Hardware Trojan with Frequency Modulation

被引:0
|
作者
Luft, Ash [1 ]
Sima, Mihai [1 ]
Mcguire, Michael [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
关键词
D O I
10.1109/LASCAS51355.2021.9459170
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses. This paper describes a logic family for implementing robust hardware Trojans, which can evade the two major detection methods, namely unused-circuit identification and side-channel analysis. This robustness is achieved by encoding information in frequency rather than amplitude so that the Trojan trigger circuitry's state will never stay constant during 'normal' operation. In addition, the power consumption of Trojan circuits built using the proposed logic family can be concealed with minimal design effort and supplementary hardware resources. Defense measures against hardware Trojans with frequency modulation are described.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A Start to Fail Frequency Technique for Detecting Hardware Trojan
    Durai, Sharmila
    Kumar, Prasanna
    Ramasamy, Srinivasan
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 621 - 631
  • [2] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187
  • [3] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [4] SRAM Hardware Trojan
    Saeidi, Roghayeh
    Garakani, Hossein Gharaee
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
  • [5] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [6] Strategic hardware trojan testing with hierarchical trojan types
    2021, Institute of Electrical and Electronics Engineers Inc.
  • [7] Strategic Hardware Trojan Testing with Hierarchical Trojan Types
    Brahma, Swastik
    Nan, Satyaki
    Njilla, Laurent
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [8] Towards hardware Trojan: Problem analysis and Trojan simulation
    Department of Computer Science and Technology, Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
    Int. Conf. Inf. Eng. Comput. Sci. - Proc., ICIECS,
  • [9] Hardware Trojan detection method based on the frequency domain characteristics of power consumption
    Tang, Nan
    Zhou, Wanting
    Li, Lei
    Yang, Ji
    Li, Rui
    He, Yuanhang
    2020 13TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2020), 2020, : 410 - 413
  • [10] A Failure Physics Model for Hardware Trojan Detection Based on Frequency Spectrum Analysis
    He, Chunhua
    Hou, Bo
    Wang, Liwei
    En, Yunfei
    Xie, Shaofeng
    2015 IEEE INTERNATIONAL RELIABILITY PHYSICS SYMPOSIUM (IRPS), 2015,