TrojanZero: Switching Activity-Aware Design of Undetectable Hardware Trojans with Zero Power and Area Footprint

Imran Hafeez Abbassi1,a, Faiq Khalid2,c, Semeen Rehman2,d, Awais Mehmood Kamboh1,b, Axel Jantsch2,e, Siddharth Garg3 and Muhammad Shafique2,f
1School of Electrical Engineering and Computer Science, National University of Sciences and Technology, Islamabad, Pakistan
aimran.abbasi@seecs.edu.pk
bawais.kamboh@seecs.edu.pk
2Vienna University of Technology, Vienna, Austria
cfaiq.khalid@tuwien.ac.at
dsemeen.rehman@tuwien.ac.at
eaxel.jantsch@tuwien.ac.at
fmuhammad.shafique@tuwien.ac.at
3New York University, New York City, U.S.
sg175@nyu.edu

ABSTRACT


Conventional Hardware Trojan (HT) detection techniques are based on the validation of integrated circuits to determine changes in their functionality, and on non-invasive side-channel analysis to identify the variations in their physical parameters. In particular, almost all the proposed side-channel power-based detection techniques presume that HTs are detectable because they only add gates to the original circuit with a noticeable increase in power consumption. This paper demonstrates how undetectable HTs can be realized with zero impact on the power and area footprint of the original circuit. Towards this, we propose a novel concept of TrojanZero and a systematic methodology for designing undetectable HTs in the circuits, which conceals their existence by gatelevel modifications. The crux is to salvage the cost of the HT from the original circuit without being detected using standard testing techniques. Our methodology leverages the knowledge of transition probabilities of the circuit nodes to identify and safely remove expendable gates, and embeds malicious circuitry at the appropriate locations with zero power and area overheads when compared to the original circuit. We synthesize these designs and then embed in multiple ISCAS85 benchmarks using a 65nm technology library, and perform a comprehensive power and area characterization. Our experimental results demonstrate that the proposed TrojanZero designs are undetectable by the state-of-the-art power-based detection methods.

Keywords: Hardware Trojans, Power Analysis, Area, Signal Probability, ATPG.



Full Text (PDF)