Trojan Calibration
Trojan Calibration
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
Trojan taxonomy
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
Wire in original 31 Wire in
31 original
A design Inserted gate
To design
Trojan
B activation detonator Inserted gate
32-bit register
wire To
32-bit register
Trojan detonator
activation
32-input wire
NAND gate
Trojan gates and wires 0 Trojan transistors,
0 (a) gates and wires (b)
Figure 2. Multi-stage logic implementation of a Trojan comparator (a) Monolithic logic gate implementation of a Trojan
comparator (b)
4 Simulated Design and Trojan Detection Method ing logic testing, e.g., one chance in 232. However, actively moni-
Based on the proposed Taxonomy, it is clear that the diver- toring the values in a 32-bit register consumes power, and opens
sity of Trojans is immense and therefore, the most effective strat- up the possibility that the Trojan may be detected by monitoring
egy for detecting them may vary depending on the specific the power supply current during testing. Therefore, a secondary
characteristics of the Trojan. This paper does not attempt to evalu- issue for the adversary is to minimize the impact of the compara-
ate the overall effectiveness of region-based transient power sig- tor on the power consumption profile of the chip.
nal analysis methods across the proposed Trojan taxonomy (this is There are many possible ways to implement the comparator.
left for future work), but rather is focused on determining the The implementation shown in Figure 2(a) is a multi-stage logic
most effective method(s) of calibrating transient signals for PE gate with one minterm, i.e., it asserts its output under only one
variation effects. The results presented are therefore of benefit to permutation of its inputs. The drawback to this scheme, with
any type of Trojan detection scheme and are independent of Tro- regard to power consumption, is the high probability that partial
jan type. However, in order to provide a meaningful context for activation of the Trojan will occur during testing. Partial activa-
evaluating the signal calibration methods, a core logic design and tion is defined when one or more of the NORs and NANDs gate
several specific Trojan implementations are selected, as described outputs switch in response to changing data patterns in the regis-
in the following subsections. ter. This occurs because each gate monitors only a subset of the
4.1 Trojan Design register values. The partial activation of the Trojan increases
Given the clandestine nature of Trojans, we assume an intel- power consumption and makes it possible to detect it. A second
ligent and determined adversary will make it nearly impossible to scheme is to instead implement the monitor as a monolithic gate,
activate the Trojan accidentally or purposefully through func- as shown in Figure 2(b). In this case, a 32-bit NAND gate, shown
tional, structural, and random test patterns during manufacturing at the transistor level, is used to determine when the target bit pat-
test. For functional, condition-based Trojans, the adversary will tern is present. Partial activation occurs in this implementation as
work diligently to control activation to a time of his or her choos- well by virtue of the inserted inverters and the potential for charg-
ing. ing and discharging of the internal parasitic capacitances in the
The Trojan implementation shown in Figure 2(a) meets this long chain of series n-channel devices.
criteria for a hypothetical military application. The Trojan in this There are in fact many other implementations possible for
scenario is embedded in a chip that serves as the controller for a the comparator. The main point of this analysis, however, is to
missile system. The chip receives encrypted data from a ground- demonstrate that Trojans will always have some level of impact
based station through an RF channel and stores the data in a regis- on the power profile of the chip. Even if stealthy layout strategies
ter (shown on the left side of Figure 2(a)). By design, the data is are used that reduce the probability of partial activation, capaci-
decrypted and checked for validity by core logic components in tive loading to the wires being monitored will always be present.
the chip (not shown). This is a very important concept because it suggests that it is pos-
The gates shown to the right of the register in the figure rep- sible to detect the Trojan without activating it. The challenge is to
resent the Trojan. The inputs to the Trojan connect to the register develop a detection technique that maximizes the sensitivity to
and monitor its state. Since the register holds un-encrypted data, potentially small changes in the power profile of a chip with an
the adversary can control, through his own data transmission embedded Trojan. The main detractor to achieving high levels of
tower, the activation of the Trojan at a time of his choosing by resolution are process and environmental (PE) variations.
transmitting a specific bit pattern to the register. One possible 4.2 Simulation Models and Detection Algorithm
action carried out once the Trojan is activated might be to cause We propose a power supply transient analysis (IDDT) tech-
the missile to detonate prior to reaching its target. nique for detecting Trojans that is robust to the adverse effects of
The additional circuitry added by the adversary to implement PE variations. The method analyzes local, i.e., within-chip, IDDT
the Trojan necessarily includes some type of comparator to decide measurements obtained from the multiple, individual power ports
when the trigger bit pattern is present. In order to prevent acciden- (PPs) on the chip. The method is described following the descrip-
tal discovery of the Trojan, during, for example, manufacturing tion of the design and model used in the simulation experiments.
test, the comparator must monitor a sufficiently large number of
bits and assert its output only on one or a very small number of 4.2.1 Simulation Model
possible combinations of those bits. For this discussion, assume A block diagram of the IC design used in the simulation
the values in a 32-bit register serve as input to the Trojan and the experiments is shown in Figure 3. The design includes a six metal
comparator asserts on only one set of values. This is sufficient to layer power grid with nine power ports, labeled PP0 through PP9.
make it unlikely that the Trojan will be accidentally activated dur- The core logic consists of four copies of the ISCAS‘85 C499
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
Membrane probe and its
Tester Power Supply DIB, Probe Card (PCB) contact resistance
Figure 3. Architecture of Simulation Model Figure 4. Probe card model used in the simulation experiments
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
NC
path areas scatterplot
Current (mAs)
Current (mAs)
analysis
PP1-IDDT
path wfms
calibration values path wfms
PP0-IDDT DC AS AW
PP6-IDDT 5 ns
Time (ns) Time (ns)
IDDQs wfm IR areas path
samples areas
Fig. 6. Calibration circuit step responses (left) and their
integrated derivatives (right). matrix transformation
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
The transformation matrix is computed for each test chip and un-normalized path data and 2) by calibrating the path data to
from the calibration data. Once computed, it is subsequently used IDENTITY and to t22t, under each of the four calibration meth-
to calibrate the path data measured under core logic tests, as given ods and three test sequences. This process is repeated for Trojan
by Equation 3. The vector given by t0 through t8 corresponds to 2(a) and 2(b).
Cn = Tn * X 6 Simulation Results
The results of the simulation experiments are displayed in a
set of 3-D bar graphs for Trojan 2(a) in Figures 8 and 9 and for
c0 x 00 x 01 ... x 08 Trojan 2(b) in Figure 10. The x-axis of the bar graphs gives the
c1 x x ... x 18 Eq.3. control PMs, C1 through C5, and the ten Trojan-inserted PMs, T1
= t 0 t 1 ... t 8 × 10 11 through T10. The y-axis gives the results for the no signal calibra-
... ... ... ... ... tion case in front of the results for the DC, AS, AA and AW cali-
c8 x 80 x 81 ... x 88 bration cases. The z-axis gives the maximum standardized
residuals, i.e., the largest distance among the data points across
the nine data values (areas or waveforms) from the core logic the twelve scatterplots that fall outside the three sigma limits for
tests. The calibrated data is given by the column vector on the left, each process model. A value of zero indicates that all data points
i.e., c0 through c8. fell within the limits.
The bar graphs of Figure 8 show two results, one for un-nor-
The calibrated path data given by Cn in Equation 3 can be
malized data (top) and one for normalized data (bottom). Both bar
used directly in the prediction ellipse method. We refer to this graphs give results for Trojan 2(a) under the 2nd test sequence
analysis as ‘un-normalized’ in Section 6. The path data can also with the path data calibrated to t22t. The results in Figure 9 are
be normalized using a process identical to that described for the similar except they are derived from data calibrated to IDEN-
calibration data, i.e., the elements of the vector Cn are each TITY. The results for the 1st and 3rd test sequences in both cases
divided by the sum computed across all elements. We refer to this show similar trends and are therefore not shown.
analysis as ‘normalized’. From these results, it is clear that the ‘no calibration’ tech-
From Figure 7, the calibration data used in Equation 1 corre- nique performs poorly in all cases. For the un-normalized bar
sponds to single floating point numbers for the DC, AS and AA graphs, outliers are present in only five of the ten Trojan-inserted
methods, i.e., current samples for DC and AS and areas for AA. process models and all maximum residuals are less than 0.7. In
The calibration data for AW is an entire waveform and requires the normalized bar graphs, no outliers are generated so that Trojan
special treatment as shown along the bottom of Figure 7. In this is not detected. As described in Section 4.1, the signal variations
case, a discrete Fourier transform (DFT) is applied to the IR introduced by Trojan 2(a) are fairly large because of the way it is
waveforms to convert them into the real and imaginary compo- implemented. This result demonstrates that signal calibration is an
nents appropriate for the matrix inverse operation. The matrix important component for achieving a reasonable level of sensitiv-
inverse is then computed for each set of frequency components ity to Trojans using transient power supply detection methods.
separately. In our experiments, the frequency domain representa- From the bars corresponding to the calibration techniques, it
tion contains 1024 real and imaginary components, so 1024 9-by- is clear that each is are able to easily identify the presence of this
9 CM matrices are constructed and inverted. Normalization is per- Trojan. The maximum residuals range from 15 to nearly 60 stan-
formed by dividing all frequency components by the DC compo- dard deviations. The failure of the DC calibration method to
nents. The path waveforms are treated in a similar fashion. Once account for inductance and capacitance variations reduces its sen-
calibrated, an inverse DFT is performed on the calibrated path real sitivity to Trojans. This is more noticeable in the bottom (normal-
and imaginary components and the area under the path waveforms ized) bar graphs where the maximum residuals for DC are
are used in the prediction ellipse method. noticeable smaller than those for any of the AC techniques. Inter-
One other variant of the calibration process is investigated in estingly, the AC techniques are nearly equivalent in terms of their
this paper. The transformation matrix X given by Equation 2 is detection resolution. This is significant because it suggests that
defined as the matrix inverse of CM. It is also possible to calibrate the simpler AS technique can be used in place of more complex
to a specific probe card and process model by multiplying the techniques such as AW which perform full waveform calibration.
CM-1 obtained for any given process model by the CM of the tar- The last notable observation concerning these results is the
difference in the magnitudes of the maximum residuals of un-nor-
get process model using Equation 2, i.e., X = CM-1(PMa) X
malized and normalized techniques. The normalized technique
CM(PMb) to calibrate PMa to PMb. The target process model in marginally outperforms the un-normalized technique for this Tro-
our experiments is the model identified as t22t on [14]. The two jan. There does not appear to be any advantage to calibrating to
approaches are referred to as ‘calibrate to IDENTITY’ and ‘cali- IDENTITY or t22t.
brate to t22t’. The bar graph of Figure 10 gives the results across all paths
The process followed in our experiments is as follows. A set for Trojan 2(b) using the normalized and ‘calibrate to t22t’ meth-
of thirty simulation models are created for the Quad Core, twenty ods. The format is identical to that used in Figures 8 and 9 except
for the Trojan-free design and ten for Trojan-inserted designs. The for the concatenation of the individual path results along the x-
calibration tests are carried out on each model and the transforma- axis. The results for the un-normalized and ‘calibrate to IDEN-
tion matrix computed. Three core logic test sequences are applied TITY’ methods show no distinguishable advantage for Trojan
and the IDDT areas or waveforms are calibrated using the transfor- 2(b), and consequently are not shown.
mation matrix. Twelve scatterplots are created from the calibrated The smaller range of values along the z-axis reflects the
data and the prediction ellipses are computed using fifteen data much smaller signal anomaly introduced by this Trojan, as pre-
points from the Trojan-free PMs. The largest residuals for the five dicted in the discussion concerning its implementation in Section
remaining Trojan-free PMs and ten Trojan-inserted PMs are com- 4.1. It is also clear that the level of sensitivity to Trojans strongly
puted using the data points that fall outside the elliptical bounds depends on the test sequence. The maximum residuals of the 2nd
across the twelve scatterplots. The scatterplot analysis is carried test sequence are a factor of nearly three smaller than those under
out separately using uncalibrated data and using 1) normalized test sequences 1 and 3. Another notable feature is that one of the
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
Maximum Residuals
Maximum Residuals
25 35
20 30
25
15 20
10 15
10
5 AW 5 AW
AA AA
0 AS 0 AS
DC DC
NC NC
Control PMs Trojan PMs Control PMs Trojan PMs
Maximum Residuals
Maximum Residuals
60 40
50 35
40 30
25
30 20
20 15
AW 10
10 5 AW
AA AA
0 AS 0 AS
DC DC
NC NC
Control PMs Trojan PMs Control PMs Trojan PMs
Figure 8. Maximum residuals for Trojan 1, path 2, Figure 9. Maximum residuals for Trojan1, path2,
calibrated to t22t, un-normalized (top), normalized calibrated to IDENTITY, un-normalized (top), normalized
(bottom). (bottom).
8
7
Maximum Residuals
6
5
4
3
2
1
AW
0 AA
AS
DC
Control PMs Trojan PMs Control PMs Trojan PMs Control PMs Trojan PMs NC
1st test sequence 2nd test sequence 3rd test sequence
Figure 10. Maximum residuals for Trojan2, all paths, normalized and calibrated to t22t.
Trojan-free control PMs produces outliers with a maximum resid- new AC methods proposed in this paper outperform previously
ual of approximately two standard deviations. This indicates the described DC methods and the simplest form of AC signal cali-
importance of accurately characterizing the Trojan-free process bration, namely AC sampling, is equivalent in power to more
space. The conclusions drawn for Trojan 2(a) concerning the sig- complex schemes. For AC sampling, the important components of
nal calibration techniques hold true here as well. In particular, the the impedance variations in the chip and test environment are cap-
method applied without signal calibration for this Trojan produces tured in a single waveform sample under the condition that the
no outliers under any of the three test sequences. sample is collected close in time (couple of ns) to the delivery of
7 Conclusions the calibration stimulus.
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.
[2] http://www.darpa.mil/mto/solicitations/baa07-24/index.html Oriented Security and Trust, 2008, pp. 51-57.
[3] R. Rad, J. Plusquellic, M. Tehranipoor, “Sensitivity Analysis [10] D. Acharyya and J. Plusquellic, “Hardware Results Demon-
to Hardware Trojans using Power Supply Transient Sig- strating Defect Detection Using Power Supply Signal Mea-
nals”, International Workshop on Hardware-Oriented Secu- surements”, VLSI Test Symposium, 2005, pp. 433-438.
rity and Trust, 2008, pp. 3-7. [11] J. Plusquellic, D. Acharyya, A. Singh, M. Tehranipoor and C.
[4] D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, B. Sunar, Patel, “Quiescent Signal Analysis: a Multiple Supply Pad
“Trojan Detection using IC Fingerprinting”, Symposium on IDDQ Method,” IEEE Design and Test of Computers, vol.
Security and Privacy, 2007, pp. 296 - 310. 23, no. 4, pp. 278-293, 2006.
[5] F. Wolff, C. Papachristou, S. Bhunia, and R. Chakraborty, [12] X. Wang, M. Tehranipoor and J. Plusquellic, “Detecting Ma-
“Towards Trojan-Free Trusted ICs: Problem Analysis and licious Inclusions in Secure Hardware: Challenges and So-
Detection Scheme”, Design, Automation and Test in Eu- lutions”, International Workshop on Hardware-Oriented
rope, 2008, pp. 1362-1365. Security and Trust, 2008, pp. 15-19.
[6] Jie Li and John Lach, “At-Speed Delay Characterization for IC [13] http://www.fm.vslib.cz/~kes/asic/iscas/
Authentication and Trojan Horse Detection”, International [14] http://www.mosis.com/Technical/Testdata/tsmc-018-
Workshop on Hardware-Oriented Security and Trust, 2008, prm.html
pp. 8-14. [15]D. Acharyya and J. Plusquellic, “Impedance Profile of Com-
mercial Power Grid and Test System”, International Test Con-
[7] M. Banga and M. S. Hsiao, “A Region Based Approach for the ference, 2003, pp. 709-718.
Identification of Hardware Trojans”, International Work- [16] A. Singh, C. Patel and J. Plusquellic, “Fault Simulation Mod-
shop on Hardware-Oriented Security and Trust, 2008, pp. el for iDDT Testing: An Investigation”, VLSI Test Sympo-
40-47. sium, 2004, pp. 304-310.
[8] R. S. Chakraborty, S. Paul and S. Bhunia, “On-Demand Trans- [17] M. Sachdev, P. Janssen, V. Zieren, “Defect Detection with
parency for Improving Hardware Trojan Detectability”, In- Transient Current Testing and its Potential for Deep Sub-
ternational Workshop on Hardware-Oriented Security and micron CMOS ICs", International Test Conference, 1998,
Trust, 2008, pp. 48-50. pp. 204-213.
[9] Y. Jin and Y. Makris, “Hardware Trojan Detection Using Path
Delay Fingerprints”, International Workshop on Hardware-
Authorized licensed use limited to: CADENCE DESIGN SYSTEMS. Downloaded on December 03,2024 at 13:19:25 UTC from IEEE Xplore. Restrictions apply.