Dual-Metric Detection of Synthesis-Masked Hardware Trojans in AES-256: Correlating Power Signatures with Switching Activity
PDF
PDF

How to Cite

K., Rahimunnisa, Aadhitya G., Abhyjeet J., and Dharnesh S. 2026. “Dual-Metric Detection of Synthesis-Masked Hardware Trojans in AES-256: Correlating Power Signatures With Switching Activity”. Journal of Trends in Computer Science and Smart Technology 8 (2): 243-66. https://doi.org/10.36548/jtcsst.2026.2.003.

Keywords

Hardware Trojans
AES-256
Power Analysis
Synthesis Masking
Negative Power Signature
Switching Activity Analysis

Abstract

Hardware Trojans can be accidentally hidden due to synthesis optimizations performed by electronic design automation tools in cryptosystems, leaving important detection gaps in the process. In this study, the impact of synthesis on the power signatures of AES-256 cores has been analyzed based on power/net switching correlations. Four hardware Trojans have been synthesized targeting the 7nm Versal technology of Xilinx and have been simulated over the course of 10,000 clock cycles across 714 different key/plaintext combinations. The results showed that three hardware Trojans exhibited unexpected negative power deviations, although they incorporated malicious logic in their structures. Two separate categories of synthesis interactions can be observed from switching distribution histograms over 646 nets and KL divergence statistics (0.03–0.42): synthesis-masked dormant Trojans with lower toggles and leftward-shifting distributions, and synthesis-neutralized active Trojans with 40% more active nets and lower power. This two-fold correlation method allows for detecting synthesis-affected Trojans that cannot be identified through conventional power-overhead analysis methods, achieving reproducible structural detection supported by dual-metric cross-validation (Z-scores -0.62 to -0.77), despite individual signatures falling below the conventional 3σ detection threshold.

References

  1. Saad, Walid, Anibal Sanjab, Yunpeng Wang, Charles A. Kamhoua, and Kevin A. Kwiat. "Hardware Trojan Detection Game: A Prospect-Theoretic Approach." IEEE Transactions on Vehicular Technology 66, no. 9 (2017): 7697-7710.
  2. Semiconductor Industry Association. "2023 State of the U.S. Semiconductor Industry." 2023. https://www.semiconductors.org/
  3. NIST, Data Encryption Standard. "Advanced Encryption Standard (AES)(FIPS–197)." National Institute of Standards and Technology (2001). https://doi.org/10.6028/NIST.FIPS.197.
  4. Wang, Xiaoxiao, Hassan Salmani, Mohammad Tehranipoor, and Jim Plusquellic. "Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis." In 2008 IEEE international symposium on defect and fault tolerance of VLSI systems, IEEE, 2008, 87-95.
  5. Tehranipoor, Mohammad, and Farinaz Koushanfar. "A Survey of Hardware Trojan Taxonomy and Detection." IEEE design & test of computers 27, no. 1 (2010): 10-25.
  6. Xiao, Kan, Domenic Forte, Yier Jin, Ramesh Karri, Swarup Bhunia, and Mohammad Tehranipoor. "Hardware Trojans: Lessons Learned after One Decade of Research." ACM Transactions on Design Automation of Electronic Systems (TODAES) 22, no. 1 (2016): 1-23.
  7. Hoang, Van-Phuc. "Hardware Trojan Detection Based on Side-Channel Analysis Using Power Traces and Machine Learning." Target 2 (2021): 53-56.
  8. Lamech, Charles, Reza M. Rad, Mohammad Tehranipoor, and Jim Plusquellic. "An Experimental Analysis of Power and Delay Signal-to-Noise Requirements for Detecting Trojans and Methods for Achieving the Required Detection Sensitivities." IEEE Transactions on Information Forensics and Security 6, no. 3 (2011): 1170-1179.
  9. Amornpaisannon, Burin, Andreas Diavastos, Li-Shiuan Peh, and Trevor E. Carlson. "Secure Run-Time Hardware Trojan Detection Using Lightweight Analytical Models." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 43, no. 2 (2023): 431-441.
  10. Dong, Chen, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, and Yuzhong Chen. "Hardware Trojans In Chips: A Survey for Detection and Prevention." Sensors 20, no. 18 (2020): 5165.
  11. Lohith, S., K. Manjunath, and B. Sridhar. "Optimizing System Performance Using AES for Hardware Trojan Detection with Minimizing the Area." International Journal of New Innovation in Engineering and Technology 24, no. 1 (2024): 542-547.
  12. Rahimunnisa, K., P. Karthigaikumar, Soumiya Rasheed, J. Jayakumar, and S. SureshKumar. "FPGA Implementation of AES Algorithm for High Throughput Using Folded Parallel Architecture." Security and Communication Networks 7, no. 11 (2014): 2225-2236.
  13. Puspa, Sefatun-Noor, Abyad Enan, Reek Majumdar, M. Sabbir Salek, Gurcan Comert, and Mashrur Chowdhury. "An AI-Enabled Side Channel Power Analysis Based Hardware Trojan Detection Method for Securing the Integrated Circuits in Cyber-Physical Systems." arXiv preprint arXiv:2411.12721 (2024).
  14. Golabi, Arash, Abdelkarim Erradi, Ahmed Bensaid, Abdulla Al-Ali, and Uvais Qidwai. "A Dual-Channel Robust Deep Learning Framework for Enhanced Detection of Hardware Trojans Via Side-Channel Analysis." Neural Computing and Applications 38, no. 5 (2026): 120.
  15. Daemen, J. and Rijmen, V. (2002) The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin. https://doi.org/10.1007/978-3-662-04722-4_1.
  16. Yu, Weize. "Hardware Trojan Attacks on Voltage Scaling‐Based Side‐Channel Attack Countermeasure." IET Circuits, Devices & Systems 13, no. 3 (2019): 321-326.
  17. Bhunia, Swarup, and Mark Tehranipoor. Hardware Security: A Hands-on Learning Approach. Morgan Kaufmann, 2018.
  18. Agrawal, Dakshi, Selcuk Baktir, Deniz Karakoyunlu, Pankaj Rohatgi, and Berk Sunar. "Trojan Detection Using IC Fingerprinting." In S&P, 2007, 296-310.
  19. Xilinx, A. M. D. Vivado Design Suite User Guide: Synthesis (ug901). 2023. https://www.xilinx.com.
  20. Sturges, Herbert A. "The Choice of a Class Interval." Journal of the american statistical association 21, no. 153 (1926): 65-66.
  21. Trust-Hub. "Trust-Hub Hardware Trojan Benchmarks." 2022. https://trust-hub.org.
  22. Xilinx Inc. "Versal ACAP VCK5000 Development Card Data Sheet." DS1030, v1.2. 2023. https://www.xilinx.com.
  23. Matsumoto, Makoto, and Takuji Nishimura. "Mersenne Twister: a 623-Dimensionally Equidistributed Uniform Pseudo-Random Number Generator." ACM Transactions on Modeling and Computer Simulation (TOMACS) 8, no. 1 (1998): 3-30.
  24. Waksman, Adam, and Simha Sethumadhavan. "Silencing Hardware Backdoors." In 2011 IEEE Symposium on Security and Privacy, IEEE, 2011, 49-63.
  25. Jin, Yier, and Yiorgos Makris. "Hardware Trojan Detection Using Path Delay Fingerprint." In 2008 IEEE International workshop on hardware-oriented security and trust, IEEE, 2008, 51-57.
  26. Dupuis, Sophie, Papa-Sidi Ba, Giorgio Di Natale, Marie-Lise Flottes, and Bruno Rouzeyre. "A Novel Hardware Logic Encryption Technique for Thwarting Illegal Overproduction and Hardware Trojans." In 2014 IEEE 20th International On-Line Testing Symposium (IOLTS), IEEE, 2014, 49-54.
  27. Narasimhan, Seetharam, Dongdong Du, Rajat Subhra Chakraborty, Somnath Paul, Francis Wolff, Christos Papachristou, Kaushik Roy, and Swarup Bhunia. "Multiple-Parameter Side-Channel Analysis: A Non-Invasive Hardware Trojan Detection Approach." In 2010 IEEE international symposium on hardware-oriented security and trust (HOST), IEEE, 2010, 13-18.
  28. Maragos, Konstantinos, George Lentaris, Dimitrios Soudris, and Vasilis F. Pavlidis. "PVT-Aware Sensing and Voltage Scaling for Energy Efficient FPGAs." In Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2019, 190-190.
  29. Su, Ting, Yaohua Wang, Shi Xu, Lusi Zhang, Simin Feng, Jialong Song, Yiming Liu et al. "Improving the Ability of Thermal Radiation Based Hardware Trojan Detection." In 33rd USENIX security symposium (USENIX security 24), 2024, 127-144.
  30. Jain, Ayush, and Ujjwal Guin. "A Novel Tampering Attack on AES Cores with Hardware Trojans." In 2020 IEEE International Test Conference in Asia (ITC-Asia), IEEE, 2020, 77-82.