Abstract
Security threats due to Hardware Trojans are growing in volume and variety. The miniature size of Trojans coupled with their diversity and their unpredictable effects made them difficult to detect. Researchers have proposed different techniques to either prevent the insertion of Hardware Trojans or detect them at early stages. In this article, a new tamper resilient solution is presented to capture the electromagnetic signature of integrated circuits to ensure their security. In the proposed method, the remaining metal and polysilicon layers are fully utilized as internal magnetic probes to monitor the signature of the device and in the meantime deprive attackers of layout resources to route Hardware Trojans. 3-D full-wave electromagnetic field simulations using high-frequency structural simulator show that tampering with a chip to insert a minimally invasive Trojan of 12 μm <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> , the area required to insert an inverter, can be detected through the magnetic signature.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: IEEE Transactions on Electromagnetic Compatibility
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.