Study on Hardware Trojan Design and Implantation Based on Chisel

被引:0
|
作者
Wang, Jianxin [1 ]
Zheng, Yuzheng [1 ]
Xiao, Chaoen [1 ]
Zhang, Lei [1 ]
Chang, Xiangze [1 ]
Zhang, Xuanrui [1 ]
机构
[1] Beijing Inst Elect Sci & Technol, Dept Elect & Commun Engn, Beijing, Peoples R China
关键词
Chisel; AES-T100; style; Hardware Trojans; Hardware Security;
D O I
10.1109/EMIE61984.2024.10617082
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the complexity and scale of digital integrated circuits increase, the level of chip design and verification continues to improve, and traditional design languages can no longer meet current demands. In response to these challenges, the Chisel language has emerged, providing a new tool for hardware Trojan design. This paper presents the design of an AES-T100 hardware Trojan using the Chisel language. This hardware Trojan features an always-on design and steals key information through internal activation. Functional simulations and scheme verifications have been conducted, and the test results show that compared to a Verilog-designed hardware Trojan, the Chisel-designed hardware Trojan chip achieves a maximum main frequency increase of 74.41MHz and a throughput increase of 25%, while only occupying 0.21% of the total code's logic utilization. This demonstrates Chisel's significant advantages and resource efficiency in hardware Trojan circuit design. Therefore, Chisel possesses higher efficiency and optimization capabilities in hardware design, making it highly valuable for research in hardware Trojans.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [21] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93
  • [22] A stealthy Hardware Trojan design and corresponding detection method
    Su, Yu
    Shen, Haihua
    Lu, Renjie
    Ye, Yunying
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [23] SRAM Security and Vulnerability To Hardware Trojan: Design Considerations
    Saeidi, Roghayeh
    Nabavi, Morteza
    Savaria, Yvon
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 722 - 725
  • [24] Design and LSI Prototyping of Security Module with Hardware Trojan
    Yoshikawa, Masaya
    Tsukadaira, Takuya
    Kumaki, Takeshi
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 426 - 427
  • [25] Hardware Trojan Design and Detection in Asynchronous NCL Circuits
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Smith, Scott C.
    2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,
  • [26] New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    Salmani, Hassan
    Tehranipoor, Mohammad
    Plusquellic, Jim
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 66 - +
  • [27] Hardware Trojan Detection Based on Image Comparison
    Sun, Chen
    Guo, Xiaohui
    Li, Lingling
    Ma, Jingjing
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 80 : 979 - 986
  • [28] Hardware Trojan Detection Based on Logical Testing
    Bazzazi, Amin
    Shalmani, Mohammad Taghi Manzuri
    Hemmatyar, Ali Mohammad Afshin
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2017, 33 (04): : 381 - 395
  • [29] Hardware Trojan Detection Based on the Distance Discrimination
    Wang Jianxin
    Wang Boren
    Qu Ming
    Zhang Lei
    Xiao Chaoen
    2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 404 - 407
  • [30] Hardware Trojan Detection Based on Signal Correlation
    Zhao, Wei
    Shen, Haihua
    Li, Huawei
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 80 - 85