Robust Trojans are inserted in outsourced products resulting in security vulnerabilities. Post-silicon testing is done mandatorily to detect such malicious inclusions. Logic testing becomes obsolete for larger circuits with sequential Trojans. For such cases, side channel analysis is an effective approach. The major challenge with the side channel analysis is reduction in hardware Trojan detection sensitivity due to process variation (process variation could lead to false positives and false negatives and it is unavoidable during a manufacturing stage). In this paper Self Referencing method is proposed that measures leakage power of the circuit at four different time windows that hammers the Trojan into triggering and also help to identify/eliminate false positives/false negatives due to process variation.
S. R. Priya, Swetha, P., Srigayathri, D., Sumedha, N., and Priyatharishini M., “Hardware Malicious Circuit Identification using Self Referencing Approach”, in 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), 2017.