Hardware Trojan Detection using Power Signal Foot Prints in Frequency Domain

This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of \mu W) which are difficult to manipulate for HT detection using conventional methods. The proposed method...

Full description

Saved in:
Bibliographic Details
Published in2020 International Conference on Communication and Signal Processing (ICCSP) pp. 1212 - 1216
Main Authors Maruthi, Vangalli, Balamurugan, Karthigha, Mohankumar, N.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of \mu W) which are difficult to manipulate for HT detection using conventional methods. The proposed method utilizes the time domain power signals which is converted to frequency domain that represents the implausible signals and analyzed. The precision of HT detection is found to be increased because of the magnified power values in frequency domain. This work uses ISCAS89 bench mark circuits for conducting experiments. In this, the wide range of power values that spans from 695 \mu \mathrm{W} to 22.3 \mu \mathrm{W} are observed in frequency domain whereas the respective powers in time domain have narrow span of 2.29 \mu \mathrm{W} to 0.783 \mu \mathrm{W} which is unconvincing. This work uses the wide span of power values to identify HT and observed that the mid-band of frequencies have larger footprints than the side bands. These methods intend to help the designers in easy identification of HT even of single gate events.
DOI:10.1109/ICCSP48568.2020.9182134