Hardware Trojan with Frequency Modulation

被引:0
|
作者
Luft, Ash [1 ]
Sima, Mihai [1 ]
Mcguire, Michael [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
关键词
D O I
10.1109/LASCAS51355.2021.9459170
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses. This paper describes a logic family for implementing robust hardware Trojans, which can evade the two major detection methods, namely unused-circuit identification and side-channel analysis. This robustness is achieved by encoding information in frequency rather than amplitude so that the Trojan trigger circuitry's state will never stay constant during 'normal' operation. In addition, the power consumption of Trojan circuits built using the proposed logic family can be concealed with minimal design effort and supplementary hardware resources. Defense measures against hardware Trojans with frequency modulation are described.
引用
收藏
页数:4
相关论文
共 50 条
  • [11] A novel hardware Trojan detection method based on sweep-frequency test
    He, Chunhua
    Lei, Dengyun
    Wu, Heng
    Cheng, Lianglun
    Huang, Qinwen
    Yan, Guizhen
    ELECTRONICS LETTERS, 2022, 58 (23) : 887 - 889
  • [12] Hardware Trojan for Security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    2013 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2013, : 29 - +
  • [13] Advances in Hardware Trojan Detection
    Vaidya, Jaideep
    COMPUTER, 2019, 52 (06) : 4 - 5
  • [14] Hardware Trojan for security LSI
    Yoshikawa, M.
    Satoh, R.
    Kumaki, T.
    Digest of Technical Papers - IEEE International Conference on Consumer Electronics, 2013, : 29 - 30
  • [15] Scalable Hardware Trojan Diagnosis
    Wei, Sheng
    Potkonjak, Miodrag
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2012, 20 (06) : 1049 - 1057
  • [16] A Non-Destructive Method for Hardware Trojan Detection Based on Radio Frequency Fingerprinting
    Mi, Siya
    Zhang, Zechuan
    Zhang, Yu
    Hu, Aiqun
    ELECTRONICS, 2022, 11 (22)
  • [17] Survey of Hardware Trojan Threats and Detection
    Hayashi, Yuichi
    Kawamura, Shinichi
    PROCEEDINGS OF THE 2020 INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC EUROPE), 2020,
  • [18] Hardware Trojan in FPGA CNN Accelerator
    Ye, Jing
    Hu, Yu
    Li, Xiaowei
    2018 IEEE 27TH ASIAN TEST SYMPOSIUM (ATS), 2018, : 68 - 73
  • [19] Hardware Trojan: Threats and Emerging Solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    2009 IEEE INTERNATIONAL HIGH LEVEL DESIGN VALIDATION AND TEST WORKSHOP, 2009, : 166 - 171
  • [20] In-situ Trojan Authentication for Invalidating Hardware-Trojan Functions
    Oya, Masaru
    Shi, Youhua
    Yanagisawa, Masao
    Togawa, Nozomu
    PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN ISQED 2016, 2016, : 152 - 157