Skip to main navigation Skip to search Skip to main content

Sensitivity analysis of ring oscillator based hardware Trojan detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the rapid development of Integrated Circuit (IC) technology, more and more attentions are paid to chip security issues. As Hardware Trojan horse becomes a great potential threat to the IC industry, researches have been done on Trojan detection methods. Recently, Ring Oscillator Network (RON) detection structure has been proposed to precisely detect the Hardware Trojan. And we find the detection accuracy of RON detection method is affected by Trojan circuit logic gate switching frequency. In this paper, we analyze the impact of Hardware Trojan activity on ring oscillator frequency. A Hardware Trojan is used to study the detection sensitivity of RON detection structure at different Trojan gate switching frequencies. Result shows the Hardware Trojan gate switching noise has a spatial influence on the frequency of RO array. Especially we find that too low Trojan gate switching frequency will make the RON detection unsuccessful.

Original languageEnglish
Title of host publication2017 17th IEEE International Conference on Communication Technology, ICCT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1979-1983
Number of pages5
ISBN (Electronic)9781509039432
DOIs
StatePublished - 2 Jul 2017
Event17th IEEE International Conference on Communication Technology, ICCT 2017 - Chengdu, China
Duration: 27 Oct 201730 Oct 2017

Publication series

NameInternational Conference on Communication Technology Proceedings, ICCT
Volume2017-October

Conference

Conference17th IEEE International Conference on Communication Technology, ICCT 2017
Country/TerritoryChina
CityChengdu
Period27/10/1730/10/17

Keywords

  • FPGA
  • Hardware trojan
  • Hardware trojan detection
  • Integrated circuit
  • Ring oscillator
  • Security

Fingerprint

Dive into the research topics of 'Sensitivity analysis of ring oscillator based hardware Trojan detection'. Together they form a unique fingerprint.

Cite this