Total views : 151

Improving the Classification Accuracy in Detecting Hardware Trojan in ALU Using PCA

Affiliations

  • Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu, India

Abstract


Present day electronic chips are outsourced by the manufacturer and done by third-parties. Such practices are widely prevalent as it works out to be more profitable in terms of cost and effort to complete these processes offshore in VLSI foundries. This comes with a potential risk of compromised security due to hardware Trojans. There are existing methodologies which aim at tacking the issue of Hardware Trojans by detecting it. Hardware Trojan detection by decomposing the design into blocks to detect combinational Trojan and Sequential Trojan is proposed in this paper. By comparing the leakage and total power values consumed by both the design i.e. with and without the presence of the hardware Trojans, we can identify the presence of the hardware Trojans. Moreover if the measurement noise gets high it masks or hides the effect of the variation in power profile, which leads to a wrong decision. So by taking the measurement noise under consideration the classification is effectively done for magnifying the differences by using Principle Component Analysis approach and tested with 8, 16 and 32 bit ALU designs.

Keywords

Hardware Security, Hardware Trojan Detection, Principle Component Analysis, Side Channel Analysis.

Full Text:

 |  (PDF views: 143)

References


  • Banga M, Hsiao M. A region based approach for the identification of hardware Trojans. Proc IEEE Int Workshop Hardware-Oriented Security Trust (HOST); 2008 Jun.
  • Tehranipoor M, Tehranipoor M. A survey of Hardware Trojan taxonomy and detection. Copublished by the IEEE CS and the IEEE CASS; 2010 Jan-Feb.
  • Amin HAM, Alkabani Y, Selim GMI. System-level protection and Hardware Trojan detection using weighted voting.Journal of Advanced Research. 2014; 5(4):499–505.
  • Dinesh Kumar K, Mohankumar N. Malicious combinational Hardware Trojan detection by gate level characterization in 90 nm technology. Proc of International Conference on Computing, Communication and Networking Technologies, ICCCNT; China. 2014. p. 1–7.
  • Maneesh PK, Nirmala Devi M. Power based self-referencing scheme for Hardware Trojan detection and diagnosis.Indian Journal of Science and Technology. 2015; 8(24).
  • Du D, Narasimhan S, Chakraborty RS, Bhunia S. Selfreferencing scalable side-channel approach for Hardware Trojan detection. Cryptographic Hardware and Embedded, CHES; 2010.
  • He C, Hou B, Wang L, En Y, Xie S. A novel Hardware Trojan detection method based on side-channel analysis and PCA algorithm. International Conference on Reliability, Maintainability and Safety (ICRMS); 2014.
  • Karamizadeh S, Abdullah SM, Manaf AA, Zamani M, Hooman A. An overview of principal component analysis.Journal of Signal and Information Processing. 2014; 4: 173–5.
  • Wang LW, Xie H, Luo HW. A novel analysis method of power signal for integrated circuits Trojan detection.Proceedings of 20th IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA); 2013. p. 637–40.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.