skip to main content
10.1145/1366110.1366196acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
poster

Guided test generation for isolation and detection of embedded trojans in ics

Published:04 May 2008Publication History

ABSTRACT

Testing the genuineness of a manufactured chip is an important step in an IC product life cycle. This becomes more prominent with the outsourcing of the manufacturing process, since the manufacturer may tamper the internal circuit behavior using Trojan circuits in the original design. Traditional testing methods cannot detect these stealthy Trojans because the triggering scenario, which activates it, is unknown. Recently, approaches based on side-channel analysis have shown promising results in detecting Trojans. In this paper, we propose a novel test generation technique that aims at magnifying the disparity between side-channel signal waveforms of tampered and genuine circuits to indicate the possibility of internal tampering. Experimental results indicate that our approach could magnify the likelihood of Trojans 4 to 20 times more than existing side-channel analysis based approaches.

References

  1. D. Agarwal, S. Baktir, D. Karakoy, P. Rohatgi, B. Sunar, "Trojan Detection using IC Fingerprinting", IBM Research Report, 2006.Google ScholarGoogle Scholar
  2. K. Nowaka, G. Carpenter, F. Gebara, J. Schaub, D. Agarwal, P. Rohatgi, W. E. Hall, S. Baktir, D. Karakoyunlu, B. Sunar, "IC Fingerprinting and Stable IS Sensors for Enhanced IC Trust, 2006.Google ScholarGoogle Scholar
  3. S. Pilli, S. S. Sapatnekar, "Power estimation considering statistical IC parametric variations"; ISCAS 1997, pp. 1524 -- 1527, vol.3.Google ScholarGoogle Scholar
  4. C. Fagot, O. Gascuel, P. Girard, C. Landrault, "On Calculating Efficient LFSR Seeds for Built-In Self Test"; Proc. Of European Test Workshop, 1999, pp 7--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Hetherington, T. Fryars, N. Tamarapalli, M. Kassab, A. Hassan, J. Rajski, "Logic BIST for large industrial designs: real issues and case studies"; ITC, 1999, pp. 358--367. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W.-T. Cheng; M. Sharma; T. Rinderknecht, C. Hill, "Signature Based Diagnosis for Logic BIST"; ITC 2006, Oct. 2006, pp. 1--9.Google ScholarGoogle Scholar
  7. L. J. Kohout, A. Yasinsac, E. McDuffie, "Activity profiles for intrusion detection" ; Fuzzy Information Processing Society, 2002. pp. 463--468.Google ScholarGoogle Scholar
  8. W. Li; S. M. Reddy, I. Pomeranz, "On reducing peak current and power during test"; Proc. IEEE computer society annual symposium, 2005, pp. 156--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Agarwal. et al, "The EM side-channel(s)" CHES 2002, v 2523 Lecture Notes on Computer Science, Springer-Verlag, pp. 29--45, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. N. Najm, "Transition density: a new measure of activity in digital circuits;", IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, Vol 12, Issue 2, Feb. 1993 pp. 310--323.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Guided test generation for isolation and detection of embedded trojans in ics

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI
        May 2008
        480 pages
        ISBN:9781595939999
        DOI:10.1145/1366110

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 May 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Author Tags

        Qualifiers

        • poster

        Acceptance Rates

        Overall Acceptance Rate312of1,156submissions,27%

        Upcoming Conference

        GLSVLSI '24
        Great Lakes Symposium on VLSI 2024
        June 12 - 14, 2024
        Clearwater , FL , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader