Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection

  • Dongdong Du
  • Seetharam Narasimhan
  • Rajat Subhra Chakraborty
  • Swarup Bhunia
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)


Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured side-channel parameter, such as supply current. Besides, existing side-channel approaches suffer from reduced Trojan detection sensitivity with increasing design size. In this paper, we propose a novel scalable side-channel approach, named self-referencing, along with associated vector generation algorithm to improve the Hardware Trojan detection sensitivity under large process variations. It compares transient current signature of one region of an IC with that of another, thereby nullifying the effect of process noise by exploiting spatial correlation across regions in terms of process variations. To amplify the Trojan effect on supply current, we propose a region-based vector generation approach, which divides a circuit-under-test (CUT) into several regions and for each region, finds the test vectors which induce maximum activity in that region, while minimizing the activity in other regions. We show that the proposed side-channel approach is scalable with respect to both amount of process variations and design size. The approach is validated with both simulation and measurement results using an FPGA-based test setup for large designs including a 32-bit DLX processor core (~105 transistors). Results shows that our approach can find ultra-small (<0.01% area) Trojans under large process variations of up to ± 20% shift in transistor threshold voltage.


hardware Trojan side-channel analysis self-referencing 


  1. 1.
    DARPA: TRUST in Integrated Circuits, TIC (2007),
  2. 2.
    Adee, S.: The hunt for the kill switch. IEEE Spectrum 45(5), 34–39 (2008)CrossRefGoogle Scholar
  3. 3.
    King, S., et al: Designing and implementing malicious hardware. In: LEET (2008)Google Scholar
  4. 4.
    Wolff, F., et al.: Towards Trojan-free trusted ICs: Problem analysis and detection scheme. In: DATE, pp. 1362–1365 (2008)Google Scholar
  5. 5.
    Chakraborty, R.S., Narasimhan, S., Bhunia, S.: Hardware Trojan: threats and emerging solutions. In: HLDVT (2009)Google Scholar
  6. 6.
    Rad, R., Plusquellic, J., Tehranipoor, M.: A sensitivity analysis of power signal methods for detecting hardware Trojans under real process and environmental conditions. IEEE Tran. VLSI (2010)Google Scholar
  7. 7.
    Banga, M., Hsiao, M.: A region based approach for the identification of hardware Trojans. In: HOST, pp. 40–47 (2008)Google Scholar
  8. 8.
    Adamov, A., Saprykin, A., Melnik, D., Lukashenko, O.: The problem of hardware Trojans detection in system-on-chip. In: CADSM, pp. 178–179 (2009)Google Scholar
  9. 9.
    Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: Symposium on Security and Privacy, pp. 296–310 (2007)Google Scholar
  10. 10.
    Rad, R., Wang, X., Tehranipoor, M., Plusquellic, J.: Taxonomy of Trojans and methods of detection for IC trust. In: ICCAD (2008)Google Scholar
  11. 11.
    Jin, Y., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: HOST (2008)Google Scholar
  12. 12.
    Chakraborty, R.S., Wolff, F., Paul, S., Papachristou, C., Bhunia, S.: MERO: A statistical approach for Hardware Trojan detection. In: CHES (2009)Google Scholar
  13. 13.
    Borkar, S., et al.: Parameter variations and impact on circuits and micro-architecture. In: DAC, pp. 338–342 (2003)Google Scholar
  14. 14.
    Papoulis, A., Pillai, S.U.: Probability, Random Variables and Stochastic Processes, 4th edn. McGraw-Hill, New York (2002)Google Scholar
  15. 15.
    Predictive Technology Model,

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Dongdong Du
    • 1
  • Seetharam Narasimhan
    • 1
  • Rajat Subhra Chakraborty
    • 1
  • Swarup Bhunia
    • 1
  1. 1.Case Western Reserve UniversityClevelandUSA

Personalised recommendations