Publication Type:

Conference Paper


2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS) (2017)



Cryptography, Delays, Hardware, hardware malicious circuit identification, hardware Trojan detection sensitivity, invasive software, Leakage power, logic testing, malicious inclusions, outsourced products, Payloads, post-silicon testing, Power measurement, Robust Trojans, security vulnerabilities, self referencing approach, Sequential trojan, sequential Trojans, Side Channel Analysis, Temporal Self Referencing, Test vector generation, Testing, Trojan horses


Robust Trojans are inserted in outsourced products resulting in security vulnerabilities. Post-silicon testing is done mandatorily to detect such malicious inclusions. Logic testing becomes obsolete for larger circuits with sequential Trojans. For such cases, side channel analysis is an effective approach. The major challenge with the side channel analysis is reduction in hardware Trojan detection sensitivity due to process variation (process variation could lead to false positives and false negatives and it is unavoidable during a manufacturing stage). In this paper Self Referencing method is proposed that measures leakage power of the circuit at four different time windows that hammers the Trojan into triggering and also help to identify/eliminate false positives/false negatives due to process variation.

Cite this Research Publication

S. R. Priya, Swetha, P., Srigayathri, D., Sumedha, N., and Priyatharishini M., “Hardware Malicious Circuit Identification using Self Referencing Approach”, in 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017.