Abstract

In recent years, hardware Trojans have become a research hotspot in security field, variety of detection methods have been proposed to resist this threat as a result. However, most of them are based on a standard template to detect a chip with specific functions. This may provide some help, but because of the weak adaptability, if the target chip is used for other functions, the attacker will have to rebuild a corresponding template. This paper proposed a new method of hardware Trojan detection based on power characteristics. Through a deep research of power consumption hardware Trojan detection theory, we developed an encryption algorithm experiment platform surrounding a FPGA board. We successfully reduced the dimensions of the data by principal component analysis (PCA) technology, and then based on the Mahalanobis distance weather the hardware Trojan is contained in the chip could be detected. In this paper, we take the RS232 serial port hardware Trojan implanted in DES and AES algorithm as examples to apply the verification experiments. Results show that our method could adapt to a variety of different function circuits of one same chip, while the successful detection rate is high, and the computational cost is low.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.