Insights into the Mind of a Trojan Designer The Challenge to Integrate a Trojan into the Bitstream

被引:18
|
作者
Ender, Maik [1 ]
Swierczynski, Pawel [2 ]
Wallat, Sebastian [3 ]
Wilhelm, Matthias [1 ]
Knopp, Paul Martin [1 ]
Paar, Christof [1 ]
机构
[1] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[2] ESMT, Digital Soc Inst, Berlin, Germany
[3] Univ Massachusetts, Amherst, MA 01003 USA
基金
欧洲研究理事会;
关键词
D O I
10.1145/3287624.3288742
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through alterations of the bitstream. First, we present an improved methodology for bitstream file format reversing. Second, we introduce a novel idea for Trojan insertion.
引用
收藏
页码:112 / 119
页数:8
相关论文
共 17 条
  • [1] Trojan Detection in Large Language Models: Insights from The Trojan Detection Challenge
    Maloyan, Narek
    Verma, Ekansh
    Nutfullin, Bulat
    Ashinov, Bislan
    arXiv,
  • [2] The Trojan Detection Challenge
    Mazeika, Mantas
    Hendrycks, Dan
    Li, Huichen
    Xu, Xiaojun
    Hough, Sidney
    Zou, Andy
    Rajabi, Arezoo
    Yao, Qi
    Wang, Zihao
    Tian, Jian
    Tang, Yao
    Tang, Di
    Smirnov, Roman
    Pleskov, Pavel
    Benkovich, Nikita
    Song, Dawn
    Poovendran, Radha
    Li, Bo
    Forsyth, David
    Proceedings of Machine Learning Research, 2023, 220 : 279 - 291
  • [3] Designer's hardware Trojan horse
    Alkabani, Yousra
    Koushanfar, Farinaz
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 82 - 83
  • [4] An open mind is a Trojan horse?
    Svensson, EI
    SCIENCE, 2005, 308 (5724) : 951 - 951
  • [5] A Bitstream Reverse Engineering Tool for FPGA Hardware Trojan Detection
    Yoon, Junghwan
    Seo, Yezee
    Jang, Jaedong
    Cho, Mingi
    Kim, JinGoog
    Kim, HyeonSook
    Kwon, Taekyoung
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2318 - 2320
  • [6] Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream
    Chakraborty, Rajat Subhra
    Saha, Indrasish
    Palchaudhuri, Ayan
    Naik, Gowtham Kumar
    IEEE DESIGN & TEST, 2013, 30 (02) : 45 - 54
  • [7] IS THE NEA CHALLENGE GRANT A TROJAN HORSE
    DAVIDSON, JK
    ART IN AMERICA, 1979, 67 (03): : 9 - &
  • [8] Is your FPGA bitstream Hardware Trojan-free? Machine learning can provide an answer
    Palumbo, Alessandro
    Cassano, Luca
    Luzzi, Bruno
    Hernandez, Jose Alberto
    Reviriego, Pedro
    Bianchi, Giuseppe
    Ottavi, Marco
    JOURNAL OF SYSTEMS ARCHITECTURE, 2022, 128
  • [9] Implementing Hardware Trojans: Experiences from a Hardware Trojan Challenge
    Becker, Georg T.
    Lakshminarasimhan, Ashwin
    Lin, Lang
    Srivathsa, Sudheendra
    Suresh, Vikram B.
    Burelson, Wayne
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 301 - 304
  • [10] Gallium and gallium compounds: New insights into the "Trojan horse" strategy in medical applications
    Sun, Wenyue
    Qi, Manlin
    Cheng, Shi
    Li, Chunyan
    Dong, Biao
    Wang, Lin
    MATERIALS & DESIGN, 2023, 227