Skip to main content

Microsecond-Level Temperature Variation of Logic Circuits and Influences of Infrared Cameras’ Parameters on Hardware Trojans Detection

  • Conference paper
  • First Online:
Computer Engineering and Technology (NCCET 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 666))

Included in the following conference series:

  • 596 Accesses

Abstract

Currently, hardware Trojans have posed a serious threat to the integrated circuit security. A novel approach using chips’ infrared radiation to detect Trojans on a second scale was proposed in 2014. However, the temperature differences can be distinguishable on a microsecond scale between the normal areas in normal chips and the corresponding infected areas in chips with Trojans. As a result, the second-level detection can influence the detection accuracy reversely because of the temperature balance. On the other hand, infrared cameras’ ability to detect Trojans is determined by three parameters. They are the noise equivalent temperature difference (NETD), the pixel size and the frame frequency. It will be of benefit to Trojans detection using infrared cameras, if we determine the influences of the three parameters on detection. In this paper, we utilize finite element analysis to simulate the microsecond-level temperature variations of a fixed pixel-size silicon substrate while logic circuits on this size silicon substrate vary and operate under different challenges. Then, we find that the distinguishable time between different cases is on a microsecond scale according to a normal NETD. Based on our simulation results, an increasing step size (ISS) approach is proposed to capture dies’ microsecond-level infrared maps accurately using the low frame frequency infrared cameras. Finally, we analyze the temperature variations while a fixed logic circuit under a fixed challenge is operating on the different pixel-size silicon substrates. Based on the results, we get the link between NETD and the pixel size on the Trojan detection.

This work was supported by the National Natural Science Foundation of China (NSFC, grants no. 61471375).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdullah, N.N., Hu, K.Q., Farinaz, K., et al.: Novel techniques for high-sensitivity hardware Trojan detection using thermal and power maps. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 32, 1792–1805 (2014)

    Google Scholar 

  2. Tang, Y.K., Wang, J.Y.: Built-in self-monitor-based finite state machines Trojans detection and self-lock defence. IET J. Eng. (2016). doi:10.1049/joe.2016.0012

    Google Scholar 

  3. Agrawal, D., Baktir, S., Karakoyunlu, D.: Trojan detection using IC fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 296–310 (2007)

    Google Scholar 

  4. Jin, Y.E., Makris, Y.: Hardware Trojan detection using path delay fingerprint. In: IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 51–57 (2008)

    Google Scholar 

  5. Kelly, S., Zhang, X.H., Tehranipoor, M.: Detecting hardware Trojan using on-chip sensors in an ASIC design. J. Electron. Test 31(1), 11–26 (2015)

    Article  Google Scholar 

  6. Wang, X.X., Tehranipoor, M., Plusqeullic, J.: Detecting malicious inclusions in secure hardware: challenges and solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust, pp. 15–19 (2008)

    Google Scholar 

  7. Cha, B., Gupta, S.K.: Trojan detection via delay measurement: a new approach to select paths and vectors to maximize effectiveness and minimize cost. In: EDAA (2013)

    Google Scholar 

  8. Chen, X.M., Liu, Y., Li, S.S.: A method of obtaining ASIC schematic using scan chain. In: International Industrial Informatics and Computer Engineering Conference, pp. 985–990 (2015)

    Google Scholar 

  9. Rabaey, J.M., Chandrakasan, A., Nikolic, B.: Digital Integrated Circuits: A Design Perspective. Publishing House of Eelctronics Industry, Beijing (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongkang Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Tang, Y., Wang, J., Li, S., Chen, J., Yang, B. (2016). Microsecond-Level Temperature Variation of Logic Circuits and Influences of Infrared Cameras’ Parameters on Hardware Trojans Detection. In: Xu, W., Xiao, L., Li, J., Zhang, C., Zhu, Z. (eds) Computer Engineering and Technology. NCCET 2016. Communications in Computer and Information Science, vol 666. Springer, Singapore. https://doi.org/10.1007/978-981-10-3159-5_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3159-5_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3158-8

  • Online ISBN: 978-981-10-3159-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics