Study on Hardware Trojan Design and Implantation Based on Chisel

被引:0
|
作者
Wang, Jianxin [1 ]
Zheng, Yuzheng [1 ]
Xiao, Chaoen [1 ]
Zhang, Lei [1 ]
Chang, Xiangze [1 ]
Zhang, Xuanrui [1 ]
机构
[1] Beijing Inst Elect Sci & Technol, Dept Elect & Commun Engn, Beijing, Peoples R China
关键词
Chisel; AES-T100; style; Hardware Trojans; Hardware Security;
D O I
10.1109/EMIE61984.2024.10617082
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the complexity and scale of digital integrated circuits increase, the level of chip design and verification continues to improve, and traditional design languages can no longer meet current demands. In response to these challenges, the Chisel language has emerged, providing a new tool for hardware Trojan design. This paper presents the design of an AES-T100 hardware Trojan using the Chisel language. This hardware Trojan features an always-on design and steals key information through internal activation. Functional simulations and scheme verifications have been conducted, and the test results show that compared to a Verilog-designed hardware Trojan, the Chisel-designed hardware Trojan chip achieves a maximum main frequency increase of 74.41MHz and a throughput increase of 25%, while only occupying 0.21% of the total code's logic utilization. This demonstrates Chisel's significant advantages and resource efficiency in hardware Trojan circuit design. Therefore, Chisel possesses higher efficiency and optimization capabilities in hardware design, making it highly valuable for research in hardware Trojans.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [31] Hardware Trojan Detection Based on Logical Testing
    Amin Bazzazi
    Mohammad Taghi Manzuri Shalmani
    Ali Mohammad Afshin Hemmatyar
    Journal of Electronic Testing, 2017, 33 : 381 - 395
  • [32] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Chakraborty, Rajat Subhra
    Bhunia, Swarup
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06): : 767 - 785
  • [33] Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
    Rajat Subhra Chakraborty
    Swarup Bhunia
    Journal of Electronic Testing, 2011, 27 : 767 - 785
  • [34] XG Boost Algorithm based Hardware Trojan Detection in Hardware Circuits
    Vennila, A.
    Balambigai, S.
    Arulmurugan, A.
    Hema, M.
    Kamali, M.
    Kishore, M.
    2023 5th International Conference on Electrical, Computer and Communication Technologies, ICECCT 2023, 2023,
  • [35] CRC-Based Hardware Trojan Detection for Improved Hardware Security
    Mohankumar, N.
    Jayakumar, M.
    Nirmala Devi, M.
    Lecture Notes in Electrical Engineering, 2018, 471 : 381 - 389
  • [36] A Hardware Trojan Detection Method Based on Structural Features of Trojan and Host Circuits
    Liu, Qiang
    Zhao, Pengyong
    Chen, Fuqiang
    IEEE ACCESS, 2019, 7 : 44632 - 44644
  • [37] A Comparative Study of Chisel for FPGA Design
    Lennon, Paul
    Gahan, Richard
    2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,
  • [38] A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting
    Nejat, Arash
    Shekarian, Seyed Mohammd Hossein
    Zamani, Morteza Saheb
    MICROPROCESSORS AND MICROSYSTEMS, 2014, 38 (03) : 246 - 252
  • [39] An Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design Flow
    Kumar, Sudeendra K.
    Chanamala, Rakesh
    Sahoo, Sauvagya Ranjan
    Mahapatra, K. K.
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [40] Parameterizable Design on Convolutional Neural Networks Using Chisel Hardware Construction Language
    Madineni, Mukesh Chowdary
    Vega, Mario
    Yang, Xiaokun
    MICROMACHINES, 2023, 14 (03)