Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation

The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature variations across the FPGA. This aggravates the im...

Full description

Bibliographic Details
Main Authors: Sohaib Aslam, Ian K. Jennions, Mohammad Samie, Suresh Perinpanayagam, Yisen Fang
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8993719/
_version_ 1818323813654331392
author Sohaib Aslam
Ian K. Jennions
Mohammad Samie
Suresh Perinpanayagam
Yisen Fang
author_facet Sohaib Aslam
Ian K. Jennions
Mohammad Samie
Suresh Perinpanayagam
Yisen Fang
author_sort Sohaib Aslam
collection DOAJ
description The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature variations across the FPGA. This aggravates the impact of NBTI on key PMOS transistor parameters such as threshold voltage and drain current. Where it ages the transistors, with a successive reduction in FPGA lifetime and reliability, it also challenges its security. The ingress of threshold voltage-triggered hardware Trojan, a stealthy and malicious electronic circuit, in the modern FPGA, is one such potential threat that could exploit NBTI and severely affect its performance. The development of an effective and efficient countermeasure against it is, therefore, highly critical. Accordingly, we present a comprehensive FPGA security scheme, comprising novel elements of hardware Trojan infection, detection, and mitigation, to protect FPGA applications against the hardware Trojan. Built around the threat model of a naval warship's integrated self-protection system (ISPS), we propose a threshold voltage-triggered hardware Trojan that operates in a threshold voltage region of 0.45V to 0.998V, consuming ultra-low power (10.5nW), and remaining stealthy with an area overhead as low as 1.5% for a 28 nm technology node. The hardware Trojan detection sub-scheme provides a unique lightweight threshold voltage-aware sensor with a detection sensitivity of 0.251mV/nA. With fixed and dynamic ring oscillator-based sensor segments, the precise measurement of frequency and delay variations in response to shifts in the threshold voltage of a PMOS transistor is also proposed. Finally, the FPGA security scheme is reinforced with an online transistor dynamic scaling (OTDS) to mitigate the impact of hardware Trojan through run-time tolerant circuitry capable of identifying critical gates with worst-case drain current degradation.
first_indexed 2024-12-13T11:18:39Z
format Article
id doaj.art-6e89eb14aa414942b73f70863b919fba
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T11:18:39Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6e89eb14aa414942b73f70863b919fba2022-12-21T23:48:33ZengIEEEIEEE Access2169-35362020-01-018313713139710.1109/ACCESS.2020.29732608993719Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and MitigationSohaib Aslam0https://orcid.org/0000-0001-8769-2828Ian K. Jennions1Mohammad Samie2Suresh Perinpanayagam3Yisen Fang4Integrated Vehicle Health Management (IVHM) Centre, Cranfield University, Cranfield, U.K.Integrated Vehicle Health Management (IVHM) Centre, Cranfield University, Cranfield, U.K.Integrated Vehicle Health Management (IVHM) Centre, Cranfield University, Cranfield, U.K.Integrated Vehicle Health Management (IVHM) Centre, Cranfield University, Cranfield, U.K.Integrated Vehicle Health Management (IVHM) Centre, Cranfield University, Cranfield, U.K.The ageing phenomenon of negative bias temperature instability (NBTI) continues to challenge the dynamic thermal management of modern FPGAs. Increased transistor density leads to thermal accumulation and propagates higher and non-uniform temperature variations across the FPGA. This aggravates the impact of NBTI on key PMOS transistor parameters such as threshold voltage and drain current. Where it ages the transistors, with a successive reduction in FPGA lifetime and reliability, it also challenges its security. The ingress of threshold voltage-triggered hardware Trojan, a stealthy and malicious electronic circuit, in the modern FPGA, is one such potential threat that could exploit NBTI and severely affect its performance. The development of an effective and efficient countermeasure against it is, therefore, highly critical. Accordingly, we present a comprehensive FPGA security scheme, comprising novel elements of hardware Trojan infection, detection, and mitigation, to protect FPGA applications against the hardware Trojan. Built around the threat model of a naval warship's integrated self-protection system (ISPS), we propose a threshold voltage-triggered hardware Trojan that operates in a threshold voltage region of 0.45V to 0.998V, consuming ultra-low power (10.5nW), and remaining stealthy with an area overhead as low as 1.5% for a 28 nm technology node. The hardware Trojan detection sub-scheme provides a unique lightweight threshold voltage-aware sensor with a detection sensitivity of 0.251mV/nA. With fixed and dynamic ring oscillator-based sensor segments, the precise measurement of frequency and delay variations in response to shifts in the threshold voltage of a PMOS transistor is also proposed. Finally, the FPGA security scheme is reinforced with an online transistor dynamic scaling (OTDS) to mitigate the impact of hardware Trojan through run-time tolerant circuitry capable of identifying critical gates with worst-case drain current degradation.https://ieeexplore.ieee.org/document/8993719/Ageing mechanismfield programmable gate array (FPGA)hardware Trojannegative bias temperature instability (NBTI)propagation delayreliability
spellingShingle Sohaib Aslam
Ian K. Jennions
Mohammad Samie
Suresh Perinpanayagam
Yisen Fang
Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
IEEE Access
Ageing mechanism
field programmable gate array (FPGA)
hardware Trojan
negative bias temperature instability (NBTI)
propagation delay
reliability
title Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
title_full Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
title_fullStr Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
title_full_unstemmed Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
title_short Ingress of Threshold Voltage-Triggered Hardware Trojan in the Modern FPGA Fabric–Detection Methodology and Mitigation
title_sort ingress of threshold voltage triggered hardware trojan in the modern fpga fabric x2013 detection methodology and mitigation
topic Ageing mechanism
field programmable gate array (FPGA)
hardware Trojan
negative bias temperature instability (NBTI)
propagation delay
reliability
url https://ieeexplore.ieee.org/document/8993719/
work_keys_str_mv AT sohaibaslam ingressofthresholdvoltagetriggeredhardwaretrojaninthemodernfpgafabricx2013detectionmethodologyandmitigation
AT iankjennions ingressofthresholdvoltagetriggeredhardwaretrojaninthemodernfpgafabricx2013detectionmethodologyandmitigation
AT mohammadsamie ingressofthresholdvoltagetriggeredhardwaretrojaninthemodernfpgafabricx2013detectionmethodologyandmitigation
AT sureshperinpanayagam ingressofthresholdvoltagetriggeredhardwaretrojaninthemodernfpgafabricx2013detectionmethodologyandmitigation
AT yisenfang ingressofthresholdvoltagetriggeredhardwaretrojaninthemodernfpgafabricx2013detectionmethodologyandmitigation