{"title":"Detection Of Hardware Trojan In Memristive Ternary CAM Circuits","authors":"Subhashree Basu, Malay Kule","doi":"10.1109/ISDCS49393.2020.9262978","DOIUrl":null,"url":null,"abstract":"The continuous increase in the cost of chip fabrication compelled many organizations to out source the chip fabrication process to third-party companies. But this can be a serious threat to the reliability and the infalliability of the chip because malicious modifications can be made at any stage of the fabrication process. Changing the functionality of ICs or adding new hidden features to them is known as hardware Trojan. Hardware Trojan is very elusive to identification and as a result, the identification process becomes very tiresome and sometimes futile. Detecting multiple Trojans implanted into ICs becomes a colossal task and may impart the device useless. In this paper, we have incorporated different types of Trojans in memristor based NOR type Trenary CAM circuit and then the circuits are analyzed as to show how the circuits behave in presence of the Trojans. Then applying side-channel analysis different parameters are calculated and analyzed to identify the presence of the Trojan.","PeriodicalId":177307,"journal":{"name":"2020 International Symposium on Devices, Circuits and Systems (ISDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Symposium on Devices, Circuits and Systems (ISDCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDCS49393.2020.9262978","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The continuous increase in the cost of chip fabrication compelled many organizations to out source the chip fabrication process to third-party companies. But this can be a serious threat to the reliability and the infalliability of the chip because malicious modifications can be made at any stage of the fabrication process. Changing the functionality of ICs or adding new hidden features to them is known as hardware Trojan. Hardware Trojan is very elusive to identification and as a result, the identification process becomes very tiresome and sometimes futile. Detecting multiple Trojans implanted into ICs becomes a colossal task and may impart the device useless. In this paper, we have incorporated different types of Trojans in memristor based NOR type Trenary CAM circuit and then the circuits are analyzed as to show how the circuits behave in presence of the Trojans. Then applying side-channel analysis different parameters are calculated and analyzed to identify the presence of the Trojan.