Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis

نویسندگان

چکیده

The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples such tamper events. Altering the placement routing a design or removing part circuit for side-channel leakage/fault sensitivity amplification other instances attacks. While semi- fully-invasive physical verification methods can confidently detect stealthy events, they costly, time-consuming, destructive. On hand, virtually all proposed non-invasive suffer from noise and, therefore, have low confidence. Moreover, require activating tampered (e.g., trigger) to compare modifications. In this work, we introduce post-silicon technique applicable different classes events at chip level without requiring activation malicious circuit. Our method relies on fact that modifications (regardless their physical, activation, action characteristics) alter impedance chip. Hence, characterizing lead To sense changes in impedance, deploy known RF tools, namely, scattering parameters, which inject sine wave signals with high frequencies power distribution network (PDN) system measure “echo” signal. reflected various frequency bands reveal based impact size die. validate our claims, performed measurements several proof-ofconcept hardware implementations realized FPGAs manufactured 28 nm technology. We further show deploying Dynamic Time Warping (DTW) distance distinguish between resulting manufacturing process variation chips/boards. Based acquired results, demonstrate Trojans, as well sophisticated P&R, be detected.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper Detection and Continuous Non-malleable Codes

We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a codeword c = Enc(m). The codeword can be adversarially tampered via a function f ∈ F from some “tampering function family” F , resulting in a tampered value c′ = f(c). We study the different types of security guarantees that can be achieved in this scenario for different families F of tampering atta...

متن کامل

Image Tamper Detection Using Non Alignment of Jpeg Grids

Digital images have a very significant role in various fields like criminal and forensic investigations, medical imaging and journalism. But due to wide availability of powerful editing software, image forgery has become much easier. The aim of this paper is to detect the forgery on JPEG compressed images when splicing (copy-paste) will result in non alignment of JPEG grids. JPEG is widely used...

متن کامل

Non-invasive Imaging of Synchronized Neuronal Activity Using Low Frequency Electrical Impedance Tomography

Electrical impedance Tomography (EIT) has the potential to achieve non-invasive functional imaging of fast neuronal activity in the human brain. During evoked responses, fast (~1ms) local impedance changes of ~1% below 100Hz, were estimated to occur in our group using cable theory modelling and animal studies. The purpose of this work was to quantify the expected voltage changes in EIT potentia...

متن کامل

Non - invasive Bio - impedance Measurement Using Voltage - Current Pulse Technique

Noninvasive detection is a fundamental prerequisite for pervasive healthcare system and biosensing. Along with different noninvasive techniques such as ultrasound, X-ray, magnetic resonance and optical imaging, electrical impedance spectroscopy is emerging as more suitable technique for tissue level diagnosis. This paper presents a noninvasive technique for bioelectrical impedance estimation by...

متن کامل

Hardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis

A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2023

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2023.i4.238-261