Search papers, labs, and topics across Lattice.
This paper introduces a reference-free method for detecting always-on hardware Trojans by analyzing electromagnetic (EM) side-channel emissions across multiple time-frequency resolutions. The approach constructs stability maps and uses Gaussian Mixture Models (GMMs) with Bayesian Information Criterion (BIC) to characterize statistical structure at each scale, then quantifies cross-scale saturation, variability, and median mixture complexity. Experiments on AES implementations demonstrate that Trojan-free designs exhibit scale-dependent variability, while always-on Trojans produce persistent statistical signatures, enabling unsupervised detection.
Always-on hardware Trojans leave persistent statistical signatures in EM emissions that can be detected without a golden reference, even differentiating between workload-correlated and independent Trojans.
Always-on hardware Trojans pose a serious challenge to integrated circuit trust, as they remain active during normal operation and are difficult to detect in post-deployment settings without trusted golden references. This paper presents a reference-free detection framework based on cross-scale persistence analysis of electromagnetic (EM) side-channels, targeting always-on parasitic hardware behavior. The proposed method analyzes EM emissions across multiple time-frequency resolutions and constructs stability maps that capture the consistency of spectral features over repeated executions. Gaussian Mixture Models (GMMs) with Bayesian Information Criterion (BIC) based model selection are used to characterize statistical structure at each scale. We introduce cross-scale saturation, variability, and median mixture complexity metrics that quantify whether statistical structure evolves naturally or remains persistently anchored across resolutions. Experimental results on AES implementations show that Trojan-free designs exhibit scale-dependent variability consistent with transient switching behavior, while always-on Trojans produce persistent statistical signatures that suppress cross-scale evolution. Furthermore, different Trojan classes, such as workload-correlated leakage-information Trojans and independent ring-oscillator Trojans, exhibit distinct persistence patterns. These findings demonstrate that cross-scale persistence provides a physically interpretable and robust assurance signal for unsupervised, reference-free detection of always-on hardware Trojans.