Study on Hardware Trojan Design and Implantation Based on Chisel

被引:0
|
作者
Wang, Jianxin [1 ]
Zheng, Yuzheng [1 ]
Xiao, Chaoen [1 ]
Zhang, Lei [1 ]
Chang, Xiangze [1 ]
Zhang, Xuanrui [1 ]
机构
[1] Beijing Inst Elect Sci & Technol, Dept Elect & Commun Engn, Beijing, Peoples R China
关键词
Chisel; AES-T100; style; Hardware Trojans; Hardware Security;
D O I
10.1109/EMIE61984.2024.10617082
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the complexity and scale of digital integrated circuits increase, the level of chip design and verification continues to improve, and traditional design languages can no longer meet current demands. In response to these challenges, the Chisel language has emerged, providing a new tool for hardware Trojan design. This paper presents the design of an AES-T100 hardware Trojan using the Chisel language. This hardware Trojan features an always-on design and steals key information through internal activation. Functional simulations and scheme verifications have been conducted, and the test results show that compared to a Verilog-designed hardware Trojan, the Chisel-designed hardware Trojan chip achieves a maximum main frequency increase of 74.41MHz and a throughput increase of 25%, while only occupying 0.21% of the total code's logic utilization. This demonstrates Chisel's significant advantages and resource efficiency in hardware Trojan circuit design. Therefore, Chisel possesses higher efficiency and optimization capabilities in hardware design, making it highly valuable for research in hardware Trojans.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [1] Design of Hardware Trojan Horse Based on Counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 1007 - 1009
  • [2] A case study in hardware Trojan design and implementation
    Baumgarten, Alex
    Steffen, Michael
    Clausman, Matthew
    Zambreno, Joseph
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 1 - 14
  • [3] Design of hardware trojan horse based on counter
    Liu, Huafeng
    Luo, Hongwei
    Wang, Liwei
    ICQR2MSE 2011 - Proceedings of 2011 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2011, : 1007 - 1009
  • [4] A case study in hardware Trojan design and implementation
    Alex Baumgarten
    Michael Steffen
    Matthew Clausman
    Joseph Zambreno
    International Journal of Information Security, 2011, 10 : 1 - 14
  • [5] A New Design of Hardware Trojan Based on Path Delay
    Sun, Hai-lin
    Li, Lei
    Zhou, Wan-ting
    INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY (ICMEIT 2018), 2018, : 419 - 423
  • [6] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [7] Experiences in Hardware Trojan Design and Implementation
    Jin, Yier
    Kupp, Nathan
    Makris, Yiorgos
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 50 - +
  • [8] Hardware Trojan Design on Neural Networks
    Clements, Joseph
    Lao, Yingjie
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [9] Design of a chip destructible hardware Trojan
    Li, Jun
    Sui, Qiang
    Chi, Ming
    Chen, Jihua
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 648 - 651
  • [10] (System)Verilog to Chisel Translation for Faster Hardware Design
    Bruant, Jean
    Horrein, Pierre-Henri
    Muller, Olivier
    Groleat, Tristan
    Petrot, Frederic
    PROCEEDINGS OF THE 2020 31ST INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING (RSP): SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2020, : 43 - 49