Hardware Trojan Detection In Analog/Rf Integrated Circuits
Abstract
Globalization of semiconductor manufacturing has brought about increasing concerns regarding possible infiltration of the Integrated Circuit (IC) supply chain by skilled and resourceful adversaries, with the intention of introducing malicious modifications (a.k.a hardware Trojans) which can be exploited to cause incorrect results, steal sensitive data, or even incapacitate a chip. While numerous prevention and detection solutions have been introduced in the recent, past, the vast majority of these efforts target digital circuits. Analog/RF ICs, however, are equally vulnerable and potentially even more attractive as attack targets, due to their wireless communication capabilities. Accordingly, in this chapter, we review existing research efforts in hardware Trojan detection in Analog/RF ICs. Specifically, using a wireless cryptographic IC as an experimentation platform, we demonstrate the effectiveness of side-channel fingerprinting along with advanced statistical analysis and machine learning methods in detecting hardware Trojans both after its manufacturing and after its deployment in its field of operation.
Publication Date
9-17-2015
Publication Title
Secure System Design and Trustable Computing
Number of Pages
241-268
Document Type
Article; Book Chapter
Personal Identifier
scopus
DOI Link
https://doi.org/10.1007/978-3-319-14971-4_7
Copyright Status
Unknown
Socpus ID
84955391031 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/84955391031
STARS Citation
Jin, Yier; Maliuk, Dzmitry; and Makris, Yiorgos, "Hardware Trojan Detection In Analog/Rf Integrated Circuits" (2015). Scopus Export 2015-2019. 1373.
https://stars.library.ucf.edu/scopus2015/1373