Abstract
Detection of malicious form of hardware is commonly referred to as hardware Trojan and had become a major challenge. Especially when we go down to deep submicron technology, it becomes really difficult to detect the presence of Trojan using conventional testing approaches. Logic testing proves to be effective only when the number of inputs to trigger the Trojan is of small number. Further using side-channel approaches, the complexity of triggering the entire Trojan circuit is reduced because partial activation of Trojan will cause a considerable change in the measured parameter that is used to differentiate between the original circuit and circuit infected with Trojan. This work provides a non-invasive hardware Trojan detection methodology which uses side-channel power of the circuit to detect the presence of the Trojan. Moreover, the proposed method deviates from other existing techniques by accounting the change in side-channel power, due to interconnects that is the distributed resistance and capacitance of the wire connecting different standard cells in the circuit, by taking wire load variations into consideration. The power profile from Trojan-infected and Trojan-free circuits is used for training the machine. The machine predicts with much accuracy whether the circuit consists of Trojan or not based on data we have trained, therefore effectively categorizing the circuits and thus eliminating the errors caused due to manual intervention. The proposed work is validated by using ISCAS 85 and ISCAS 89 benchmark circuits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
R.S. Chakraborty, F. Wolff, S. Paul, MERO: a statistical approach for hardware Trojan detection, in Proceedings of Cryptographic Hardware and Embedded Systems Workshop (2009), pp. 396–410
A. Thakur, P. Sivaraj, R. Periasamy, N. Mohankumar, Hardware Trojan detection-a survey, in 4th National Conference on Recent Trends in Communication Computation and Signal Processing (2013), pp. 99–102
X. Zhang, M. Tehranipoor, Case study: detecting hardware Trojans in third-party digital IP cores, in HOST (2011)
D. Karunakaran, N. Mohankumar, Malicious combinational hardware Trojan detection by gate level characterization in 90 nm technology, in Proceeding of International Conference on Computing, Communications and Networking Technology (2014), pp. 1–7. https://doi.org/10.1109/icccnt.2014.6963036
P.K. Maneesh, M. Nirmala Devi, Power based self-referencing scheme for hardware Trojan detection and diagnosis. Indian J. Sci. Technol. 8(24) (2015)
A. Kulkarni, Y. Pino, T. Mohsenin, Svm-based real-time hardware Trojan detection for many-core platform, in 2016 17th International Symposium on Quality Electronic Design (ISQED) (2016)
T. Iwase, Y. Nozaki, M. Yoshikawa, T. Kumaki, Detection technique for hardware Trojans using machine learning in frequency domain, in 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE) (2015), pp. 185–186
S. Kamala Nandhini et.al., Delay-based reference free hardware Trojan detection using virtual intelligence, in 4th International Conference on Information System Design and Intelligent Applications, (India–2017) (Vietnam, 2017)https://doi.org/10.1007/978-981-10-7512-4_50
V.R.R. Koneru, B.K. Teja, K.D.B. Reddy, M.V. GnanaSwaroop, B. Ramanidharan, N. Mohankumar, HAPMAD.: hardware-based authentication platform for malicious activity detection in digital circuits, Advances in Intelligent Systems and Computing, vol. 672 (Springer, Singapore, 2018). https://doi.org/10.1007/978-981-10-7512-4_60
R. Bharath et al., Malicious circuit detection for improved hardware security, in SSCC 2015. Communications in Computer and Information Science, vol. 536 (2015). https://doi.org/10.1007/978-3-319-22915-7_42
G. Aishwarya, H. Revalla, S. Shruthi, V.P. Ananth, N. Mohankumar, Virtual instrumentation-based malicious circuit detection using weighted average voting, in Electromagnetics and Telecommunications, Proceedings of ICMEET 2017, vol. 471, p. 423 (2018). https://doi.org/10.1007/978-981-10-7329-8_43
N. Mohankumar, M. Jayakumar, M.N. Devi, MCRC-based hardware Trojan detection for improved hardware security, in Electromagnetics and Telecommunications. Lecture notes in electrical engineering, vol. 471 (Springer, Singapore, 2018). https://doi.org/10.1007/978-981-10-7329-8_39
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Suresh Babu, N., Mohankumar, N. (2019). Wire Load Variation-Based Hardware Trojan Detection Using Machine Learning Techniques. In: Wang, J., Reddy, G., Prasad, V., Reddy, V. (eds) Soft Computing and Signal Processing . Advances in Intelligent Systems and Computing, vol 900. Springer, Singapore. https://doi.org/10.1007/978-981-13-3600-3_58
Download citation
DOI: https://doi.org/10.1007/978-981-13-3600-3_58
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-3599-0
Online ISBN: 978-981-13-3600-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)