9
A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC Detection Luong N. Nguyen a , Baki Berkay Yilmaz a , Chia-Lin Cheng a , Milos Prvulovic b , and Alenka Zaji´ c a a School of Electrical and Computer Engineering b College of Computing 1 Georgia Institute of Technology, Atlanta, GA, USA ABSTRACT Over the past few years, globalization of the semiconductor supply chain has led companies to outsource many steps of their integrated circuit (IC) production cycle. While outsourcing helps companies tremendously reduce cost and time-to-market, it arises questions on the trust level of IC, and introduces several security vulnerabilities. One of the most serious problems is the counterfeiting of ICs because it does not only negatively impact innovation and economic growth of IC industry, but also imposes serious threat and risk on systems that incorporate these counterfeit ICs. This paper proposes a novel clustering method to detect counterfeit ICs using backscattering side- channel. Backscattering side-channel is a recently introduced side-channel that has been proved to outperform other side-channels in detecting hardware changes in digital circuit. Our algorithm utilizes the backscattering side-channel to cluster counterfeit ICs from normal ICs. We test our technique on a set of ten boards over six different counterfeit IC designs. The results show that our technique can tolerate manufacturing variations among different hardware instances to report all counterfeit IC measurements with 100% accuracy and 0% false positives. Keywords: Counterfeit IC, Hardware Security, Reliability, Cloned IC, Backscattering, Clustering 1. INTRODUCTION A counterfeit IC is an illicit copy of a legitimate chip with discrepancy on the performance, characteristics or material, but sold or used as an authorized one. 1 Counterfeiting of ICs has become a major challenge to the semiconductor industry because of deficiencies in the existing test techniques and lack of effective protection mechanisms. Over the past few decades, as globalization of the semiconductor supply chain has led companies to outsource many steps of their integrated circuit (IC) production cycle, the problem has been getting worse as the incidences of counterfeit ICs has increased exponentially. In 2015, it was reported that the illicit production of counterfeit ICs cost IC companies $100 billion 2, 3 and the cost has steadily increased every year. This has imposed a significant threat to the IC industry because it does not only negatively impact innovation and economic growth of IC industry, but also imposes serious threat and risk on systems that incorporate these counterfeit ICs. Counterfeit ICs have appeared in almost all industrial sectors, including sensitive fields such as finance, government infrastructure and military systems. As a results, demands for effective counterfeit IC detection or avoidance techniques has been tremendously escalated. Over the past few years, a plethora of papers have been published on the topics of preventing counterfeit ICs and these work can be divided into detection techniques or avoidance mechanisms. 4 Avoidance mechanisms rely on techniques such as adding additional signature circuitry to watermark the ICs, 1, 5, 6 using multi-phase fabrication by dividing the layout of the chip and get them fabricated at different foundries, to prevent the chips from being counterfeited. 7 However, the main drawback of avoidance techniques is the significant overhead added to the cost of ICs, which prevents them to be widely use in industry. On the other hand, counterfeit IC detection techniques focus on distinguishing counterfeit ICs from authentic ones and do not need additional circuitry of changing the layout of ICs. These techniques can be clustered into either physical tests and electrical tests. 8 The physical tests rely on examining the physical and chemical/material properties of the IC’s package, leads and die in order to detect procedural, mechanical, and environmental

A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

A Novel Clustering Technique Using Backscattering SideChannel for Counterfeit IC Detection

Luong N. Nguyena, Baki Berkay Yilmaza, Chia-Lin Chenga, Milos Prvulovicb, and AlenkaZajica

aSchool of Electrical and Computer EngineeringbCollege of Computing

1Georgia Institute of Technology, Atlanta, GA, USA

ABSTRACT

Over the past few years, globalization of the semiconductor supply chain has led companies to outsource manysteps of their integrated circuit (IC) production cycle. While outsourcing helps companies tremendously reducecost and time-to-market, it arises questions on the trust level of IC, and introduces several security vulnerabilities.One of the most serious problems is the counterfeiting of ICs because it does not only negatively impact innovationand economic growth of IC industry, but also imposes serious threat and risk on systems that incorporate thesecounterfeit ICs. This paper proposes a novel clustering method to detect counterfeit ICs using backscattering side-channel. Backscattering side-channel is a recently introduced side-channel that has been proved to outperformother side-channels in detecting hardware changes in digital circuit. Our algorithm utilizes the backscatteringside-channel to cluster counterfeit ICs from normal ICs. We test our technique on a set of ten boards oversix different counterfeit IC designs. The results show that our technique can tolerate manufacturing variationsamong different hardware instances to report all counterfeit IC measurements with 100% accuracy and 0% falsepositives.

Keywords: Counterfeit IC, Hardware Security, Reliability, Cloned IC, Backscattering, Clustering

1. INTRODUCTION

A counterfeit IC is an illicit copy of a legitimate chip with discrepancy on the performance, characteristics ormaterial, but sold or used as an authorized one.1 Counterfeiting of ICs has become a major challenge to thesemiconductor industry because of deficiencies in the existing test techniques and lack of effective protectionmechanisms. Over the past few decades, as globalization of the semiconductor supply chain has led companiesto outsource many steps of their integrated circuit (IC) production cycle, the problem has been getting worse asthe incidences of counterfeit ICs has increased exponentially. In 2015, it was reported that the illicit productionof counterfeit ICs cost IC companies $100 billion2,3 and the cost has steadily increased every year. This hasimposed a significant threat to the IC industry because it does not only negatively impact innovation andeconomic growth of IC industry, but also imposes serious threat and risk on systems that incorporate thesecounterfeit ICs. Counterfeit ICs have appeared in almost all industrial sectors, including sensitive fields suchas finance, government infrastructure and military systems. As a results, demands for effective counterfeit ICdetection or avoidance techniques has been tremendously escalated.

Over the past few years, a plethora of papers have been published on the topics of preventing counterfeitICs and these work can be divided into detection techniques or avoidance mechanisms.4 Avoidance mechanismsrely on techniques such as adding additional signature circuitry to watermark the ICs,1,5, 6 using multi-phasefabrication by dividing the layout of the chip and get them fabricated at different foundries, to prevent thechips from being counterfeited.7 However, the main drawback of avoidance techniques is the significant overheadadded to the cost of ICs, which prevents them to be widely use in industry.

On the other hand, counterfeit IC detection techniques focus on distinguishing counterfeit ICs from authenticones and do not need additional circuitry of changing the layout of ICs. These techniques can be clustered intoeither physical tests and electrical tests.8 The physical tests rely on examining the physical and chemical/materialproperties of the IC’s package, leads and die in order to detect procedural, mechanical, and environmental

Page 2: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

counterfeit ICs.7 These techniques include incoming inspection methods such as simple external visual inspection(EVI), X-ray imaging, exterior inspection tests such as resurfacing, microscopy scanning, material analysis suchas X-Ray Fluorescence (XRF), Fourier transform infrared spec. (FTIR), ion chromatography.9,10 In general,physical tests can be used to detect all type of counterfeit ICs. However, they are often destructive, time-consuming, and expensive.7,8

Electrical tests consist of parameter tests, function tests, curve tracing, built-in tests and structural tests.2,11,12

Unlike physical tests, electrical tests are non-destructive, relatively fast and cheap. However, electrical tests relieson determining if functionality of IC is correct to be able to detect counterfeit ICs, which mean it does not workfor counterfeit ICs that have the same functionality but different layout as authentic ones. In addition, a sheernumber of electrical test techniques require additional circuitry added to the design, which significantly increasesthe cost of the ICs.

Motivated by the above-mentioned drawbacks of previous detection techniques, this paper proposes a novelnon-destructive and fast technique using the backscattering side channel for detection of counterfeit ICs withsame functionality but different layout with authentic ones. We choose to use backscattering side-channel, a newphysical side-channel that has been proved to be a perfect fit, and outperforms other side-channels for hardwarevariation detections.13

The rest of the paper is organized as follows. In Section 2, we provide a background including the overview ofcounterfeit IC and the backscattering side channel for this work. Section 3 explains our technique for counterfeitIC detection, while Section 4 describes our experiment setup, benchmark implementation and testing schemeformulation. Section 5 presents the results of our technique. Finally, Section 6 concludes the paper.

2. BACKGROUND

2.1 Counterfeit ICs

A counterfeit IC is an illicit copy of a legitimate chip with discrepancy on the performance, characteristics or ma-terial, but sold or used as an authorized one.1 Counterfeit ICs can be divided into three groups remarked/recycledICs, out-of-spec/defective ICs, and cloned ICs.1 The first group includes aged ICs sold as new, ICs remarkedwith forged information. The second group includes out of specification ICs, rejected ICs during manufacturingtests but sold as normal ones, and tampered ICs which are infected by hardware Trojans. The last group includesoverproduced ICs, and unauthorized production of an IC by illegally obtaining the design of the IC either atRTL level, netlist level or layout level.

2.2 Backscattering Side Channel

While EM and power side-channels have been used extensively, the use of the backscattering side-channel is stillrelatively new.13,14 EM and power side-channels are a consequence of changes in the current inside an electroniccircuit. In contrast, the backscattering side-channel is a consequence of impedance changes in switching circuits,which is caused by the transistors’ two-state impedances reflecting a modulated signal.

For example, Figs. 1 (a) and (b) show a 2-input CMOS NAND gate and CMOS NOR gate respectively.When the input voltages of the NAND circuit are low, the NMOS transistors are off and the PMOS transistorsare on. A direct path exists between Vout and VDD, resulting in a high output state. On the other hand, highinput voltages result in a low output state. As shown in Fig. 1 (c), there exists a finite resistance R1 betweenthe output and VDD and R0 between the output and the ground, respectively. The values of R0 and R1 aredifferent.15 In other words, switching between the NAND logic’s high output state (R1) and low output state(R0) creates impedance variation, which is analogous to the impedance switching in RFID tags. Similarly, thesame reasoning can be applied to CMOS NOR and NOT gate circuits. Typically, every digital circuit is builtby NAND (or NOR) and NOT gates so it can be generalized to any digital circuit. When a continuous-wavesignal is transmitted toward a set of gates, the backscattered signal can be expected to change as the gates’states change, thus creating an impedance-based side-channel. Similar to the traditional EM side-channel, thebackscattering side-channel has a high bandwidth; however, unlike the EM side-channel, the strength of thebackscattered signal can be increased when needed, its frequency can be shifted to avoid noise, interference, andpoor signal propagation conditions, and it can be more accurately focused on a specific part of the chip.

Page 3: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

R1

VDD VDD

R0

VDD

(a) (b) Figure 1. CMOS NAND gate (a) and its two equivalent impedance circuits (b).

3. A NOVEL APPROACH FOR COUNTERFEIT DETECTION

3.1 Using Backscattering Side Channel for Counterfeit IC Detection

Nguyen et al.13 have shown that HTs can be detected by analyzing impedance changes within sub-clock samples,where the changes caused by HTs happen and can be observed on the clock signal. Therefore, if we can capturethe backscattered signal of sub-clock samples where the changes caused by HT can be observed, we can detect thepresence of HTs. However, the problem with the time-domain signal is that they are often very noisy, therefore,difficult to extract and synchronize measurements to get samples where changes caused by HTs happen.

In contrast, the changes caused by HTs occurring abruptly at some point in the clock cycle can be observed infrequency domain by performing short Time Fourier transformation (STFT) on time-domain signal and observewhich frequency components of time domain signal are affected when dormant HT is present. The signals inthe frequency domain are much easier to measure, and the noise power is very small because of focusing a singlefrequency bin at a time. As a result, instead of measuring the time domain signal, we measure multiple harmonicsof the clock in the frequency domain to observe changes in sub-clock samples for HT detection.

The change caused by HTs will be reflected in backscattered signals at the circuit’s clock harmonics: fcarrier±fc, fcarrier±2∗fc, etc. The first clock harmonic at fcarrier±fc follows the overall RCS change during a cycle, whilethe remaining harmonics are affected by the rapidity of change (rise/fall times), and timing of the impedancechanges within the clock cycle. For each circuit, we measure the amplitude of the first N harmonics of the clockfrom its backscattering side-channel signals to form a vector, which characterizes the circuit’s overall amount,timing, and duration of impedance-change activity during a clock cycle. If there is a hardware Trojan in thecircuit, this vector will be different from the ones recorded from an HT-free same circuit. As a result, we canrepresent each circuit by a vector of N points, which are the amplitudes of the first N harmonics of the clockfrom its backscattering side-channel signals: h = [h1, h2, ..., hN−1, hN ], where hj is the amplitude of the jth

harmonic of the clock. These vectors will be used as inputs for our clustering algorithm.

If changes caused by HTs in the time-domain signal become briefer in duration, the changes among clockharmonics become smaller in magnitude and shift to higher harmonics which, compared to lower harmonics, tendto be affected more by noise. This is one of the reasons why the backscattering side-channel works better for HTdetection than other traditional analog side-channels such as EM and Power side-channels. The backscatteringside-channel is a consequence of the impedance changes in switching digital switching circuits, which is caused bythe transistors’ two-state impedances reflecting a modulated signal. For each gate that switches, the impedancechange persists for the rest of the cycle. On the other hand, the EM and power side-channels are consequencesof the variation of the current flow in a circuit. As a gate switches, the current will be charged or dischargedquickly, which means a current burst occurs for a very short period of time.

Page 4: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

3.2 One-Class-Classification to Detect Counterfeits

In this section, we introduce our one-class-classification technique that accurately detect whether the layoutis original. The approach is based on supervised learning techniques which contain two phases: Training andtesting. In the training phase, the goal is to obtain an accurate model to claim whether a given layout iscounterfeit. Then, the testing phase reveals how robust the model is to label layouts.

Figure 2. Harmonic magnitudes of the original circuit in the training phase.

To achieve our goal, we first collect the harmonic magnitudes for the first N harmonics as described in Section3.1. An example of the original harmonic magnitudes are given in Figure 2. We observe that the harmonics aregenerally dense around the mean for each harmonic yet magnitudes vary significantly among different harmonics.Therefore, our model first considers each harmonic independently, and then combines the results of harmonicsto deduce the originality of the layout. In that respect, we calculate the mean magnitude of each harmonic as

h[k] =1

M

M∑m=1

hm[k] (1)

where M is the number of training measurements, and hm is a row vector containing the harmonic values of themth measurement which can be written as

hm =[h0m h1m · · · hNm

](2)

and hm[k] = hkm. To proceed further, let assume MD be the distance of the most deviated harmonic values fromthe mean among all training measurements such that

MD = max{abs

(H− 1hT

)}(3)

where max{•} returns a row vector which contains the maximum values at each column of its argument, abs{•}returns the magnitude of its argument, 1 ∈ <M is a column vector with full of ones, and H is a matrix such thateach row represents a measurement, and each column contains the corresponding harmonic value.

A common method in one-class-classification is density estimation which works better when large number ofmeasurements is present.16 However, having such a large sample space is difficult and takes really long time tocollect signals. Therefore, by mimicking the well-known “3σ” rule, we define the confidence interval for the mth

harmonic as[h[m]− 3 ·MD[m], h[m] + 3 ·MD[m]]. (4)

An example of the intervals and the average harmonic signal is given in Figure 3. One of the main observationsis that the spread around each harmonic varies, therefore, considering each harmonic independently gives betterinsight about the layout. For an even better illustration of the harmonics, we normalize the data as follows:

H = (H− 1h) ./ (1MD) (5)

Page 5: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

Figure 3. Average harmonic magnitudes and confidence intervals of the original circuit for each harmonic.

Figure 4. Normalized harmonic magnitudes and decision boundaries of the original circuit for each harmonic.

where “./” is the pairwise division operation. After this normalization of the data, the confidence interval ordecision boundaries are fixed to between -1 and 1. After the normalization, the training data and the boundariesare given in Figure 4. Finally, the layout is called

• Original if all measured harmonics are within the corresponding confidence intervals,

• Counterfeit if there is at least one harmonic values which violates its confidence interval.

4. BENCHMARK IMPLEMENTATION AND EXPERIMENT SETUP

4.0.1 Counterfeit IC Benchmark Implementation

Specifically, for our experiments, we implement two different kinds of counterfeit IC: 1) Counterfeit ICs withthe same functionality as the original but different physical implementation (position) of the circuit, and 2)Counterfeit ICs with the same functionality and position as the original but different physical layout (routingand placement) of the circuit.

• Counterfeit ICs with Different Layout: We have implemented several counterfeit IC examples by re-compiling and letting the EDA tool to change the placement and routing of the circuit. We have fourdifferent test subject designs: Original layout AES IC, 1st layout AES counterfeit IC, 2nd layout AEScounterfeit IC, 3rd layout AES counterfeit IC.

Page 6: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

• Counterfeit ICs with Changed Position: We have implemented several counterfeit IC examples by movingthe placement of the AES circuit from its original placement. We have four different test subject designs:original position AES IC, 1st position AES counterfeit IC, 2nd position AES counterfeit IC, and 3rd positionAES counterfeit IC.

Spectrum

Analyzer

Function

Generator

Controlling

laptop

Transmitter

probe

Receiver

probe

FPGA

Positioner

Figure 5. Measurement setup for counterfeit IC detection using backscattering side-channel.

4.0.2 Experiment Setup

The experimental setup to evaluate the performance of the proposed algorithm is shown in Fig. 5. The setupincludes a transmitter Aaronia E1 electric-field near-field probe17 connected to an Agilent MXG N5183A signalgenerator,18 and a receiver Aaronia H2 magnetic field near-field probe17 connected to an Agilent MXA N9020Aspectrum analyzer.19 The devices-under-test (DuT) are Altera DE0 Cyclone V FPGA boards.20 An angle ruleris used as a positioner so that different DE0-CV boards can be tested using approximately the same position ofprobes. A laptop is used to control the devices and automate the measurements. A 3 GHz continuous sinusoidsignal is generated by the signal generator, and backscattered signals are recorded by the spectrum analyzer.

5. EXPERIMENTAL RESULTS AND DISCUSSION

In this section, we provide experimental results when layout or placement position of the circuit changes. Wewill first perform an experiment when the layout of the circuit changes while keeping the functionality same.The results are given in Figure 6. We need to remind here that the harmonic values and the boundaries arenormalized based on the formula given in (5). For the testing phase, in this equation, H corresponds a matrix

where each row is a test measurement, h is the mean harmonic values obtained from training measurements,and MD is the maximum deviation row vector for each harmonic which is also obtained in the training phase.Figure 6(a) demonstrates the behaviour of the harmonics when the layout is original. In this figure, we plot theaverage training signal, corresponding confidence interval, and the harmonic values of the circuit. We observethat all considered harmonics are within the confidence interval, hence, all measurements are labeled as original.Then, we experiment with counterfeit layouts that have the same functionality but different layout. Figures 6(b),6(c) and 6(d) illustrate the harmonic values for different counterfeits. We observe that all of the measurementshave at least one component that violates the confidence intervals. Therefore, our methodology achieve 100%accuracy to detecting the fake circuits.

Another experiment is performed by changing the placement location of the circuit while keeping its func-tionality and layout same. Similar to the previous measurements, Figure 7(a) demonstrates the results of the

Page 7: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

(a) Normalized harmonic magnitudes of the original cir-cuit.

(b) Normalized harmonic magnitudes of the circuit withthe same functionality and a different layout.

(c) Normalized harmonic magnitudes of the circuit withthe same functionality and a different layout.

(d) Normalized harmonic magnitudes of the circuit withthe same functionality and a different layout.

Figure 6. Normalized harmonic magnitudes of the circuit with the same functionality and different layouts.

test signals of the original circuit, and the rest illustrates the fake circuits. All of the harmonics of the originalcircuit measurements lie in the confidence intervals for each harmonic. Therefore, all of the orginal circuitsare accurately labeled. If we consider the counterfeit circuits, we observe that there is at least one harmonicthat is not confined in the confidence interval. Hence, all the fake circuits are accurately labeled as counterfeit.Therefore, we achieve 100% accuracy for this experiment as well.

In summary, both experiments reveal that our methodology is a very powerful and robust to identify thecounterfeit circuits.

6. CONCLUSION

Over the past few years, counterfeiting of ICs has become a major challenge to the semiconductor industrybecause of globalization of the semiconductor suply chain, deficiencies in the existing test techniques and lackof effective protection mechanisms. This paper proposes a novel non-destructive and fast technique using thebackscattering side channel for detection of counterfeit ICs with same functionality but different layout withauthentic ones. Our algorithm utilizes the backscattering side-channel to cluster counterfeit ICs from normalICs. We choose to use backscattering side-channel, a new physical side-channel because it has been proved to bea perfect fit, and outperforms other side-channels for hardware variation detections. We test our technique on aset of ten boards over six different counterfeit IC designs. The experimental results show that our technique cantolerate manufacturing variations among different hardware instances to report all counterfeit IC measurementswith 100% accuracy and 0% false positives.

REFERENCES

[1] Basak, A., Zheng, Y., and Bhunia, S., “Active defense against counterfeiting attacks through robust antifuse-based on-chip locks,” in [2014 IEEE 32nd VLSI Test Symposium (VTS) ], 1–6, IEEE (2014).

Page 8: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

(a) Normalized harmonic magnitudes of the original cir-cuit.

(b) Normalized harmonic magnitudes of the circuit withthe same functionality and layout, but a different place-ment position.

(c) Normalized harmonic magnitudes of the circuit withthe same functionality and layout, but a different place-ment position.

(d) Normalized harmonic magnitudes of the circuit withthe same functionality and layout, but a different place-ment position.

Figure 7. Normalized harmonic magnitudes of the circuit with the same functionality and layout, but different placementpositions.

[2] Moudgil, R., Ganta, D., Nazhandali, L., Hsiao, M., Wang, C., and Hall, S., “A novel statistical and circuit-based technique for counterfeit detection in existing ics,” in [Proceedings of the 23rd ACM internationalconference on Great lakes symposium on VLSI ], 1–6, ACM (2013).

[3] Mahmood, K., Carmona, P. L., Shahbazmohamadi, S., Pla, F., and Javidi, B., “Real-time automatedcounterfeit integrated circuit detection using x-ray microscopy,” Applied Optics 54(13), D25–D32 (2015).

[4] Guin, U., DiMase, D., and Tehranipoor, M., “Counterfeit integrated circuits: detection, avoidance, and thechallenges ahead,” Journal of Electronic Testing 30(1), 9–23 (2014).

[5] Yang, K., Forte, D., and Tehranipoor, M., “An rfid-based technology for electronic component and sys-tem counterfeit detection and traceability,” in [2015 IEEE International Symposium on Technologies forHomeland Security (HST) ], 1–6, IEEE (2015).

[6] Zheng, Y., Mannai, A., and Sawan, M., “A biomems chip with integrated micro electromagnet array towardsbio-particles manipulation,” Microelectronic Engineering 128, 1–6 (2014).

[7] Tehranipoor, M. M., Guin, U., and Forte, D., “Counterfeit integrated circuits,” in [Counterfeit IntegratedCircuits ], 15–36, Springer (2015).

[8] He, K., Huang, X., and Tan, S. X.-D., “Em-based on-chip aging sensor for detection and prevention ofcounterfeit and recycled ics,” in [Proceedings of the IEEE/ACM International Conference on Computer-Aided Design ], 146–151, IEEE Press (2015).

[9] Song, P., Stellari, F., and Weger, A., “Counterfeit ic detection using light emission,” in [2014 InternationalTest Conference ], 1–8, IEEE (2014).

[10] Ghosh, P. and Chakraborty, R. S., “Counterfeit ic detection by image texture analysis,” in [2017 Euromicroconference on digital system design (DSD) ], 283–286, IEEE (2017).

Page 9: A Novel Clustering Technique Using Backscattering … › wp-content › uploads › sites › ...A Novel Clustering Technique Using Backscattering Side Channel for Counterfeit IC

[11] Baba, A. H. and Mitra, S., “Testing for transistor aging,” in [2009 27th IEEE VLSI Test Symposium ],215–220, IEEE (2009).

[12] Chen, X., Wang, Y., Cao, Y., Ma, Y., and Yang, H., “Variation-aware supply voltage assignment for mini-mizing circuit degradation and leakage,” in [Proceedings of the 2009 ACM/IEEE international symposiumon Low power electronics and design ], 39–44, ACM (2009).

[13] Nguyen, L. N., Cheng, C., Prvulovic, M., and Zajic, A., “Creating a backscattering side channel to en-able detection of dormant hardware trojans,” IEEE Transactions on Very Large Scale Integration (VLSI)Systems 27, 1561–1574 (July 2019).

[14] Cheng, C.-L., Nguyen, L. N., Prvulovic, M., and Zajic, A., “Exploiting switching of transistors in digitalelectronics for rfid tag design,” IEEE Journal of Radio Frequency Identification 3(2), 67–76 (2019).

[15] Rabaey, J. M., Chandrakasan, A. P., and Nikolic, B., [Digital integrated circuits ], vol. 2, Prentice hallEnglewood Cliffs (2002).

[16] Tax, D. M. J., “One-class classification: Concept learning in the absence of counter-examples.,” (2002).

[17] AARONIA PBS. http://www.aaronia.com/products/antennas/Near-Field-Probe-Set-PBS2.

[18] Keysight Signal Generator. https://www.keysight.com/en/pdx-x201724-pn-N5183A/

mxg-microwave-analog-signal-generator-100-khz-to-40-ghz?pm=spc&nid=-32490.1150253&cc=

US&lc=eng.

[19] Keysight Signal Analyzer. https://www.keysight.com/en/pdx-x202266-pn-N9020A/

mxa-signal-analyzer-10-hz-to-265-ghz?pm=spc&nid=-32508.1150426&cc=US&lc=eng.

[20] DE1 FPGA on NIOS Processor. https://www.terasic.com.tw/cgi-bin/page/archive.pl?Language=

English&CategoryNo=167&No=921&PartNo=2.