Professional Documents
Culture Documents
fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
1
AbstractDue to design and fabrication outsourcing to being Trojan-infected. While these approaches are effective,
foundries, the problem of malicious modications to integrated obtaining such golden models/data is mostly an open problem.
circuits, also known as hardware Trojans, has attracted attention
Motivation. Prior works such as [6] suggest that reverse-
in academia as well as industry. To reduce the risks associated
with Trojans, researchers have proposed different approaches engineering (RE) be used to identify Trojan-free ICs and
to detect them. Among these approaches, test-time detection verify the data used for the golden models. To the best of
approaches have drawn the greatest attention. Many test-time our knowledge, our previous work [1] was the rst one that
approaches assume the existence of a Trojan-free chip/model proposed a method to verify a golden chip using reverse-
also known as golden model. Prior works suggest using reverse-
engineering efciently and accurately. However, [1] is based
engineering to identify such Trojan-free ICs for the golden model.
However, they did not state how to do this efciently. In fact, on a parametric classication approach, which means that its
reverse-engineering is a very costly process which consumes performance is highly dependent on the choice of some design
lots of time and intensive manual effort. It is also very error parameters. This can make it very hard to be trained and tuned.
prone. In this paper, we propose an innovative and robust Contributions. In this paper, we propose another efcient
reverse-engineering scheme to identify the Trojan-free ICs. We
reformulate the Trojan-detection problem as clustering problem. method for verifying a golden chip. Compared with [1], this
We then adapt a widely-used machine learning method, K-Means paper has lots of new contributions:
clustering, to solve our problem. Simulation results using state- In addition to the Support Vector Machine based ap-
of-the-art tools on several publicly available circuits show that
the proposed approach can detect hardware Trojans with high
proach, we develop a K-Means clustering approach to
accuracy rate. A comparison of this approach with our previously automatically learn how to distinguish between expected
proposed approach [1] is also conducted. Both the limitations and and suspicious structures in the ICs. Neither of the two
application scenarios of the two methods are discussed in detail. methods relies on a Trojan-free (golden) IC, which is the
underlying assumption of many other approaches.
Index TermsHardware Trojan detection, reverse-engineering Simulation results on 6 benchmarks show that the per-
based hardware Trojan detection, integrated circuit (IC) security formance of K-Means clustering approach, unlike SVM,
and trust, one-class SVM, K-Means clustering does not depend on the choice of parameters. Thus it is
easier than SVM to be trained and tuned.
I. I NTRODUCTION We also conduct experiments to compare the two ap-
proaches thoroughly in many aspects. We discuss their
More and more integrated circuit (IC) designers are out- advantages, limitations and application scenarios in detail.
sourcing fabrication to foundries and incorporating third-
party intellectual property (IP) cores into their designs. This The rest of the paper is organized as follows: Section II
practice leads to security problems. For example, malicious gives a brief review of reverse-engineering, hardware Trojans
modications to ICs, also known as hardware Trojans (HTs), and detection. Section III denes the problem we want to solve
have been reported. HTs can change IC functionality, reduce and discusses the motivation behind it. Section IV gives a
IC reliability, leak valuable information from the IC, and even quick recap on our previously proposed SVM based approach.
cause denial of service [2]. To reduce the risks associated K-Means clustering approach is elaborated in Section V. In
with Trojans, researchers have proposed different approaches Section VI, experimental results are discussed. A thorough
to detect them. Test-time detection approaches [3][5] have comparison of two methods is conducted. A comparison of
drawn the greatest amount of attention from researchers. In our approaches with some other existing approaches is shown
these approaches, functional and/or side-channel behavior of in Section VII. Finally, Section VIII concludes the paper.
suspect ICs are compared to a golden model that represents
the expected behavior of a Trojan-free IC. If the suspect IC
II. BACKGROUND
deviates sufciently from the golden model, it is classied as
A. Reverse Engineering
This work was supported by the National Science Foundation under Grant
1223233. Reverse-engineering of an IC is the process of analyzing an
D. Forte is with the Department of Electrical and Computer En-
gineering, University of Florida, Gainesville, FL, 32611 USA (e-mail: ICs internal structures, connections, etc. in order to determine
dforte@ece.u.edu). how it was designed and how it operates. A typical RE ow
C. Bao and A. Srivastava are with the Department of Electrical and includes the following steps [7].
Computer Engineering, University of Maryland, College Park, MD, 20742
USA (e-mail: {borisbcx,ankurs}@umd.edu. 1) Decapsulation: The die is removed from its package.
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
2
2) Delayering: Each layer of the die is stripped off one with. They suggest reverse-engineering be used to obtain such
at a time using chemical methods while polishing the a golden chip [6]. Reverse-engineering based approaches apply
surface to keep it planar. the reverse-engineering (RE) process (discussed above) to ICs
3) Imaging: Thousands of high-resolution images of each in order to detect HTs. Basically, the design/netlist uncovered
exposed layer are taken using scanning electron micro- by RE is compared to an intended (golden) netlist. Since these
scope (SEM). The images are stitched together to form approaches are not only time-consuming, but destructive, they
a complete view of the layer using special software. have been pursued the least for HT detection. Their main use
Multiple layers are also aligned at this step so that of RE has been to verify the Trojan-free chips used in the
contacts and vias are lined up with layers above and golden model development [6].
below them. Since all of the above have their own advantages and
4) Annotation: All structures in the device (interconnects, disadvantages, one proposed direction is to apply each for
vias, transistors, etc.) are annotated either manually or the highest HT coverage. For example, post-silicon, RE-based
by using image recognition software [7]. approaches can verify golden chips required for test-time
5) Schematic creation, organization, and analysis: A hier- and run-time golden models. Functional and side-channel ap-
archical or at netlist is generated using the annotated proaches can be used to detect small and large Trojans respec-
images as well as public information (e.g. datasheets). tively inserted during fabrication. Design-time approaches can
All of the above steps are time-consuming and error-prone. be induced to improve the Trojan coverage and observability.
The rst 3 steps essentially extract images of the structures Run-time approaches can act as a last line of defense.
contained in the IC. Removing and polishing layers affect the
structures in the exposed and lower layers, resulting in addi- III. P ROBLEM S TATEMENT AND M OTIVATION
tional noise in their IC structures. The last 2 steps are required Problem Statement. Assume we are given ICs from one or
for circuit/design extraction and are also quite challenging. The more untrusted foundries. We want to determine which ICs
annotation process and the schematic creation/analysis often are Trojan-free (TF) and which have Trojans inserted (TI).
requires input from experienced analysts [7]. We consider that there are three-types of TI cases possible:
Trojan Addition (TA) : These HTs add transistors, gates,
B. Hardware Trojans and Detection and interconnects into the original layout.
Hardware Trojans (HTs) are malicious modications to the Trojan Deletion (TD) : These HTs delete transistors, gates,
circuitry of an IC. They can be made at any untrusted or and interconnects from the original layout.
outsourced phase of the ICs production (design, synthesis, Trojan Parametric (TP) : These HTs perform physical
fabrication, and distribution) [8]. HTs can leak secret infor- changes to the transistors, gates, and interconnects of the
mation, disable the IC, or even destroy the IC [9] making original layout as suggested in [14].
them very dangerous. Examples of TF, TA, TD, and TP are shown in Figure 1. Note
Researchers in academia as well as industry have proposed that the above problem can be viewed as an instance of the
different approaches to detect HTs. These methods fall into classication problem which is given as follows. Assume we
the following four categories. have 2 classes of objects denoted by C0 and C1 . Let each
Design-time approaches have two types: formal verica- object be represented by a feature vector x = (x1 , . . . , xn )
tion and design-for-security (DFS). Formal verication [10] where xi denotes the ith feature, xi R, and n denotes the
requires that the design house prove certain security properties # of features. Given an unknown object A, the problem is to
hold in the design. DFS approaches (e.g., [11]) are aimed at determine the correct class of A. In our case, objects are chips
increasing the controllability and observability of ICs in order under test and TF represents class C0 while the TI cases (TA,
to aid test-time detection approaches. Test-time approaches TD and TP) represent class C1 . We further assume that a batch
consist of tests in addition to normal IC post-manufacturing of ICs manufactured by the same foundry will be either all
tests and are the most widely studied approaches in the Trojan-free or all Trojan-infected. The reason is that making
literature. There are two types: functional testing and side- two masks of the design, one Trojan-free and one Trojan-
channel ngerprinting [5]. Functional testing approaches [3], infected, will be very costly for the foundry. Therefore, by
[4] aim to detect HTs that change the functionality (primary classifying one chip within the batch, we can tell whether this
outputs) of the IC from the intended one. Side-channel n- batch of ICs is Trojan-free or not.
gerprinting [12], [13] is an alternative approach that measures Motivation. Prior works [6] suggest reverse-engineering (RE)-
side channel signals (timing, power, EM, etc.) and uses them to based methods be used to identify Trojan-free ICs in order to
distinguish genuine ICs from Trojan-infested ones. Run-time develop the golden models for other HT detection approaches.
approaches add circuitry that monitors the behavior/state of a However, there has not been any work devoted towards per-
chip after it has been deployed. If deviation from the expected forming this classication. One can only assume that papers
golden behavior is detected, additional circuitry can disable the in the literature would assume a golden netlist and naively
chip or bypass the malicious logic before the HT can do any apply all 5 RE steps (see Section II-A) to extract netlists from
damage. Most test-time and run-time approaches assume that all unknown chips. Only data from those chips with netlists
a Trojan-free chip also known as a golden chip (a chip with that match the golden netlist would be included in the golden
intended functionality and behavior) is available to compare model.
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
3
Pixels
480
640
800
160 320 480 640 800
Pixels
(a) Trojan Free Case (TF) (b) Trojan Addition Case (TA) Fig. 3: Griding techniques. Part Fig. 4: Golden layout and SEM image of real
of metal1 layer of s298 bench- layout within one grid. Solid rectangle and
mark with grid size 160160 curve denote Z and Y respectively while
pixels is shown. rectangles in dashed line are Zin and Zout .
is dened in Section III using one-class SVM approach. We
give a quick recap of the approach here but direct interested
readers to [1] for a more detailed explanation.
(c) Trojan Deletion Case (TD) (d) Trojan Parametric Case (TP) Support Vector Machine (SVM) is a popular classication
approach which tries to classify some objects based on some
Fig. 1: Example of three kinds of trojans. SEM image of metal1 layer is shown.
features extracted from them. SVM is rst trained on training
samples to obtain a classier and then uses this classier to
We feel that there are some issues with this naive approach. classify a given object. One-class SVM is used when training
First, some Trojans (e.g., parametric Trojans) can actually be samples from one class is available. This is exactly the case
missed by only comparing netlists. Second, the effort required for our application. The designer can obtain the training chips
by this naive approach is excessive. As [7] pointed out, RE by sampling from the manufactured chips. However, he does
steps 4-5 are time-consuming and require manual input for not know whether they are Trojan-free or Trojan-infected. He
annotation and schematic read-back. Furthermore, [15] states can only assume that they are Trojan-free and let the classier
that reverse-engineering at advanced technology nodes such as detect those outliers (those chips that violate our Trojan-free
22nm is not feasible without access to the gate-level netlist. assumptions).
This means that extracting the gate-level netlists from the The overall approach is summarized in the block diagram
layout images (RE steps 4-5) will be infeasible in technologies shown in Figure 2. We take as input the golden layout, N
beyond 22nm. chips to classify, and parameter values for grid size, noise
In this paper, our goal is to develop a more efcient and margin dnm , etc. The N chips undergo only rst 3 RE steps,
robust RE approach for solving the above classication prob- which result in images of each layer for all N chips. The next
lem. In our approach, we avoid extracting netlists altogether. step is to divide the images for each layer of all N chips into
Instead, we develop a one-class SVM-based approach that non-overlapping grids. Breaking the images into smaller grids
makes a classication decision based on features extracted allows us to parallelize or distribute the processing for each
from the IC images. The key features of our approach are grid. Then, features are extracted for all N chips for each grid
ability to detect all the above Trojan cases in an efcient and in each layer. We train the classier and obtain a decision
automated fashion. Details of our approach are discussed in boundary for each layer using a subset of the chips (possibly
the following sections. even just one chip). After training, we classify the grids in the
each layer of all the N chips as Trojan-free (TF) or Trojan-
IV. T HE SVM A PPROACH inserted (TI) based on the -SVM decision boundaries of each
layer. Finally, we determine a label for each chip based on
A. General Ideas these grid classications.
Assumptions. As discussed above, we wish to solve the We elaborate on two things: feature extraction and the nal
following classication problem: Given N ICs, classify each classication of the chip based on the label of each grid.
as Trojan-free (TF) or Trojan-inserted (TI). To perform the
classication, we assume the following. We assume that the
original design is Trojan-free and Trojans have only been B. Feature Selection
inserted during fabrication. Formal verication and trusted (in- As discussed above, we break the images (layouts) into
house) design are two approaches that guarantee this. We also smaller non-overlapping grids as shown in Figure 3. Features
assume that we have the original physical layout (referred to are extracted from each grid by comparing the corresponding
as the golden layout) for all the layers of the IC. Since the grids of the IC under test (ICUT) with the golden layout grids
designer would ultimately come up with this layout and send (which we know from design).
it to the foundry, it is reasonable to assume we have this. We illustrate many of our features with the help of Figure 4.
Classication via SVM. Our approach utilizes the rst 3 steps The RE image and golden layout of one grid are shown. Let Y
of reverse-engineeringto obtain internal images of each layer denote the structures in the layout image obtained by reverse-
(poly, metal1, etc.) for the ICs. Then we classify the ICs using engineering, which is the curly shape in the gure. Let Z
these images and support vector machines (see below). The denote the structures in the golden layout, which is the solid
key of our approach is to solve a classication problem which rectangle in the middle. Let Zin be Z scaled by a margin dnm .
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
4
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
5
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
6
TABLE I: Benchmarks used and classication accuracy rate averaged over 500
and the amount of deletion. Since features dened by Eqn (1) trials using SVM.
and (3) in Section IV-B give exactly what we want, we will Benchmark #gates Source TF TA TD TP
use these two features as our K-Means clustering features. We s27 57 ISCAS89 100% 100% 100% 99.8%
exclude other features described in Section IV-B from our K- s298 283 ISCAS89 100% 100% 100% 99.6%
s280 3455 ISCAS89 100 % 100% 100% 100%
Means clustering features because they are irrelevant. s15850 10984 ISCAS89 100% 100% 100% 99.8%
Initial centroids selection. Let x = (f1 , f3 ) be the feature s38417 30347 ISCAS89 100% 100% 100% 100%
b18 122559 ITC99 99.4% 100% 100% 100%
vector where f1 and f3 are dened by Eqn (1) and (3)
respectively. As discussed in Section IV-B, when there is no
malicious deletion, f1 should be as close to 1 as possible.
1 as possible. Thus our initial choice of the centroid of the
cluster that represents the Trojan-free case is (1,1). If there is
some malicious deletion, f1 would deviate signicantly from
1. We choose (0.5, 1) as the initial centroid of the cluster that
represents the malicious deletion case. Similarly, we choose (a) Golden layout (b) Real layout
(1,0.5) as the initial centroid of the cluster that represents the
malicious addition case. Fig. 7: Simulation of process variations in reverse-engineering process
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
7
TABLE II: Chip classication accuracy rate averaged over 500 trials using K-Means TABLE III: Chip classication accuracy percentage averaged over 500 trials using
clustering based approach SVM and K-Means clustering based approach under different noise levels
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
8
TABLE IV: Chip classication accuracy rate averaged over 500 trials using SVM
and K-Means clustering based approach with one training chip more information, like what kind of malicious modications
TF TA TD TP
are made, about a chip besides the only fact that it is Trojan-
Noise Level K S K S K S K S infected or when there it is very hard to tune the parameters
Small 84.8 88.2 95.4 100 100 100 96.4 99.2
Medium 36.2 61.4 81.8 100 100 100 88.2 98.2
of SVM, we should use K-Means clustering based approach.
Large 0 66.4 100 100 98.2 39.4 100 100 When it is very hard for us to estimate the exact value
of noise margins (when the noise is large), we should use
TABLE V: A comparison between SVM and K-Means clustering approach SVM approach. In all other cases where both approaches are
SVM K-Means applicable, we should use SVM as often as possible since it
Performance depends on parameter? Heavily No
Number of training samples needed Small Many
shows a better performance in general.
Generalization ability Good Not as good as SVM
Training speed Fast Comparable
Sensitive to noise No Yes VII. C OMPARISON W ITH OTHER A PPROACHES
Allow ne-grained classication? No Yes
In this section, we go over some of the existing detection
approaches in the literature and argue why our approach is
favored over others.
Trojan-free chip as the training chip to train SVM/K-Means
Functional testing based approaches may fail to work when:
clustering machine. We will then generate 500 TF chips,
a Trojan is not triggered during testing; the effect of the
500 TA chips, 500 TD chips and 500 TF chips and test the
Trojan is not observable from primary outputs. The side-
classication accuracy rate over these test chips. We also vary
channel analysis approaches suffer from process variations and
the amount of noise in the reverse-engineering process.
perform poorly on the detection of small Trojans. Reverse-
Note that one issue when training K-Means clustering
engineering based approaches, on the other hand, are arguably
machine using one Trojan-free chip is that all data points will
among the strongest detection approaches. Our approach can
converge to only one cluster which represents the Trojan-free
detect Trojans that are hard to be detected by other approaches.
case. We cannot get the centroids of the other two groups. This
For example, attacks on the global interconnect such as wire
means we can and only can learn how much variation will be
sizing are very hard to be captured by side-channel analysis.
made by the reverse-engineering process. One way to get out
However, it is guaranteed that our approach will detect it.
of this dilemma is to introduce a threshold number which
The performance of functional testing strongly depends on
represents the amount of deviations acceptable. We use this
the coverage of automatic test pattern generation (ATPG). If
threshold together with the rst cluster center to generate the
the Trojan trigger is not covered by ATPG, then the Trojan will
cluster center of the other two clusters. For example, we get
most likely remain undetected. Even with advanced techniques
a cluster center (0.98, 0.97) during training. We consider =
such as [4], the coverage for the Trojan is only 68.35% for
50% amount of noise to be reasonable. We can generate the
benchmark s15850 for 4 trigger nodes, while our approaches
second cluster center as (0.98 (1 ), 0.97) = (0.49, 0.97)
can achieve over 98.4% detection accuracy.
and the third cluster center as (0.98, 0.97 (1 )) =
Some side-channel analysis based approaches try to enhance
(0.98, 0.485). After obtaining these cluster centers, we can
the signal to noise ratio during detection, and can achieve
proceed using the modied K-Means clustering approach as
100% accuracy on s15850 [18]. However, they require the
described in Section VI-D1.
existence of a golden chip which is very hard to verify or
Throughout this experiment, we set = 50%. The results
obtain. Other side-channel analysis approaches try to eliminate
are listed in Table IV. Compared with III, we see that the
the golden chip assumption by using self-referencing, but due
availability of golden chips help improve the accuracy rate of
to process variations, the performance is not very good (85%
K-Means clustering approach a lot while it does not help the
for s15850 in [19]). On the contrary, our approaches eliminate
SVM approach. This is because the availability of a golden
the golden chip assumption and perform very well. They can
chip will help K-Means clustering approach gure out the
be used to verify that a chip is golden for other approaches.
center of the Trojan-Free cluster accurately. This will improve
Recently a novel side-channel analysis approach based on
the overall classication accuracy. On the other hand, one-
gate-level characterization (GLC) has been proposed [20].
class SVM does not have a way to employ the fact that the
GLC is the process of characterizing each gate of an integrated
training chip is golden thus its performance does not improve.
circuit (IC) in terms of its physical properties. It eliminates
the need for a golden chip and achieves very high accuracy.
E. Final Discussion However, their work cannot detect attacks on the global
interconnect while ours can.
We now give a thorough comparison of two approaches in
Table V. We can conclude that when SVM usually performs
better than K-Means clustering approach. This is expected VIII. C ONCLUSION
because SVM is a more sophisticated approach. However, In this paper, we applied K-means clustering to RE based
SVM needs several parameters to be tuned and can be hard Trojan detection approach. It is efcient in storage space, do
to train. K-Means clustering approach, on the other hand, is not require the existence of a golden chip and is robust to
a less complexed model and easy to train. Besides, it gives variations in fabrication and RE process. The experimental
extra information about Trojan-infected grids. However, it is results on several publicly available benchmarks show that
more sensitive to noise. Therefore, when we need to know very high Trojan detection accuracy can be achieved. A
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
10.1109/TCAD.2015.2488495, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
9
thorough comparison of the proposed approach and [1] is Chongxi Bao Chongxi Bao (S14) received his B.S.
conducted and suggested application scenarios are provided. degree in Mechanical Engineering from Tsinghua
University, Beijing, China in 2008. He is currently
pursuing his Ph.D. degree in the ECE department at
R EFERENCES University of Maryland, College Park.
His current research interests include trusted hard-
[1] C. Bao, D. Forte, and A. Srivastava, On application of one-class ware design, IC anti-counterfeiting, and security
SVM to reverse engineering-based hardware trojan detection, in Quality issues in 3D Integrated Circuits.
Electronic Design (ISQED), 2014 15th International Symposium on.
IEEE, 2014, pp. 4754.
[2] R. Karri, J. Rajendran, and K. Rosenfeld, Trojan taxonomy, in Intro-
duction to Hardware Security and Trust, M. Tehranipoor and C. Wang,
Eds. Springer New York, 2012, pp. 325338.
[3] Xuehui Zhang and M. Tehranipoor, Case study: Detecting hardware
trojans in third-party digital IP cores, May, pp. 6770.
[4] R. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia,
MERO: a statistical approach for hardware trojan detection, in Cryp-
tographic Hardware and Embedded Systems - CHES 2009, ser. Lecture
Notes in Computer Science, C. Clavier and K. Gaj, Eds. Springer
Berlin Heidelberg, 2009, vol. 5747, pp. 396410.
[5] Y. Jin and Y. Makris, Hardware trojans in wireless cryptographic
integrated circuits, Design & Test, IEEE, vol. PP, no. 99, pp. 11,
2013. Domenic Forte Domenic Forte (S09M13) re-
[6] S. Narasimhan and S. Bhunia, Hardware trojan detection, in Introduc- ceived the B.S. degree in Electrical Engineering
tion to Hardware Security and Trust. Springer, 2012, pp. 339364. from Manhattan College, Riverdale, NY, USA, in
[7] R. Torrance and D. James, The state-of-the-art in semiconductor reverse 2006, and the M.S. and Ph.D. degrees in Electri-
engineering, in Proceedings of the 48th Design Automation Conference. cal Engineering from the University of Maryland,
ACM, 2011, pp. 333338. College Park, MD, USA, in 2010 and 2013, respec-
[8] A. Baumgarten, M. Steffen, M. Clausman, and J. Zambreno, A case tively.
study in hardware trojan design and implementation, International From 2013 to 2015, he was an Assistant Professor
Journal of Information Security, vol. 10, no. 1, pp. 114, 2011. of the Department of Electrical and Computer Engi-
[9] M. Tehranipoor and F. Koushanfar, A survey of hardware trojan neering, University of Connecticut in Storrs, CT. He
taxonomy and detection, Design & Test of Computers, IEEE, vol. 27, is currently an Assistant Professor with the Electrical
no. 1, pp. 1025, 2010. and Computer Engineering Department, University of Florida, Gainesville,
[10] Y. Jin and Y. Makris, Proof carrying-based information ow tracking FL, USA, where he has been since July 2015. His research is primarily focused
for data secrecy protection and hardware trust, in VLSI Test Symposium on the domain of hardware security and includes investigation of hardware
(VTS), 2012 IEEE 30th. IEEE, 2012, pp. 252257. security primitives, hardware Trojan detection and prevention, security of the
[11] H. Salmani, M. Tehranipoor, and J. Plusquellic, A novel technique electronics supply chain, and anti-reverse engineering. He has served on the
for improving hardware trojan detection and reducing trojan activation program committees of several workshops and conferences in addition to
time, Very Large Scale Integration (VLSI) Systems, IEEE Transactions serving as session chair in many technical events.
on, vol. 20, no. 1, pp. 112125, Jan. 2012. Dr. Forte was a recipient of the Northrop Grumman Fellowship and the
[12] S. Narasimhan, X. Wang, D. Du, R. Chakraborty, and S. Bhunia, George Corcoran Memorial Outstanding Teaching Award by the Electrical and
TeSR: a robust temporal self-referencing approach for hardware trojan Computer Engineering Department at University of Maryland. His work has
detection, in Hardware-Oriented Security and Trust (HOST), 2011 been recognized through several best paper awards and nominations, including
IEEE International Symposium on, Jun. 2011, pp. 71 74. Adaptive Hardware Systems (AHS) 2011 and Design Automation Conference
[13] S. Narasimhan, Dongdong Du, R. Chakraborty, S. Paul, F. Wolff, (DAC) 2012.
C. Papachristou, K. Roy, and S. Bhunia, Multiple-parameter side-
channel analysis: A non-invasive hardware trojan detection approach,
pp. 1318.
[14] Y. Shiyanovskii, F. Wolff, A. Rajendran, C. Papachristou, D. Weyer, and
W. Clay, Process reliability based trojans through nbti and hci effects,
in Adaptive Hardware and Systems (AHS), 2010 NASA/ESA Conference
on. IEEE, 2010, pp. 215222.
[15] S. M. Plaza and I. L. Markov, Solving the third-shift problem in ic
piracy with test-aware logic locking, 2015.
[16] D. Fradkin and I. Muchnik, A study of k-means clustering for im-
proving classication accuracy of multi-class SVM, Technical Report.
Rutgers University, New Brunswick, New Jersey 08854, Tech. Rep.,
2004.
[17] A. Chandrasekhar and K. Raghuveer, Intrusion detection technique Ankur Srivastava Ankur Srivastava (S00M02)
by using k-means, fuzzy neural network and SVM classiers, in received his B.Tech in Electrical Engineering from
Computer Communication and Informatics (ICCCI), 2013 International Indian Institute of Technology Delhi in 1998, M.S.
Conference on. IEEE, 2013, pp. 17. in ECE from Northwestern University in 2000 and
[18] M. Banga and M. S. Hsiao, A novel sustained vector technique for the Ph.D. in Computer Science from UCLA in 2002. He
detection of hardware trojans, in VLSI Design, 2009 22nd International is currently a Full Professor in the ECE department
Conference on. IEEE, 2009, pp. 327332. with joint appointment with the Institute for Systems
[19] M. Li, A. Davoodi, and M. Tehranipoor, A sensor-assisted self- Research at University of Maryland, College Park.
authentication framework for hardware trojan detection, in Proceedings He is the associate editor of IEEE Transactions
of the Conference on Design, Automation and Test in Europe. EDA on VLSI and INTEGRATION: VLSI Journal.
Consortium, 2012, pp. 13311336.
[20] S. Wei and M. Potkonjak, Scalable hardware trojan diagnosis, Very
Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 20,
no. 6, pp. 10491057, 2012.
0278-0070 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.