Thermal Scans for Detecting Hardware Trojans
It is well known that companies have been outsourcing their IC production to countries where it is simply not possible to guarantee the integrity of final products. This relocation trend creates a need for methodologies and embedded design solutions to identify counterfeits but also to detect potential Hardware Trojans (HT). Hardware Trojans are tiny pieces of hardware that can be maliciously inserted in designs for several purposes ranging from denial of service, programmed obsolescence etc. They are usually stealthy and characterized by small area and power overheads. Their detection is thus a challenging task.
Various solutions have been investigated to detect Hardware Trojans. We focus in this paper on the use of thermal near field scans to that aim. Therefore we first introduce and characterize a low cost, large bandwidth (20 kHz) thermal scanning system with the high detectivity required to detect small Hardware Trojans. Then, we experimentally demonstrate its efficiency on different test cases.
KeywordsTrojan detection Lock-in thermography Thermal mapping Thermal modeling
- 1.Loai, A., Houssain, H., Al-Somani, T.F.: Review of Side Channel Attacks and Countermeasures on ECC, RSA, and AES CryptosystemsGoogle Scholar
- 4.Balasch, J., Gierlichs, B., Verbauwhede, I.: Electromagnetic circuit fingerprints for hardware Trojan detection. In: IEEE International Symposium on Electromagnetic Compatibility (EMC), Dresden, pp. 246–251 (2015)Google Scholar
- 5.Zhang, X., Tehranipoor, M.: RON: an on-chip ring oscillator network for hardware Trojan detection. In: Design, Automation and Test in Europe, Grenoble, pp. 1–6 (2011)Google Scholar
- 7.Tan, M.C., Tay, M.Y., Qiu, W., Phoa, S.L.: Fault localization using infra-red lock-in thermography for SOI-based advanced microprocessors. In: Physical and Failure Analysis of Integrated Circuits, IPFA, p. 15 (2011)Google Scholar
- 8.Hu, K., Nowroz, A.N., Reda, S., Koushanfar, F.: High-sensitivity hardware Trojan detection using multimodal characterization. In: Design, Automation and Test in Europe Conference and Exhibition, DATE, pp. 1271–1276 (2013)Google Scholar
- 10.Incropera, F.P., Dewitt, D.P.: Fundamentals of Heat and Mass Transfer, 5th edn, pp. 700–746. Wiley, Hoboken (2001)Google Scholar
- 12.Cochran, R., Nowroz, A.N., Reda, S.: Post-silicon power characterization using thermal infrared emissions. In: Proceedings of the 16th ACM/IEEE International Symposium on Low Power Electronics and Design, pp. 331–336 (2010)Google Scholar
- 18.Nowroz, A., Woods, G., Reda, S.: Improved post-silicon power modeling using AC lock-in techniques. In: 48th ACM/EDAC/IEEE Design Automation Conference, DAC, pp. 101–107 (2011)Google Scholar
- 20.Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: IEEE International High Level Design Validation and Test Workshop, HLDVT 2009, pp. 166–171 (2009)Google Scholar