DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements

DSpace/Manakin Repository

DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements

Citable link to this page

. . . . . .

Title: DISTROY: Detecting Integrated Circuit Trojans with Compressive Measurements
Author: Vlah, Dario; Kung, H.T. T.; Gwon, Youngjune Lee

Note: Order does not necessarily reflect citation order of authors.

Citation: Gwon, Youngjune, H.T. Kung, and Dario Vlah. 2011. DISTROY: Detecting integrated circuit Trojans with compressive measurements. Paper presented at 6th USENIX Workshop on Hot Topics in Security (HotSec 2011), San Francisco, CA, August 9, 2011.
Full Text & Related Files:
Abstract: Detecting Trojans in an integrated circuit (IC) is an important but hard problem. A Trojan is malicious hardware it can be extremely small in size and dormant until triggered by some unknown circuit state. To allow wake-up, a Trojan could draw a minimal amount of power, for example, to run a clock or a state machine, or to monitor a triggering event. We introduce DISTROY (Discover Trojan), a new approach that can effciently and reliably detect extremely small background power leakage that a Trojan creates and as a result, we can detect the Trojan. We formulate our method based on compressive sensing, a recent advance in signal processing, which can recover a signal using the number of measurements approximately proportional to its sparsity rather than size. We argue that circuit states in which the Trojan background power consumption stands out are rare, and thus sparse, so that we can apply compressive sensing. We describe how this is done in DISTROY so as to afford suffcient measurement statistics to detect the presence of Trojans. Finally, we present our initial simulation results that validate DISTROY and discuss the impact of our work in the field of hardware security.
Other Sources: http://www.eecs.harvard.edu/~htk/publication/2011-hotsec-gwon-kung-vlah.pdf
Terms of Use: This article is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of-use#LAA
Citable link to this page: http://nrs.harvard.edu/urn-3:HUL.InstRepos:10000798

Show full Dublin Core record

This item appears in the following Collection(s)

  • FAS Scholarly Articles [7374]
    Peer reviewed scholarly articles from the Faculty of Arts and Sciences of Harvard University
 
 

Search DASH


Advanced Search
 
 

Submitters