JOURNAL ARTICLE

Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

Seetharam NarasimhanDongdong DuRajat Subhra ChakrabortySomnath PaulFrancis WolffC. PapachristouKaushik RoySwarup Bhunia

Year: 2012 Journal:   IEEE Transactions on Computers Vol: 62 (11)Pages: 2183-2195   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Hardware Trojan attack in the form of malicious modification of a design has emerged as a major security threat. Sidechannel analysis has been investigated as an alternative to conventional logic testing to detect the presence of hardware Trojans. However, these techniques suffer from decreased sensitivity toward small Trojans, especially because of the large process variations present in modern nanometer technologies. In this paper, we propose a novel noninvasive, multiple-parameter side-channel analysisbased Trojan detection approach. We use the intrinsic relationship between dynamic current and maximum operating frequency of a circuit to isolate the effect of a Trojan circuit from process noise. We propose a vector generation approach and several design/test techniques to improve the detection sensitivity. Simulation results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit advanced encryption standard (AES) cipher, show a detection resolution of 1.12 percent amidst ±20 percent parameter variations. The approach is also validated with experimental results. Finally, the use of a combined side-channel analysis and logic testing approach is shown to provide high overall detection coverage for hardware Trojan circuits of varying types and sizes.

Keywords:
Trojan Hardware Trojan Computer science Side channel attack Sensitivity (control systems) Advanced Encryption Standard Cipher Encryption Channel (broadcasting) Cryptography Embedded system Computer hardware Electronic engineering Algorithm Engineering Computer security Telecommunications

Metrics

243
Cited By
9.42
FWCI (Field Weighted Citation Impact)
38
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Integrated Circuits and Semiconductor Failure Analysis
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
Cryptographic Implementations and Security
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.