On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis

Sophie Dupuis 1 Giorgio Di Natale 1 Marie-Lise Flottes 1 Bruno Rouzeyre 1
1 SysMIC - Conception et Test de Systèmes MICroélectroniques
LIRMM - Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier
Abstract : Hardware Trojan Horses (HTHs) are malicious and stealthy alterations of integrated circuits introduced at design or fabrication steps in order to modify the circuit's intended behavior when deployed in the field. Due to HTHs stealth and diversity (intended alteration, implementation, triggering conditions), detecting and/or locating them is a challenging task. Several HTHs detection approaches have been proposed to address this problem. This paper focuses on so-called "side-channel analysis" methods, i.e., methods that use power or delay measurements to detect potential HTHs. It reviews these methods and raises some considerations about the experiments made to evaluate them. Moreover, an original case study is presented in which we show that weak experiments may lead to misleading interpretations. Last, we evoke problems inherent to actual power and delay measurements.
Type de document :
Article dans une revue
Information Security Journal: A Global Perspective, Taylor & Francis, 2014, Trustworthy Manufacturing and Utilization of Secure Devices, 22 (5-6), pp.226-236. 〈10.1080/19393555.2014.891277〉
Liste complète des métadonnées

Littérature citée [26 références]  Voir  Masquer  Télécharger

https://hal-lirmm.ccsd.cnrs.fr/lirmm-00991362
Contributeur : Sophie Dupuis <>
Soumis le : jeudi 15 mai 2014 - 10:32:00
Dernière modification le : jeudi 24 mai 2018 - 15:59:24
Document(s) archivé(s) le : vendredi 15 août 2014 - 10:47:20

Fichier

dupuis_TRUDEVICE_FINAL.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Sophie Dupuis, Giorgio Di Natale, Marie-Lise Flottes, Bruno Rouzeyre. On the Effectiveness of Hardware Trojan Horse Detection via Side-Channel Analysis. Information Security Journal: A Global Perspective, Taylor & Francis, 2014, Trustworthy Manufacturing and Utilization of Secure Devices, 22 (5-6), pp.226-236. 〈10.1080/19393555.2014.891277〉. 〈lirmm-00991362〉

Partager

Métriques

Consultations de la notice

229

Téléchargements de fichiers

895