Countermeasures to Malicious Hardware to Improve Software Protection Systems
Department of Defense
Agency Tracking Number:
Solicitation Topic Code:
Small Business Information
Smart Systems Technologies Incorporated
9155 East 146th Street, Noblesville, IN, 46060
Socially and Economically Disadvantaged:
AbstractMalicious alterations of COTS circuits poses major concern in terms of their reliable and trusted field operation. It is extremely difficult to discover such alterations, also referred to as “hardware Trojans” using conventional structural or functional testing strategies. In this proposal, we propose a novel non-invasive, multiple parameter side-channel analysis based Trojan detection approach that is capable of detecting malicious hardware modifications in the presence of large process variation induced noise. We exploit the intrinsic relationship between dynamic current (IDDT) and maximum operating frequency (Fmax) of a circuit to distinguish the effect of a Trojan from process induced fluctuations in IDDT. We propose a vector generation approach for IDDT measurement that can improve the Trojan detection sensitivity for arbitrary Trojan instances. Similar prior work shows results with two large circuits, a 32-bit integer execution unit (IEU) and a 128-bit Advanced Encryption System (AES) cipher, show a detection resolution of 0.04% can be achieved in presence of ±20% parameter (Vth) variations. The proposed new approach will be validated with experimental results using 120nm FPGA (Xilinx Virtex-II) chips and COTS logic devices.
* information listed above is at the time of submission.