Abstract

Malicious alterations of integrated circuits during fabrication in untrusted foundries pose major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover such alterations, also referred to as "hardware Trojans" using conventional structural or functional testing strategies. In this paper, we propose a novel non-invasive, multiple-parameter side-channel analysis based Trojan detection approach that is capable of detecting malicious hardware modifications in the presence of large process variation induced noise. We exploit the intrinsic relationship between dynamic current (I DDT ) and maximum operating frequency (F max ) of a circuit to distinguish the effect of a Trojan from process induced fluctuations in I DDT . We propose a vector generation approach for I DDT measurement that can improve the Trojan detection sensitivity for arbitrary Trojan instances. Simulation results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit Advanced Encryption System (AES) cipher, show a detection resolution of 0.04% can be achieved in presence of ±20% parameter (V th ) variations. The approach is also validated with experimental results using 120nm FPGA (Xilinx Virtex-II) chips.

Keywords:
Side channel attack Trojan Computer science Channel (broadcasting) Hardware Trojan Embedded system Computer hardware Computer security Cryptography Computer network

Metrics

147
Cited By
7.66
FWCI (Field Weighted Citation Impact)
13
Refs
0.98
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Integrated Circuits and Semiconductor Failure Analysis
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Neuroscience and Neural Engineering
Life Sciences →  Neuroscience →  Cellular and Molecular Neuroscience

Related Documents

JOURNAL ARTICLE

A Non-Invasive Hardware Trojan Detection Approach Based on Side-Channel Analysis

Xu XuXiong Wei LiYang ZhangFang Xie

Journal:   Applied Mechanics and Materials Year: 2013 Vol: 401-403 Pages: 1776-1780
JOURNAL ARTICLE

Hardware Trojan Detection Techniques Using Side-Channel Analysis

Thi-Tam HoangThai-Ha TranVan‐Phuc HoangXuan Nam TranCong‐Kha Pham

Journal:   2019 6th NAFOSTED Conference on Information and Computer Science (NICS) Year: 2019 Pages: 528-533
BOOK-CHAPTER

Side-Channel Analysis for Hardware Trojan Detection: A Deep Learning Approach

Piroska Stanić MolcerA. Abdesselam

NATO science for peace and security series. C, Environmental security Year: 2025 Pages: 213-228
© 2026 ScienceGate Book Chapters — All rights reserved.