TY - GEN
T1 - Detection of malicious hardware components in mobile platforms
AU - Karabacak, Fatih
AU - Ogras, Umit
AU - Ozev, Sule
PY - 2016/5/25
Y1 - 2016/5/25
N2 - Modern mobile platforms integrate hundreds of IP (intellectual property) cores from different vendors. Core vendors in turn outsource some of the hardware components, leading to a design hierarchy where parts of the hardware platform is open to numerous international vendors. To ensure correctness, design flows incorporate advanced testing and validation methodologies which guard against design bugs, random faults, and process-voltage-temperature variations. However, it is common practice to assume that hardware is trustworthy. Since multiple IP vendors and fabrication lines are involved in the product development process, it is becoming increasingly necessary to trust but verify the received devices both at production time and in the field. This paper presents a self-referencing hardware Trojan detection technique which does not depend on a trusted sample. Self-referencing is achieved using signal detection theory and band-limited nature of Trojan activity. The effectiveness of the proposed technique is demonstrated through experiments on a commercial system-on-chip and SPICE simulations under variety of practical scenarios.
AB - Modern mobile platforms integrate hundreds of IP (intellectual property) cores from different vendors. Core vendors in turn outsource some of the hardware components, leading to a design hierarchy where parts of the hardware platform is open to numerous international vendors. To ensure correctness, design flows incorporate advanced testing and validation methodologies which guard against design bugs, random faults, and process-voltage-temperature variations. However, it is common practice to assume that hardware is trustworthy. Since multiple IP vendors and fabrication lines are involved in the product development process, it is becoming increasingly necessary to trust but verify the received devices both at production time and in the field. This paper presents a self-referencing hardware Trojan detection technique which does not depend on a trusted sample. Self-referencing is achieved using signal detection theory and band-limited nature of Trojan activity. The effectiveness of the proposed technique is demonstrated through experiments on a commercial system-on-chip and SPICE simulations under variety of practical scenarios.
UR - http://www.scopus.com/inward/record.url?scp=84973915320&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84973915320&partnerID=8YFLogxK
U2 - 10.1109/ISQED.2016.7479197
DO - 10.1109/ISQED.2016.7479197
M3 - Conference contribution
AN - SCOPUS:84973915320
T3 - Proceedings - International Symposium on Quality Electronic Design, ISQED
SP - 179
EP - 184
BT - Proceedings of the 17th International Symposium on Quality Electronic Design, ISQED 2016
PB - IEEE Computer Society
T2 - 17th International Symposium on Quality Electronic Design, ISQED 2016
Y2 - 15 March 2016 through 16 March 2016
ER -