Hardware Trojan Detection using Power Signal Foot Prints in Frequency Domain

This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of \mu W) which are difficult to manipulate for HT detection using conventional methods. The proposed method...

Full description

Saved in:
Bibliographic Details
Published in2020 International Conference on Communication and Signal Processing (ICCSP) pp. 1212 - 1216
Main Authors Maruthi, Vangalli, Balamurugan, Karthigha, Mohankumar, N.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2020
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of \mu W) which are difficult to manipulate for HT detection using conventional methods. The proposed method utilizes the time domain power signals which is converted to frequency domain that represents the implausible signals and analyzed. The precision of HT detection is found to be increased because of the magnified power values in frequency domain. This work uses ISCAS89 bench mark circuits for conducting experiments. In this, the wide range of power values that spans from 695 \mu \mathrm{W} to 22.3 \mu \mathrm{W} are observed in frequency domain whereas the respective powers in time domain have narrow span of 2.29 \mu \mathrm{W} to 0.783 \mu \mathrm{W} which is unconvincing. This work uses the wide span of power values to identify HT and observed that the mid-band of frequencies have larger footprints than the side bands. These methods intend to help the designers in easy identification of HT even of single gate events.
AbstractList This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node consumes low power values (in the range of \mu W) which are difficult to manipulate for HT detection using conventional methods. The proposed method utilizes the time domain power signals which is converted to frequency domain that represents the implausible signals and analyzed. The precision of HT detection is found to be increased because of the magnified power values in frequency domain. This work uses ISCAS89 bench mark circuits for conducting experiments. In this, the wide range of power values that spans from 695 \mu \mathrm{W} to 22.3 \mu \mathrm{W} are observed in frequency domain whereas the respective powers in time domain have narrow span of 2.29 \mu \mathrm{W} to 0.783 \mu \mathrm{W} which is unconvincing. This work uses the wide span of power values to identify HT and observed that the mid-band of frequencies have larger footprints than the side bands. These methods intend to help the designers in easy identification of HT even of single gate events.
Author Balamurugan, Karthigha
Maruthi, Vangalli
Mohankumar, N.
Author_xml – sequence: 1
  givenname: Vangalli
  surname: Maruthi
  fullname: Maruthi, Vangalli
  organization: Amrita School of Engineering, Amrita Vishwa Vidyapeetham,Department of Electronics and Communication Engineering,Coimbatore,India
– sequence: 2
  givenname: Karthigha
  surname: Balamurugan
  fullname: Balamurugan, Karthigha
  organization: Amrita School of Engineering, Amrita Vishwa Vidyapeetham,Department of Electronics and Communication Engineering,Coimbatore,India
– sequence: 3
  givenname: N.
  surname: Mohankumar
  fullname: Mohankumar, N.
  organization: Amrita School of Engineering, Amrita Vishwa Vidyapeetham,Department of Electronics and Communication Engineering,Coimbatore,India
BookMark eNotj9FKwzAUQCPog5t-gQ_mB1Zz0zZNHqWzblCwsPk8btObEdkSTTvG_l7BPZ2Xw4EzY7chBmLsGUQGIMzLuq43XaFLpTMppMgMaAl5ccNmUEkNhdGVvmftCtNwxkR8m-IXBr6kiezkY-Cn0Yc97-KZEt_4fcADb2KceJd8mEbuA28S_Zwo2AtfxiP68MDuHB5Gerxyzj6bt229WrQf7-v6tV14AD0tUMlBoBjKvgKttKDeCu2kMbJUTqGFSkmD5KwtHZAqFGJJQgyo_qTK9fmcPf13PRHtvpM_YrrsroP5L46GS-g
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCSP48568.2020.9182134
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728149878
1728149886
9781728149875
9781728149882
EndPage 1216
ExternalDocumentID 9182134
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-a62d0a0d5b718680ebc08f299256f6ac17629aefcc5f1e646aa5e00da6f297fb3
IEDL.DBID RIE
IngestDate Mon Jul 08 05:38:37 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-a62d0a0d5b718680ebc08f299256f6ac17629aefcc5f1e646aa5e00da6f297fb3
PageCount 5
ParticipantIDs ieee_primary_9182134
PublicationCentury 2000
PublicationDate 2020-July
PublicationDateYYYYMMDD 2020-07-01
PublicationDate_xml – month: 07
  year: 2020
  text: 2020-July
PublicationDecade 2020
PublicationTitle 2020 International Conference on Communication and Signal Processing (ICCSP)
PublicationTitleAbbrev ICCSP
PublicationYear 2020
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7694361
Snippet This work proposes a plausible detection scheme for Hardware Trojan (HT) detection in frequency domain analysis. Due to shrinking technology every node...
SourceID ieee
SourceType Publisher
StartPage 1212
SubjectTerms Delays
Frequency domain and Power footprints
Frequency-domain analysis
Hardware
Hardware security
Hardware Trojan (HT) detection
Logic gates
Power demand
Time-domain analysis
Trojan horses
Title Hardware Trojan Detection using Power Signal Foot Prints in Frequency Domain
URI https://ieeexplore.ieee.org/document/9182134
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3PS8MwFMfDtpMnlU38TQ4ebZe2adaeO8sUJ4NtsNt4SZNRxVRqh-hfb9LWieLBWwihCUnJe0k-3_cQurLaxogBtaSa71AlAicKlO_4PPCAK48EYLXD0wc2WdK7VbjqoOudFkZKWcNn0rXF-i0_K8TWXpUNY-MMewHtom5E_Ear1SJbHomHt0kyn9EoZJbY8onbtv6RNqW2Guk-mn7118AiT-624q74-BWK8b8DOkCDb30enu0szyHqSN1H9_YR_g1KiRdl8Qgaj2VVc1YaW7h9g2c2IRqe5xvz7-C0KCrzjVxXrzjXOC0bpPodj4tnyPUALdObRTJx2lwJTm6OCJUDzM8IkCzkIxsAn0guSKSMrTEujWIgPLPpxSCVEKHyJKMMIJSEZMBMo5HiwRHq6ULLY6vipiSzecKUcZaMB8izmJNYgAhFZHYHeoL6dibWL004jHU7Cad_V5-hPbsaDeF6jnpVuZUXxo5X_LJewE_OrJ8h
link.rule.ids 310,311,786,790,795,796,802,27958,55109
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ3NT4MwGMabOQ96UrMZv-3Bo7ACpYPzJtl0W5ZsS3Zb2tIuaCwGuxj9620BZzQevAFpgLRNnxf6e94XgBvrbYwIxZZU8x0seeBEgfQdnwUeZdJDAbXe4fGEDBb4fhkuG-B264URQpTwmXDtYbmXn-Z8Y3-VdWITDHsB3gG7RudRXLm1amjLnHeGvd5siqOQWGbLR27d_kfhlFI3kgMw_npihYs8uRvNXP7xKxnjf1_pELS_HXpwutWeI9AQqgVGdhv-jRYCzov8kSrYF7okrRS0ePsaTm1JNDjL1mb2wCTPtblHpvQrzBRMigqqfof9_Jlmqg0Wyd28N3DqaglOZj4StEOJnyKK0pB1bQp8JBhHkTRqY4IaSSj3zLIXUyE5D6UnCCaUhgKhlBLTqCtZcAyaKlfixPq4MUptpTBpwiUTA7I0ZijmlIc8MusDPgUt2xOrlyohxqruhLO_L1-DvcF8PFqNhpOHc7BvR6biXS9AUxcbcWlUXbOrcjA_AWPConc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2020+International+Conference+on+Communication+and+Signal+Processing+%28ICCSP%29&rft.atitle=Hardware+Trojan+Detection+using+Power+Signal+Foot+Prints+in+Frequency+Domain&rft.au=Maruthi%2C+Vangalli&rft.au=Balamurugan%2C+Karthigha&rft.au=Mohankumar%2C+N.&rft.date=2020-07-01&rft.pub=IEEE&rft.spage=1212&rft.epage=1216&rft_id=info:doi/10.1109%2FICCSP48568.2020.9182134&rft.externalDocID=9182134