Difference between revisions of "Nowroz2014"

From ACES

(Import from BibTeX)
 
m (Import from BibTeX)
Line 7: Line 7:
|abstract=<p>Hardware Trojans are malicious alterations or injections of unwanted circuitry to integrated circuits (ICs) by untrustworthy factories. They render great threat to the security of modern ICs by various unwanted activities such as bypassing or disabling the security fence of a system, leaking confidential information, deranging, or destroying the entire chip. Traditional testing strategies are becoming ineffective since these techniques suffer from decreased sensitivity toward small Trojans because of oversized chip and large amount of process variation present in nanometer technologies. The production volume along with decreased controllability and observability to complex ICs internals make it difficult to efficiently perform Trojan detection using typical structural tests like path latency and leakage power. In this paper, we propose a completely new post-silicon multimodal approach using runtime thermal and power maps for Trojan detection and localization. Utilizing the novel framework, we propose two different Trojan detection methods involving 2-D principal component analysis. First, supervised thresholding in case training data set is available and second, unsupervised clustering which require no prior characterization data of the chip. We introduce 1 regularization in the thermal to power inversion procedure which improves Trojan detection accuracy. To characterize ICs accurately, we perform our experiments in presence of realistic CMOS process variation. Our experimental evaluations reveal that our proposed methodology can detect very small Trojans with 3\&ndash;4 orders of magnitude smaller power consumptions than the total power usage of the chip, while it scales very well because of the spatial view to ICs internals by the thermal mapping.</p>
|abstract=<p>Hardware Trojans are malicious alterations or injections of unwanted circuitry to integrated circuits (ICs) by untrustworthy factories. They render great threat to the security of modern ICs by various unwanted activities such as bypassing or disabling the security fence of a system, leaking confidential information, deranging, or destroying the entire chip. Traditional testing strategies are becoming ineffective since these techniques suffer from decreased sensitivity toward small Trojans because of oversized chip and large amount of process variation present in nanometer technologies. The production volume along with decreased controllability and observability to complex ICs internals make it difficult to efficiently perform Trojan detection using typical structural tests like path latency and leakage power. In this paper, we propose a completely new post-silicon multimodal approach using runtime thermal and power maps for Trojan detection and localization. Utilizing the novel framework, we propose two different Trojan detection methods involving 2-D principal component analysis. First, supervised thresholding in case training data set is available and second, unsupervised clustering which require no prior characterization data of the chip. We introduce 1 regularization in the thermal to power inversion procedure which improves Trojan detection accuracy. To characterize ICs accurately, we perform our experiments in presence of realistic CMOS process variation. Our experimental evaluations reveal that our proposed methodology can detect very small Trojans with 3\&ndash;4 orders of magnitude smaller power consumptions than the total power usage of the chip, while it scales very well because of the spatial view to ICs internals by the thermal mapping.</p>
|pages=1792-1805
|pages=1792-1805
|month=12
|year=2014
|volume=33
|volume=33
|journal=IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
|journal=IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
|title=Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
|title=Novel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
|entry=article
|entry=article
|date=2014-12-01
}}
}}

Revision as of 04:41, 4 September 2021

Nowroz2014
entryarticle
address
annote
authorAbdullah Nazma Nowroz and Kangqiao Hu and Farinaz Koushanfar and Sherief Reda
booktitle
chapter
edition
editor
howpublished
institution
journalIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
month12
note
number
organization
pages1792-1805
publisher
school
series
titleNovel Techniques for High-Sensitivity Hardware Trojan Detection Using Thermal and Power Maps
type
volume33
year2014
doi10.1109/TCAD.2014.2354293
issn1937-4151
isbn
urlhttp://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true\&arnumber=6951867
pdf


Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093