Implementing hardware Trojans: Experiences from a hardware Trojan challenge
- 1 October 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2011 IEEE 29th International Conference on Computer Design (ICCD)
Abstract
Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the reference encryption algorithm. These side-channel-based Trojans do not impact the functionality of the design to minimize the possibility of detection. We have demonstrated the statistical analysis approach to attack such Trojans. Besides, we introduced Trojans that modify either the functional behavior or the electrical characteristics of the reference design. Novel techniques such as a Trojan draining the battery of a device do not have an immediate impact and hence avoid detection, but affect the long term reliability of the system.Keywords
This publication has 7 references indexed in Scilit:
- Trustworthy Hardware: Identifying and Classifying Hardware TrojansComputer, 2010
- Detecting Trojans Through Leakage Current Analysis Using Multiple Supply Pad ${I}_{\rm DDQ}$sIEEE Transactions on Information Forensics and Security, 2010
- Multiple-parameter side-channel analysis: A non-invasive hardware Trojan detection approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Trusted RTL: Trojan detection methodology in pre-silicon designsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Process reliability based trojans through NBTI and HCI effectsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Side-channel based watermarks for integrated circuitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Experiences in Hardware Trojan design and implementationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009