Indian Journal of Science and Technology
DOI: 10.17485/ijst/2016/v9iS1/107899
Year: 2016, Volume: 9, Issue: Special Issue 1, Pages: 1-6
Original Article
N. Mohankumar* and M. Nirmala Devi
Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, Amrita University, Coimbatore – 641112, Tamil Nadu, India; [email protected]
[email protected]
*Author for correspondence
Mohankumar
Department of Electronics and Communication Engineering
Email: [email protected]
Present day electronic chips are outsourced by the manufacturer and done by third-parties. Such practices are widely prevalent as it works out to be more profitable in terms of cost and effort to complete these processes offshore in VLSI foundries. This comes with a potential risk of compromised security due to hardware Trojans. There are existing methodologies which aim at tacking the issue of Hardware Trojans by detecting it. Hardware Trojan detection by decomposing the design into blocks to detect combinational Trojan and Sequential Trojan is proposed in this paper. By comparing the leakage and total power values consumed by both the design i.e. with and without the presence of the hardware Trojans, we can identify the presence of the hardware Trojans. Moreover if the measurement noise gets high it masks or hides the effect of the variation in power profile, which leads to a wrong decision. So by taking the measurement noise under consideration the classification is effectively done for magnifying the differences by using Principle Component Analysis approach and tested with 8, 16 and 32 bit ALU designs.
Keywords: Hardware Security, Hardware Trojan Detection, Principle Component Analysis, Side Channel Analysis
Subscribe now for latest articles and news.