4.5 Article

Trojan Detection in Embedded Systems With FinFET Technology

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 71, Issue 11, Pages 3061-3071

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2022.3146217

Keywords

FinFET technology; hardware trojan detection; transistor aging; one-class svm; autoencoder

Funding

  1. Office of Naval Research [N00014-18-1-2672, N00014-21-1-2390]

Ask authors/readers for more resources

This study explores a non-destructive method for detecting Trojans in circuits using FinFET technology. The method utilizes short-term aging effects and circuit overclocking to induce bit errors at the circuit outputs, while employing Machine Learning tools to learn Trojan-free behavior. The results demonstrate the effectiveness of the method in FinFET technology, with robust Trojan detection capabilities across different chips.
This study considers detecting Trojans in circuits using FinFET technology non-destructively, when a golden Integrated Circuit (IC) is unavailable. The method employs short-term aging effects in FinFET transistors and circuit overclocking to induce bit errors at the circuit outputs in conjunction with Machine Learning (ML) tools learning Trojan-free behavior. Short-term aging causes delays along multiple paths in the IC to vary dynamically, causing bit errors at circuit outputs. Overclocking enhances this in FinFET but is not necessary for bulk CMOS technology. We use bit error patterns at the output of the circuit to detect Trojans using an ML classifier trained on simulations of the Trojan-free circuit. The study shows efficacy of the method by using dynamic short-term aging-aware standard cell libraries with FinFET technology that are modeled by considering the dynamic short-term aging of each cell. Trojan detection is robust to chip-to-chip variations. We apply the technique on fourteen Trust-Hub Trojans. Our method detects Trojans with > 95% accuracy. Trojan detection in FinFET technology is more challenging than in bulk CMOS because the voltage range for switching from a high to low value is smaller. Therefore we use overclocking.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available