Please use this identifier to cite or link to this item:
|Title:||A cluster-based distributed active current sensing circuit for hardware Trojan detection||Authors:||Cao, Yuan
|Keywords:||DRNTU::Engineering::Electrical and electronic engineering||Issue Date:||2013||Source:||Cao, Y., Chang, C.-H., & Chen, S. (2014). A cluster-based distributed active current sensing circuit for hardware Trojan detection. IEEE transactions on information forensics and security, 9(12), 2220-2231.||Series/Report no.:||IEEE transactions on information forensics and security||Abstract:||The globalization of integrated circuits (ICs) design and fabrication has given rise to severe concerns on the devastating impact of subverted chip supply. Hardware Trojan (HT) is among the most dangerous threats to defend. The dormant circuit inserted stealthily into the chip by the advisory could steal the confidential information or paralyze the system connected to the subverted chip upon the HT activation. This paper presents a transient power supply current sensor to facilitate the screening of an IC for HT infection. Based on the power gating scheme, it converts the current activity on local power grid into a timing pulse from which the timing and power-related side channel signals can be externally monitored by the existing scan test architecture. Its current comparator threshold can be calibrated against the quiescent current noise floor to reduce the impacts of process variations. Postlayout statistical simulations of process variations are performed on the ISCAS'85 benchmark circuits to demonstrate the effectiveness of the proposed technique for the detection of delay-invariant and rarely switched HTs. Compared with the detection error rate of a 4-bit counter-based HT reported by an existing HT detection method using the path delay fingerprint, our method shows an order of magnitude improvement in the detection accuracy.||URI:||https://hdl.handle.net/10356/105037
|ISSN:||1556-6013||DOI:||10.1109/TIFS.2014.2360432||Rights:||© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.1109/TIFS.2014.2360432].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||EEE Journal Articles|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.