Silicon Echoes: Non-Invasive Trojan and Tamper Detection using Frequency-Selective Impedance Analysis
نویسندگان
چکیده
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples such tamper events. Altering the placement routing a design or removing part circuit for side-channel leakage/fault sensitivity amplification other instances attacks. While semi- fully-invasive physical verification methods can confidently detect stealthy events, they costly, time-consuming, destructive. On hand, virtually all proposed non-invasive suffer from noise and, therefore, have low confidence. Moreover, require activating tampered (e.g., trigger) to compare modifications. In this work, we introduce post-silicon technique applicable different classes events at chip level without requiring activation malicious circuit. Our method relies on fact that modifications (regardless their physical, activation, action characteristics) alter impedance chip. Hence, characterizing lead To sense changes in impedance, deploy known RF tools, namely, scattering parameters, which inject sine wave signals with high frequencies power distribution network (PDN) system measure “echo” signal. reflected various frequency bands reveal based impact size die. validate our claims, performed measurements several proof-ofconcept hardware implementations realized FPGAs manufactured 28 nm technology. We further show deploying Dynamic Time Warping (DTW) distance distinguish between resulting manufacturing process variation chips/boards. Based acquired results, demonstrate Trojans, as well sophisticated P&R, be detected.
منابع مشابه
Tamper Detection and Continuous Non-malleable Codes
We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a codeword c = Enc(m). The codeword can be adversarially tampered via a function f ∈ F from some “tampering function family” F , resulting in a tampered value c′ = f(c). We study the different types of security guarantees that can be achieved in this scenario for different families F of tampering atta...
متن کاملImage Tamper Detection Using Non Alignment of Jpeg Grids
Digital images have a very significant role in various fields like criminal and forensic investigations, medical imaging and journalism. But due to wide availability of powerful editing software, image forgery has become much easier. The aim of this paper is to detect the forgery on JPEG compressed images when splicing (copy-paste) will result in non alignment of JPEG grids. JPEG is widely used...
متن کاملNon-invasive Imaging of Synchronized Neuronal Activity Using Low Frequency Electrical Impedance Tomography
Electrical impedance Tomography (EIT) has the potential to achieve non-invasive functional imaging of fast neuronal activity in the human brain. During evoked responses, fast (~1ms) local impedance changes of ~1% below 100Hz, were estimated to occur in our group using cable theory modelling and animal studies. The purpose of this work was to quantify the expected voltage changes in EIT potentia...
متن کاملNon - invasive Bio - impedance Measurement Using Voltage - Current Pulse Technique
Noninvasive detection is a fundamental prerequisite for pervasive healthcare system and biosensing. Along with different noninvasive techniques such as ultrasound, X-ray, magnetic resonance and optical imaging, electrical impedance spectroscopy is emerging as more suitable technique for tissue level diagnosis. This paper presents a noninvasive technique for bioelectrical impedance estimation by...
متن کاملHardware Trojan Detection Using Multi-Parameter Functional Side-Channel Analysis
A hardware trojan is a modification to a hardware design which inserts undesired or malicious functionality to the design. They pose a substantial security risk, and rapid, reliable detection of these trojans has become a critical necessity. In this paper, we propose a method for detecting compromised designs quickly and effectively. The process involves a multi-parameter analysis of the design...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2023
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2023.i4.238-261