channel length (L),
oxide thickness (Tox), and transistor channel width (W).
Power suppy noise which is also called voltage drop impacts the delay of gates.
f =
1
2 ∗ n ∗ td
(1)
The delay of the gates will change when voltage fluctuate.
This change in delay results some effect on oscillation frequency.
So for same input pattern, power supply noise will affect differently to Trojan free IC
and having Trojan IC.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 12 / 32
Adopted Trojan circuit for analysis
Figure: Single stage of trojan design
Four similar stages constitute the Trojan design, these 20 Trojan gates are placed in
the 10 empty slices that were kept empty in the Trojan Free version of CUA.
The first stage of the Trojan obtains input from the LFSR and the rest of the stages
are supplied by the output of the previous stage.
Such design of Trojan guarantees partial activation during the circuit operation
which should impact the nearby ROs.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 13 / 32
Experimental Setup and RO controller
Figure: Experimental Setup
Figure: RO controller
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 14 / 32
Ring Oscillator Network
Figure: RO network implemented over CUA on FPGA
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 15 / 32
Ring Oscillator Network(contd.)
Figure: NOT gate RO network
RO is inserted in every grid surrounded by power straps.
Each RO stage can be implemented between the VDD and VSS line.
A decoder and multiplexer are used to select which ring oscillator is measured.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 16 / 32
Ring Oscillator Network(contd.)
RON is developed with the ability to detect Trojans that cause power fluctuations,
thereby uncovering the malicious inclusion.
A number of ring oscillators (ROs) acting as power monitors, distributed across the
entire IC.
The output of each ring oscillator represents one part of the power signature of the
entire IC.
The number of ring oscillators, N-RO, could be adjusted according to the size of the
IC and sensitivity to Trojans.
The output of RON in Trojan-free ICs generates a power signature.
Data analysis is used to effectively distinguish the power differences caused by
Trojans from those of process variations, and identifies hardware Trojans inserted
into the IC.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 17 / 32
HT detection Flow
Figure: Flow Graph
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 18 / 32
Result
Figure: Comparison of trojan impact on NAND and NOT gate based RO
The results indicate the effectiveness of the NAND gate based RO network when
ring oscillators located closer to the Trojan undergo a higher percentage of variation
in frequency, compared to the NOT gate based RO.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 19 / 32
DETECTION USING ACTIVE CURRENT SENSING CIRCUIT
Source: A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan
Detection, IEEE Transactions on Information Forensics and Security, VOL. 9, NO. 12,
DECEMBER 2014
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 20 / 32
Detection using Active Current Sensing Circuit
Figure: HT with no delay impact
The main challenge encountered by delay-based side channel analysis is the Trojan
can be inserted in such a manner that there is no difference in external delay
measurement.
Since the Trojan logics are embedded along the path in parallel, it is unlikely that
the delay-based side channel analysis will pick up any anomaly in timing path from
the primary input PI1 or PI2 to primary output PO.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 21 / 32
Detection using Active Current Sensing Circuit(contd.)
Figure: HT with no switching power impact
Figure shows an AND gate whose inputs are from the most significant bits of a
counter.
The Trojan can be triggered only after the counter has run for a much longer time
than any standard test time.
To realize the triggering mechanism, the inputs of the Trojan are connected to some
existing logic nodes of the original design.
It increase the path delay and switching activity duration even if the Trojan remains
dormant, this can be considered as a special case of Trojan with low switching
activity.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 22 / 32
Current Sensing Circuit
Active current sensing circuit is used to extract a signature that encapsulates both
the timing and amplitude of switching activity from the transient power supply
current for HT detection.
Figure: Schematic of the current sensing to path delay monitoring circuit
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 23 / 32
Current Sensing Circuit(contd.)
The current sensing detector is built with a calibrator to adjust the current
comparator threshold against process variations.
When the current sensing HT is activated during normal circuit operation, the
measured characteristics of the power trace will change dramatically to alert for
anomalies.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 24 / 32
Current Sensing Circuit(contd.)
The dynamic IR-drop across the on-resistance R(on) of the sleep transistor M(sleep)
can be sensed to provide the visibility of the active current for the CUT.
The dynamic current is mirrored to a current comparator to produce two voltage
transitions that will mark the path delay.
The comparator output is latched into a scannable flip-flop.
The latched output is propagated to an external output pin by daisy chaining the
scan flip-flops of all detectors.
The delay transition of the comparator output from each detector can be determined
from the corresponding scanned output by varying the phase shift between the
system clock and the sampling clock of the scan chain in the detectors.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 25 / 32
Current mirror
When the sleep transistor M(sleep) is turned on initially, the gate voltage V(sleep)
will be 0.
When there is no current drawn by the CUT, the gate-source voltages of the
transistor pair (M1-M2) are equal.
The mirrored current is given by:
Im ≈ Ron(2µpCox
W
L
I1
3
)
1
2 (1 +
Icut
I1
) (1)
The on-resistance Formula for an NMOS transistor is given by:
Ron = 1/(µnCOX W /L)(VGS − Vt ) (2)
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 26 / 32
Current comparator
The current comparator compares the mirrored current against the quiescent current
comparator threshold to produce a high output voltage level.
The response time is improved at the expense of a reduced output voltage swing.
Therefore, an inverting stage is needed to restore its rail-to-rail output.
Figure: Schematic of the current comparator circuit
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 27 / 32
HT detection flow
Figure: HT detection flow
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 28 / 32
General view of HT detector
Six virtual power clusters are considered in simulation.
The proposed detector is added into the CUT of each cluster.
Figure: HT detector with six virtual-power clusters
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 29 / 32
Conclusion
It is inherently difficult for an attacker to remove the ring oscillator network, due to
(i) Its distributed placement throughout the entire IC and
(ii) The expected measurement results from each ring oscillator.
One major advantage of side channel analysis is the Trojans can be detected without
being fully triggered.
The circuit containing large no. of paths, trojan cannot be detected by these
detectors.
One of the critical issues regarding the side channel analysis method is the effect of
process and environmental variation and measurement noise.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 30 / 32
References
Y. Cao, C.-H. Chang, and S. Chen, “A cluster-based distributed active current
sensing circuit for hardware trojan detection,” Information Forensics and Security,
IEEE Transactions on, vol. 9, no. 12, pp. 2220–2231, Dec 2014.
T. Hoque, M. Mustapa, F. Amsaad, and M. Niamat, “Assessment of nand based
ring oscillator for hardware trojan detection,” in Circuits and Systems (MWSCAS),
2015 IEEE 58th International Midwest Symposium on, Aug 2015, pp. 1–4.
A. Ferraiuolo, X. Zhang, and M. Tehranipoor, “Experimental analysis of a ring
oscillator network for hardware trojan detection in a 90nm asic,” in Computer-Aided
Design (ICCAD), 2012 IEEE/ACM International Conference on, Nov 2012, pp.
37–42.
S. K. Haider, C. Jin, M. Ahmad, D. M. Shila, O. Khan, and M. van Dijk, “Hatch: A
formal framework of hardware trojan design and detection,” Cryptology ePrint
Archive, Report 2014/943, 2014, http://eprint.iacr.org/.
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 31 / 32
Thank You
Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 32 / 32

More Related Content

What's hot

Hyper threading technology
Hyper threading technologyHyper threading technology
Hyper threading technologydeepakmarndi
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationBSheghembe
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project ReportRaghav Bisht
 
Low Power Design Techniques for ASIC / SOC Design
Low Power Design Techniques for ASIC / SOC DesignLow Power Design Techniques for ASIC / SOC Design
Low Power Design Techniques for ASIC / SOC DesignRajesh_navandar
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing pptAnushakp9
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentationDaola Khungur
 
Arduino Interfacing with different sensors and motor
Arduino Interfacing with different sensors and motorArduino Interfacing with different sensors and motor
Arduino Interfacing with different sensors and motorAmarjeetsingh Thakur
 
vlsi design summer training ppt
vlsi design summer training pptvlsi design summer training ppt
vlsi design summer training pptBhagwan Lal Teli
 
Embedded system programming using Arduino microcontroller
Embedded system programming using Arduino microcontrollerEmbedded system programming using Arduino microcontroller
Embedded system programming using Arduino microcontrollerArun Kumar
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iotRishita Jaggi
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Snapdragon processors
Snapdragon processorsSnapdragon processors
Snapdragon processorsDeepak Mathew
 

What's hot (20)

Hyper threading technology
Hyper threading technologyHyper threading technology
Hyper threading technology
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Low Power Design Techniques for ASIC / SOC Design
Low Power Design Techniques for ASIC / SOC DesignLow Power Design Techniques for ASIC / SOC Design
Low Power Design Techniques for ASIC / SOC Design
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentation
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Logic Synthesis
Logic SynthesisLogic Synthesis
Logic Synthesis
 
Arduino Interfacing with different sensors and motor
Arduino Interfacing with different sensors and motorArduino Interfacing with different sensors and motor
Arduino Interfacing with different sensors and motor
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
vlsi design summer training ppt
vlsi design summer training pptvlsi design summer training ppt
vlsi design summer training ppt
 
Embedded system programming using Arduino microcontroller
Embedded system programming using Arduino microcontrollerEmbedded system programming using Arduino microcontroller
Embedded system programming using Arduino microcontroller
 
WiFi SoC ESP8266
WiFi SoC ESP8266WiFi SoC ESP8266
WiFi SoC ESP8266
 
Routing attacks and counter measures in iot
Routing attacks and counter measures in iotRouting attacks and counter measures in iot
Routing attacks and counter measures in iot
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Snapdragon processors
Snapdragon processorsSnapdragon processors
Snapdragon processors
 
DSP by FPGA
DSP by FPGADSP by FPGA
DSP by FPGA
 

Similar to Hardware trojan detection technique using side channel analysis for hardware security

Hardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping methodHardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping methodAshish Maurya
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoIRJET Journal
 
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...theijes
 
Glitch Analysis and Reduction in Digital Circuits
Glitch Analysis and Reduction in Digital CircuitsGlitch Analysis and Reduction in Digital Circuits
Glitch Analysis and Reduction in Digital CircuitsVLSICS Design
 
IRJET- Solar Powered Transmission Line Inspection Robot
IRJET- Solar Powered Transmission Line Inspection RobotIRJET- Solar Powered Transmission Line Inspection Robot
IRJET- Solar Powered Transmission Line Inspection RobotIRJET Journal
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuitscsandit
 
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS cscpconf
 
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMIRJET Journal
 
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)IRJET Journal
 
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...IRJET Journal
 
IRJET- Arduino based Single Phase Fault Detection System using IoT
IRJET- Arduino based Single Phase Fault Detection System using IoTIRJET- Arduino based Single Phase Fault Detection System using IoT
IRJET- Arduino based Single Phase Fault Detection System using IoTIRJET Journal
 
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...IRJET Journal
 
Automated Speed Drive using raspberry pi
Automated Speed Drive using raspberry piAutomated Speed Drive using raspberry pi
Automated Speed Drive using raspberry piVISHNUG39
 
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET Journal
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...IRJET Journal
 
I DDQ Testing of Low Voltage CMOS Operational Transconductance Amplifier
I  DDQ  Testing of Low Voltage CMOS Operational Transconductance Amplifier I  DDQ  Testing of Low Voltage CMOS Operational Transconductance Amplifier
I DDQ Testing of Low Voltage CMOS Operational Transconductance Amplifier IJECEIAES
 
Degrees of Freedom for Interference Networks with Instantaneous Relays
Degrees of Freedom for Interference Networks with Instantaneous RelaysDegrees of Freedom for Interference Networks with Instantaneous Relays
Degrees of Freedom for Interference Networks with Instantaneous Relaysamin azari
 
IRJET- Explosive Ordinanace Disposal Robot
IRJET- Explosive Ordinanace Disposal RobotIRJET- Explosive Ordinanace Disposal Robot
IRJET- Explosive Ordinanace Disposal RobotIRJET Journal
 
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET Journal
 

Similar to Hardware trojan detection technique using side channel analysis for hardware security (20)

Hardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping methodHardware Trojan detection using Clock sweeping method
Hardware Trojan detection using Clock sweeping method
 
Short Range Radar System using Arduino Uno
Short Range Radar System using Arduino UnoShort Range Radar System using Arduino Uno
Short Range Radar System using Arduino Uno
 
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...
Practical Implementation for Stator Faults Protection and Diagnosisin 3-Ph IM...
 
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
[IJET-V1I3P5] Authors :Dushyant Kumar Soni, Ashish Hiradhar
 
Glitch Analysis and Reduction in Digital Circuits
Glitch Analysis and Reduction in Digital CircuitsGlitch Analysis and Reduction in Digital Circuits
Glitch Analysis and Reduction in Digital Circuits
 
IRJET- Solar Powered Transmission Line Inspection Robot
IRJET- Solar Powered Transmission Line Inspection RobotIRJET- Solar Powered Transmission Line Inspection Robot
IRJET- Solar Powered Transmission Line Inspection Robot
 
Glitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational CircuitsGlitch Analysis and Reduction in Combinational Circuits
Glitch Analysis and Reduction in Combinational Circuits
 
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
GLITCH ANALYSIS AND REDUCTION IN COMBINATIONAL CIRCUITS
 
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEMANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
ANALYSIS OF POWER WIRE COMMUNICATION SYSTEM
 
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
 
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
 
IRJET- Arduino based Single Phase Fault Detection System using IoT
IRJET- Arduino based Single Phase Fault Detection System using IoTIRJET- Arduino based Single Phase Fault Detection System using IoT
IRJET- Arduino based Single Phase Fault Detection System using IoT
 
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...
IRJET- Sensitivity Analysis for Optimal Distributed Generation Placement in P...
 
Automated Speed Drive using raspberry pi
Automated Speed Drive using raspberry piAutomated Speed Drive using raspberry pi
Automated Speed Drive using raspberry pi
 
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI TechnologyIRJET- Location Monitoring System for Maritime Security using RSSI Technology
IRJET- Location Monitoring System for Maritime Security using RSSI Technology
 
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
Advancing VLSI Design Reliability: A Comprehensive Examination of Embedded De...
 
I DDQ Testing of Low Voltage CMOS Operational Transconductance Amplifier
I  DDQ  Testing of Low Voltage CMOS Operational Transconductance Amplifier I  DDQ  Testing of Low Voltage CMOS Operational Transconductance Amplifier
I DDQ Testing of Low Voltage CMOS Operational Transconductance Amplifier
 
Degrees of Freedom for Interference Networks with Instantaneous Relays
Degrees of Freedom for Interference Networks with Instantaneous RelaysDegrees of Freedom for Interference Networks with Instantaneous Relays
Degrees of Freedom for Interference Networks with Instantaneous Relays
 
IRJET- Explosive Ordinanace Disposal Robot
IRJET- Explosive Ordinanace Disposal RobotIRJET- Explosive Ordinanace Disposal Robot
IRJET- Explosive Ordinanace Disposal Robot
 
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
IRJET- Investigation on Delay and Power Minimization in IEEE 802.15.4 Protoco...
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Hardware trojan detection technique using side channel analysis for hardware security

  • 1. Detection of Hardware Trojans using Side Channel Analysis Presented by Ashish Maurya (2015vlsi-13) ABV-Indian Institute of Information Technology and Management Gwalior, Morena Link Road, Gwalior, Madhya Pradesh, INDIA - 474015. January 7, 2016 Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 1 / 32
  • 2. Contents 1 Introduction 2 Detection Techniques 3 Conclusion 4 References Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 2 / 32
  • 3. Introduction Electronic systems available in today’s commercial, industrial and military sectors are massive networks of ICs. A part or whole of the IC supply chain is situated on different land, which is not under surveillance. This provides an opportunity for an adversary to embed functionality not stated in the specification of the device. With HT an adversary can extract the secret information by exploiting a physical modality i.e. - Power consumption, - Delay, - Electromagnetic emission of the hardware that executes the target application. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 3 / 32
  • 4. Introduction(contd.) Figure: General structure of Hardware Trojan The trigger acts like a sensing circuitry, which activates a Trojan to perform a specific task. The payload is responsible for the malicious activity of the Trojan or effect of the Trojan. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 4 / 32
  • 5. Introduction(contd.) Figure: Different Payload insertion approaches Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 5 / 32
  • 6. Introduction(contd.) Figure: Trojans with capability of leaking secret information from inside a crypto chip through power side channels MOLES circuit is designed to consume data-dependent power as a power side-channel to leak multi-bit secret keys. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 6 / 32
  • 7. Introduction(contd.) Side-channels are the inherent physical properties of a running IC, including timing, power consumption, electromagnetic radiation and even sound wave. During testing or normal operation, for a very brief period of time the Trojan circuit may receive input patterns which activate some of its gates. Occurrence of signal transition at the input of the Trojan gates is very likely to cause power or delay variation. Side channel analysis though promising, must deal with major challenges due to rare activating nets in the circuit, process variations, and measurement noise. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 7 / 32
  • 8. Introduction(contd.) To improve the effectiveness of these detection methods, ICs must be designed with some detection strategies in mind. Trust must be considered as an important design criterion in the design flow of modern ICs instead of being an afterthought. A golden or Trojan free IC signature is required for comparison purpose in many of these side channel analysis. Such signature might be obtained by destructive reverse engineering approach or from the software simulation of the original design. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 8 / 32
  • 9. Detection Techniques DETECTION USING POWER ANALYSIS Source: Assessment of NAND based ring oscillator for hardware Trojan detection, IEEE 58th International Midwest Symposium 2015 Circuits and Systems (MWSCAS), 2015 DETECTION USING ACTIVE CURRENT SENSING CIRCUIT Source: A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection, IEEE Transactions on Information Forensics and Security, VOL. 9, NO. 12, DECEMBER 2014 Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 9 / 32
  • 10. Detection using Power Analysis Assuming.. - All ICs can be tested under the same temperature, - The environmental variation will not be considered in this work. The detection of Trojans using power based analysis, NOT and NAND gate based ring oscillator (RO) network models are used. Figure: NOT gate based RO Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 10 / 32
  • 11. Detection using Power Analysis(contd.) NAND gate based RO as a power monitor which is more sensitive to voltage fluctuation shows that the impact of Trojans on the frequency of nearby ROs is noticeably larger,which is helpful in detection of the Trojan. If two gates share the same VDD line, transition induced noise in one gate impacts the supply voltage of the other gate . Taking advantage of this behavior, it was surmised that any addition or removal of gates should impact the nearby RO which is sourced by the VDD line connected to the tempered area of the IC. Figure: NAND gate based RO Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 11 / 32
  • 12. Detection using Power Analysis (contd.) The delay of each gate varies according to parameters such as temperature, supply voltage (VDD), load capacitance (CL), threshold voltage (Vth),channel length (L), oxide thickness (Tox), and transistor channel width (W). Power suppy noise which is also called voltage drop impacts the delay of gates. f = 1 2 ∗ n ∗ td (1) The delay of the gates will change when voltage fluctuate. This change in delay results some effect on oscillation frequency. So for same input pattern, power supply noise will affect differently to Trojan free IC and having Trojan IC. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 12 / 32
  • 13. Adopted Trojan circuit for analysis Figure: Single stage of trojan design Four similar stages constitute the Trojan design, these 20 Trojan gates are placed in the 10 empty slices that were kept empty in the Trojan Free version of CUA. The first stage of the Trojan obtains input from the LFSR and the rest of the stages are supplied by the output of the previous stage. Such design of Trojan guarantees partial activation during the circuit operation which should impact the nearby ROs. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 13 / 32
  • 14. Experimental Setup and RO controller Figure: Experimental Setup Figure: RO controller Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 14 / 32
  • 15. Ring Oscillator Network Figure: RO network implemented over CUA on FPGA Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 15 / 32
  • 16. Ring Oscillator Network(contd.) Figure: NOT gate RO network RO is inserted in every grid surrounded by power straps. Each RO stage can be implemented between the VDD and VSS line. A decoder and multiplexer are used to select which ring oscillator is measured. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 16 / 32
  • 17. Ring Oscillator Network(contd.) RON is developed with the ability to detect Trojans that cause power fluctuations, thereby uncovering the malicious inclusion. A number of ring oscillators (ROs) acting as power monitors, distributed across the entire IC. The output of each ring oscillator represents one part of the power signature of the entire IC. The number of ring oscillators, N-RO, could be adjusted according to the size of the IC and sensitivity to Trojans. The output of RON in Trojan-free ICs generates a power signature. Data analysis is used to effectively distinguish the power differences caused by Trojans from those of process variations, and identifies hardware Trojans inserted into the IC. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 17 / 32
  • 18. HT detection Flow Figure: Flow Graph Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 18 / 32
  • 19. Result Figure: Comparison of trojan impact on NAND and NOT gate based RO The results indicate the effectiveness of the NAND gate based RO network when ring oscillators located closer to the Trojan undergo a higher percentage of variation in frequency, compared to the NOT gate based RO. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 19 / 32
  • 20. DETECTION USING ACTIVE CURRENT SENSING CIRCUIT Source: A Cluster-Based Distributed Active Current Sensing Circuit for Hardware Trojan Detection, IEEE Transactions on Information Forensics and Security, VOL. 9, NO. 12, DECEMBER 2014 Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 20 / 32
  • 21. Detection using Active Current Sensing Circuit Figure: HT with no delay impact The main challenge encountered by delay-based side channel analysis is the Trojan can be inserted in such a manner that there is no difference in external delay measurement. Since the Trojan logics are embedded along the path in parallel, it is unlikely that the delay-based side channel analysis will pick up any anomaly in timing path from the primary input PI1 or PI2 to primary output PO. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 21 / 32
  • 22. Detection using Active Current Sensing Circuit(contd.) Figure: HT with no switching power impact Figure shows an AND gate whose inputs are from the most significant bits of a counter. The Trojan can be triggered only after the counter has run for a much longer time than any standard test time. To realize the triggering mechanism, the inputs of the Trojan are connected to some existing logic nodes of the original design. It increase the path delay and switching activity duration even if the Trojan remains dormant, this can be considered as a special case of Trojan with low switching activity. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 22 / 32
  • 23. Current Sensing Circuit Active current sensing circuit is used to extract a signature that encapsulates both the timing and amplitude of switching activity from the transient power supply current for HT detection. Figure: Schematic of the current sensing to path delay monitoring circuit Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 23 / 32
  • 24. Current Sensing Circuit(contd.) The current sensing detector is built with a calibrator to adjust the current comparator threshold against process variations. When the current sensing HT is activated during normal circuit operation, the measured characteristics of the power trace will change dramatically to alert for anomalies. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 24 / 32
  • 25. Current Sensing Circuit(contd.) The dynamic IR-drop across the on-resistance R(on) of the sleep transistor M(sleep) can be sensed to provide the visibility of the active current for the CUT. The dynamic current is mirrored to a current comparator to produce two voltage transitions that will mark the path delay. The comparator output is latched into a scannable flip-flop. The latched output is propagated to an external output pin by daisy chaining the scan flip-flops of all detectors. The delay transition of the comparator output from each detector can be determined from the corresponding scanned output by varying the phase shift between the system clock and the sampling clock of the scan chain in the detectors. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 25 / 32
  • 26. Current mirror When the sleep transistor M(sleep) is turned on initially, the gate voltage V(sleep) will be 0. When there is no current drawn by the CUT, the gate-source voltages of the transistor pair (M1-M2) are equal. The mirrored current is given by: Im ≈ Ron(2µpCox W L I1 3 ) 1 2 (1 + Icut I1 ) (1) The on-resistance Formula for an NMOS transistor is given by: Ron = 1/(µnCOX W /L)(VGS − Vt ) (2) Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 26 / 32
  • 27. Current comparator The current comparator compares the mirrored current against the quiescent current comparator threshold to produce a high output voltage level. The response time is improved at the expense of a reduced output voltage swing. Therefore, an inverting stage is needed to restore its rail-to-rail output. Figure: Schematic of the current comparator circuit Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 27 / 32
  • 28. HT detection flow Figure: HT detection flow Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 28 / 32
  • 29. General view of HT detector Six virtual power clusters are considered in simulation. The proposed detector is added into the CUT of each cluster. Figure: HT detector with six virtual-power clusters Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 29 / 32
  • 30. Conclusion It is inherently difficult for an attacker to remove the ring oscillator network, due to (i) Its distributed placement throughout the entire IC and (ii) The expected measurement results from each ring oscillator. One major advantage of side channel analysis is the Trojans can be detected without being fully triggered. The circuit containing large no. of paths, trojan cannot be detected by these detectors. One of the critical issues regarding the side channel analysis method is the effect of process and environmental variation and measurement noise. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 30 / 32
  • 31. References Y. Cao, C.-H. Chang, and S. Chen, “A cluster-based distributed active current sensing circuit for hardware trojan detection,” Information Forensics and Security, IEEE Transactions on, vol. 9, no. 12, pp. 2220–2231, Dec 2014. T. Hoque, M. Mustapa, F. Amsaad, and M. Niamat, “Assessment of nand based ring oscillator for hardware trojan detection,” in Circuits and Systems (MWSCAS), 2015 IEEE 58th International Midwest Symposium on, Aug 2015, pp. 1–4. A. Ferraiuolo, X. Zhang, and M. Tehranipoor, “Experimental analysis of a ring oscillator network for hardware trojan detection in a 90nm asic,” in Computer-Aided Design (ICCAD), 2012 IEEE/ACM International Conference on, Nov 2012, pp. 37–42. S. K. Haider, C. Jin, M. Ahmad, D. M. Shila, O. Khan, and M. van Dijk, “Hatch: A formal framework of hardware trojan design and detection,” Cryptology ePrint Archive, Report 2014/943, 2014, http://eprint.iacr.org/. Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 31 / 32
  • 32. Thank You Presented by Ashish Maurya(2015vlsi-13) ABV-IIITM January 7, 2016 32 / 32