Study on Hardware Trojan Design and Implantation Based on Chisel

被引:0
|
作者
Wang, Jianxin [1 ]
Zheng, Yuzheng [1 ]
Xiao, Chaoen [1 ]
Zhang, Lei [1 ]
Chang, Xiangze [1 ]
Zhang, Xuanrui [1 ]
机构
[1] Beijing Inst Elect Sci & Technol, Dept Elect & Commun Engn, Beijing, Peoples R China
关键词
Chisel; AES-T100; style; Hardware Trojans; Hardware Security;
D O I
10.1109/EMIE61984.2024.10617082
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As the complexity and scale of digital integrated circuits increase, the level of chip design and verification continues to improve, and traditional design languages can no longer meet current demands. In response to these challenges, the Chisel language has emerged, providing a new tool for hardware Trojan design. This paper presents the design of an AES-T100 hardware Trojan using the Chisel language. This hardware Trojan features an always-on design and steals key information through internal activation. Functional simulations and scheme verifications have been conducted, and the test results show that compared to a Verilog-designed hardware Trojan, the Chisel-designed hardware Trojan chip achieves a maximum main frequency increase of 74.41MHz and a throughput increase of 25%, while only occupying 0.21% of the total code's logic utilization. This demonstrates Chisel's significant advantages and resource efficiency in hardware Trojan circuit design. Therefore, Chisel possesses higher efficiency and optimization capabilities in hardware design, making it highly valuable for research in hardware Trojans.
引用
收藏
页码:91 / 94
页数:4
相关论文
共 50 条
  • [41] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
  • [42] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [43] SRAM Hardware Trojan
    Saeidi, Roghayeh
    Garakani, Hossein Gharaee
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
  • [44] Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges
    Tehranipoor, Mohammad
    Salmani, Hassan
    Zhang, Xuehui
    Wang, Xiaoxiao
    Karri, Ramesh
    Rajendran, Jeyavijayan
    Rosenfeld, Kurt
    COMPUTER, 2011, 44 (07) : 66 - 74
  • [45] Design and Validation for FPGA Trust under Hardware Trojan Attacks
    Mal-Sarkar, Sanchita
    Karam, Robert
    Narasimhan, Seetharam
    Ghosh, Anandaroop
    Krishna, Aswin
    Bhunia, Swarup
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 186 - 198
  • [46] LOW OVERHEAD DESIGN FOR IMPROVING HARDWARE TROJAN DETECTION EFFICIENCY
    Xue, Hao
    Moody, Tyler
    Li, Shuo
    Zhang, Xiaomeng
    Ren, Saiyu
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON 2014), 2014, : 379 - 383
  • [47] A Smart Design of Hardware Trojan and Differential Fault Analysis in AES
    Wang, Xiaohan
    Wang, Tao
    Li, Xiongwei
    Zhang, Yang
    Huang, Changyang
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1548 - 1551
  • [48] Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA
    Shila, Devu Manikantan
    Venugopal, Vivek
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 719 - 724
  • [49] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [50] Towards Hardware Trojan Resilient Design of Convolutional Neural Networks
    Sun, Peiyao
    Halak, Basel
    Kazmierski, Tomasz
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 130 - 135