Hardware Trojan with Frequency Modulation

被引:0
|
作者
Luft, Ash [1 ]
Sima, Mihai [1 ]
Mcguire, Michael [1 ]
机构
[1] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
关键词
D O I
10.1109/LASCAS51355.2021.9459170
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses. This paper describes a logic family for implementing robust hardware Trojans, which can evade the two major detection methods, namely unused-circuit identification and side-channel analysis. This robustness is achieved by encoding information in frequency rather than amplitude so that the Trojan trigger circuitry's state will never stay constant during 'normal' operation. In addition, the power consumption of Trojan circuits built using the proposed logic family can be concealed with minimal design effort and supplementary hardware resources. Defense measures against hardware Trojans with frequency modulation are described.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Hardware Trojan Detection Based on SRC
    Sun, Chen
    Cheng, Liye
    Wang, Liwei
    Huang, Yun
    2020 35TH YOUTH ACADEMIC ANNUAL CONFERENCE OF CHINESE ASSOCIATION OF AUTOMATION (YAC), 2020, : 472 - 475
  • [32] Classification of Hardware Trojan Detection Techniques
    Moein, Samer
    Subramnian, Jayaram
    Gulliver, T. Aaron
    Gebali, Fayez
    El-Kharashi, M. Watheq
    2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 357 - 362
  • [33] Trojan Playground: A Reinforcement Learning Framework for Hardware Trojan Insertion and Detection
    Sarihi, Amin
    Patooghy, Ahmad
    Jamieson, Peter
    Badawy, Abdel-Hameed A.
    arXiv, 2023,
  • [34] Smart Hardware Trojan Detection System
    Alkhazendar, Iyad
    Zubair, Mohammed
    Qidwai, Uvais
    INTELLIGENT SYSTEMS AND APPLICATIONS, VOL 3, 2023, 544 : 791 - 806
  • [35] A Survey on Hardware Trojan Detection Techniques
    Bhasin, Shivam
    Regazzoni, Francesco
    2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2015, : 2021 - 2024
  • [36] Hardware trojan: Threats and emerging solutions
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    Proceedings - IEEE International High-Level Design Validation and Test Workshop, HLDVT, 2009, : 166 - 171
  • [37] Designer's hardware Trojan horse
    Alkabani, Yousra
    Koushanfar, Farinaz
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 82 - 83
  • [38] Towards a Hardware Trojan Detection Cycle
    Dabrowski, Adrian
    Hobel, Heidelinde
    Ullrich, Johanna
    Krombholz, Katharina
    Weippl, Edgar
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 287 - 294
  • [39] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
    Becker, Georg T.
    Lakshminarasimhan, Ashwin
    Lin, Lang
    Srivathsa, Sudheendra
    Suresh, Vikram B.
    Burelson, Wayne
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
  • [40] A method of implanting combinational hardware Trojan based on evolvable hardware
    Liu, Lijun
    Wang, Tao
    Wang, Xiaohan
    He, Tianyu
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 93