Hardware Trojan: Threats and Emerging Solutions
Hardware Trojan: Threats and Emerging Solutions
(Invited Paper)
                          Rajat Subhra Chakraborty, Seetharam Narasimhan and Swarup Bhunia
                                       Dept. of Electrical Engineering and Computer Science
                                                 Case Western Reserve University
                                                       Cleveland, Ohio, USA
                                             E-mail: {rsc22, sxn124, skb21}@case.edu
                                                                       167
              (a)                                  (b)
                                                                168
                                                                       be further classified into two main types: run-time and test-
                                                                       time techniques. The run-time techniques employ an online
                                                                       monitoring system that tries to detect suspicious activity
                                                                       during in-field operation, while the test-time techniques are
                                                                       aimed at detecting Trojan-infected chips before deployment.
                 (a) On-demand Transparency Scheme [13]
                                                                          1) Run-time, non-invasive Trojan detection approaches:
                                                                       In [6], the authors propose the addition of reconfigurable De-
                                                                       sign for Enabling Security (DEFENSE) logic in a given SoC to
                                                                       enable real-time functionality monitoring. The checks can be
                                                                       performed concurrently with the normal circuit operation and
                                                                       trigger appropriate countermeasures when a deviation from
                                                                       normal functionality is detected. However, the effectiveness
                                                                       and the hardware overhead associated with this scheme is
                                                                       not mentioned in the work. In [17], the authors propose a
                                                                       novel SoC bus architecture that can detect malicious bus
                                                                       behaviors associated with Trojan hardware, protect the system
                                                                       and system bus from them and report the malicious behaviors
     (b) Shadow-latch Based Delay Characterization Technique [16]      to the system CPU, without loss of bus performance. The
                                                                       authors report an additional gate-count of about 800 logic gates
       Fig. 6.   Examples of invasive Trojan detection techniques.
                                                                       in a four million gate SoC, and negligible delay overhead.
                                                                          In [18] the authors propose a scheme whereby functionally
or absence of a Trojan. In [15], a design technique termed             equivalent software instances are executed on multiple CPU
VITAMIN based on the inversion of the supply voltage of                cores, assisted by dynamic distributed software scheduling.
alternate logic levels in an IC is proposed. The logic behavior        The sub-task outputs from different cores are compared to
of a gate operating with inverted supply voltage is inverted           dynamically evaluate their individual trust-levels, with the
during test mode. As a result, the activity of a rarely activated      distributed scheduler undergoing a trust learning procedure for
Trojan circuit is enhanced and it can be detected by comparing         multiple runs. The authors show that the scheme is capable of
the power profiles of different ICs.                                   successfully completing jobs in a Trojan infested environment,
   In [16], the authors propose a low-overhead “at-speed”              with improvement in throughput over successive runs.
delay characterization technique which is capable of detecting            A combined hardware-software approach to perform run-
modifications to the circuit, both at run-time and at test-time.       time execution monitoring has been proposed in [19, 35].
The path delay characterization is based on the insertion of           Here, a simple verifiable “hardware guard” module external
“shadow latches” (see Fig. 6(b)) in the design to capture and          to the CPU is considered. The work targets primarily DoS
compare with the data latched by registers in the original             and privilege escalation attacks, using periodic checks by the
circuit paths. The test-time measurements are compared to the          operating system (OS) which is enhanced with live check
design-time projections and any substantial statistical differ-        functionality. The authors report 2.2% average performance
ence indicates malicious design alteration. In [25], this method       overhead using SPECint 2006 benchmark programs, but do
was shown to be capable of detecting Trojans in an 8×8 array           not report the hardware design overhead.
multiplier circuit under ±20% process variations. A dummy                 2) Test-time, non-invasive Trojan detection approaches:
flip-flop insertion technique to increase the trigger probability      There are two main classes of testing based approaches for
of Trojans was presented in [29], to aid in the detection of           Trojan detection: (a) those based on logic testing, and (b)
Trojans through side-channel techniques. It can also help in           those based on the measurement of side-channel parameters
Trojan detection with logic testing by making the malicious            such as power, delay, etc. The main advantage of the test-
effect of a Trojan observable at the primary output.                   time techniques over the run-time techniques is that the test-
   Another novel technique proposed in [14] is to use 3-D IC           time techniques incur no hardware overhead, while the main
technology to integrate the security mechanisms in a separate          disadvantage is the requirement of a “golden” (i.e. Trojan-free)
plane (called the control plane) above an existing plane of            manufactured IC or functional model. Run-time methods typ-
circuitry in an IC (called the computation plane). The paper           ically involve considerable performance and power overhead,
describes several security mechanisms to be performed by               however, they provide the last line of defense and are capable
the control plane; however, it does not discuss the technical          of providing 100% confidence in computed results.
challenges and the design overhead.                                          a) Logic testing-based approaches: The main challenge
                                                                       in a logic testing based approach is the enormously large
B. Non-invasive Trojan Detection Techniques                            Trojan space, which makes the generation of an exhaustive
  In the non-invasive Trojan detection techniques, a Trojan is         set of test vectors to detect all possible Trojans computation-
detected by comparing the behavior of the test IC with the             ally infeasible. As an example, even with the constraint of
golden IC instance or a golden functional model. They can              maximum four trigger nodes and a single payload node, a
                                                                     169
                                                                                             (a) Power-Supply Transient Based Trojan Detection [23]
Fig. 7. Logic testing based technique: Impact of N (number of times a rare
point satisfies its rare value) on the trigger/Trojan coverage and test length
for an ISCAS-85 benchmark circuit [20].
                                                                             170
                            TABLE I
   A DVANTAGES AND D ISADVANTAGES OF L OGIC T ESTING AND S IDE                    [6] M. Abramovici and P. Bradley, “Integrated Circuit Security - New Threats
            C HANNEL T ROJAN D ETECTION A PPROACHES                                   and Solutions”, CSIIR Workshop, 2009.
                                                                                  [7] F. Wolff et al, “Towards Trojan-Free Trusted ICs: Problem Analysis and
              Logic Testing Approach              Side–channel Approach               Detection Scheme”, DATE, 2008.
                                                                                  [8] X. Wang, M. Tehranipoor and J. Plusquellic, “Detecting Malicious
  Pros     (a) Effective for small Trojans     (a) Effective for large Trojans        Inclusions in Secure Hardware: Challenges and Solutions”, HOST, 2008.
           (b) Robust under process noise      (b) Test generation is easy        [9] Z. Chen et al, “Hardware Trojan Designs on BASYS FPGA Board
  Cons     (a) Test generation is complex      (a) Vulnerable to process noise        (Virginia Tech)”, CSAW Embedded System Challenge, 2008. [Online].
           (b) Large Trojan detection          (b) Small Trojan detection             Available: http://isis.poly.edu/∼vikram/vt.pdf.
           challenging                         challenging                        [10] A. Baumgarten et al, “Embedded Systems Challenge (Iowa State Uni-
                                                                                      versity)”, CSAW Embedded System Challenge, 2008. [Online]. Available:
                                                                                      http://isis.poly.edu/∼vikram/iowa state.pdf.
                                                                                  [11] Y. Jin and N. Kupp, “CSAW 2008 Team Report (Yale University)”,
ity of published side-channel approaches provide simulation                           CSAW Embedded System Challenge, 2008. [Online]. Available: http://isis.
verification results. Process variations, design marginalities                        poly.edu/∼vikram/yale.pdf.
                                                                                  [12] R.S. Chakraborty and S. Bhunia, “Security against Hardware Trojan
and measurement noise depend on many parameters and are                               through a Novel Application of Design Obfuscation”, ICCAD, 2009.
hard to model accurately. Hence, it is important to perform                       [13] R.S. Chakraborty, S. Paul and S. Bhunia, “On-Demand Transparency
hardware validation of a side-channel approach to accurately                          for Improving Hardware Trojan Detectability”, HOST, 2008.
                                                                                  [14] T. Huffmire et al, “Trustworthy System Security through 3-D Integrated
analyze its detection sensitivity.                                                    Hardware”, HOST, 2008.
   Table I summarizes the relative advantages and disadvan-                       [15] M. Banga and M.S. Hsiao, “VITAMIN: Voltage Inversion Technique
tages of logic testing and side-channel approaches for Trojan                         to Ascertain Malicious Insertions in ICs”, HOST, 2009.
                                                                                  [16] J. Li and J. Lach, “At-Speed Delay Characterization for IC Authenti-
detection. From this table, it is clear that the two approaches                       cation and Trojan Horse Detection”, HOST, 2008.
have complementary scope in terms of Trojan detection capa-                       [17] L.W. Kim, J.D. Villasenor and C.K. Koc, “A Trojan-resistant System-
bility. Hence, approaches that combine the best of both worlds                        on-chip Bus Architecture”, Intl. Conf. on Military Communication, 2009.
                                                                                  [18] D. McIntyre et al, “Dynamic Evaluation of Hardware Trust”, HOST,
can be the most promising in terms of generic Trojan detection                        2009.
capability.                                                                       [19] G. Bloom, B. Narahari and R. Simha, “OS Support for Detecting Trojan
                                                                                      Circuit Attacks”, HOST, 2009.
                             IV. S UMMARY                                         [20] R.S. Chakraborty et al, “MERO: A Statistical Approach for Hardware
                                                                                      Trojan Detection”, CHES Workshop, 2009.
   The issue of hardware Trojans and effective countermea-                        [21] I. Pomeranz and S.M. Reddy, “A Measure of Quality for n–Detection
sures against them have drawn considerable interest in recent                         Test Sets”, IEEE. Trans. on Computers, Nov. 2004.
                                                                                  [22] D. Agrawal et al, “Trojan detection using IC fingerprinting”, IEEE
times. In this paper, we have presented a comprehensive study                         Symp. on Security and Privacy, 2007.
of different Trojan types and discussed emerging methods of                       [23] R.M. Rad, J. Plusquellic and M. Tehranipoor, “Sensitivity Analysis to
detecting them. Considering the varied nature and size of hard-                       Hardware Trojans using Power Supply Transient Signals”, HOST, 2008.
                                                                                  [24] Y. Jin and Y. Makris, “Hardware Trojan Detection Using Path Delay
ware Trojans, it is likely that a combination of techniques, both                     Fingerprint”, HOST, 2008.
during design and test, would be required to provide acceptable                   [25] D. Rai and J. Lach, “Performance of Delay-Based Trojan Detection
level of security. Design-time approaches would span various                          Techniques under Parameter Variations”, HOST, 2009.
                                                                                  [26] M. Potkonjak et al, “Hardware Trojan Horse Detection Using Gate-
levels of design descriptions. On the other hand, post-silicon                        Level Characterization”, DAC, 2009.
validation would require a combination of logic and side-                         [27] M. Banga and M.S. Hsiao, “A Region Based Approach for the
channel test approaches to cover Trojans of different types and                       Identification of Hardware Trojans”, HOST, 2008.
                                                                                  [28] M. Banga and M.S. Hsiao, “A Novel Sustained Vector Technique for
sizes under large parameter variations. Major future challenges                       the Detection of Hardware Trojans”, VLSI Design, 2009.
in this area would include developing detection mechanisms                        [29] H. Salmani, M. Tehranipoor and J. Plusquellic, “New Design Strategy
for analog Trojans which can implement numerous types of                              for Improving Hardware Trojan Detection and Reducing Trojan Activa-
                                                                                      tion Time”, HOST, 2009.
activation and observation conditions; an integrated metric to                    [30] Y. Alkabani and F. Koushanfar, “Designer’s Hardware Trojan Horse”,
quantify the level of trust that combines both design and test                        HOST, 2008.
time approaches; and an evaluation platform that analyzes                         [31] S. King et al, “Designing and Implementing Malicious Hardware”,
                                                                                      LEET, 2008.
a design to identify vulnerable regions and the impact of a                       [32] L. Lin et al, “Trojan Side-Channels: Lightweight Hardware Trojans
design change on the level of achievable trust.                                       through Side-Channel Engineering”, CHES Workshop, 2009.
                                                                                  [33] F. Kiamilev and R. Hoover, “Demonstration of Hardware Trojans”,
                              R EFERENCES                                             DEFCON 16, 2008.
                                                                                  [34] S. Jha and S.K. Jha, “Randomization Based Probabilistic Approach to
[1] Semiconductor Industry Association (SIA), “Global billings report history         Detect Trojan Circuits”, 11th IEEE High Assurance Systems Engineering
    (3-month moving average) 1976-March 2009”, 2008. [Online]. Available:             Symposium, 2008.
    http://www.sia-online.org/galleries/Statistics/GSR1976-March09.xls.           [35] G. Bloom et al, “Providing Secure Execution Environments with a
[2] Defense Science Board, “Task force on high performance microchip                  Last Line of Defense against Trojan Circuit Attacks”, Computers and
    supply”, 2005. [Online]. Available: http://www.acq.osd.mil/dsb/reports/           Security, 2009.
    200502HPMSReportFinal.pdf.                                                    [36] Chipworks, Inc., “Semiconductor Manufacturing - Reverse Engineering
[3] DARPA, “TRUST in Integrated Circuits (TIC) - Proposer Informa-                    of Semiconductor components, parts and process”. [Online]. Available:
    tion Pamphlet”, 2007. [Online]. Available: http://www.darpa.mil/MTO/              http://www.chipworks.com
    solicitations/baa07-24/index.html.                                            [37] J.A. Kash, J.C. Tsang and D.R. Knebel, “Method and Apparatus for Re-
[4] Australian Government DoD-DSTO, “Towards Countering the Rise of                   verse Engineering Integrated Circuits by Monitoring Optical Emission”,
    the Silicon Trojan”, 2008. [Online]. Available: http://dspace.dsto.defence.       United States Patent Number 6,496,022 B1, 2002.
    gov.au/dspace/bitstream/1947/9736/1/DSTO-TR-2220\%20PR.pdf.                   [38] S. Smith and J. Di, “Detecting Malicious Logic Through Structural
[5] S. Adee, “The Hunt for the Kill Switch”, IEEE Spectrum, May 2008.                 Checking”, IEEE Region 5 Technical Conference, April 2007.
171