Red Team: Design of Intelligent Hardware Trojans with Known Defense Schemes

被引:0
|
作者
Zhang, Xuehui [1 ]
Tuzzio, Nicholas [1 ]
Tehranipoor, Mohammad [1 ]
机构
[1] Univ Connecticut, ECE Dept, Storrs, CT 06269 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, several Trojan detection approaches have been developed to prevent the damages caused by Trojans, making Trojan insertion more and more difficult. As part of the Embedded Systems Challenge (ESC), we were given two different designs with two different Trojan detection methods, and we tried to design Trojans which could avoid detection. We developed Trojans that remain undetectable by the delay finger printing and ring-oscillator monitoring Trojan detection methods embedded into these benchmarks. Experimental results on a Xilinx FPGA demonstrate that most of our hardware Trojans were undetected using the inserted detection mechanisms.
引用
收藏
页码:309 / 312
页数:4
相关论文
共 50 条
  • [1] Red team: Design of intelligent hardware trojans with known defense schemes
    ECE Department, University of Connecticut, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (309-312):
  • [2] Hardware Trojans in Quantum Circuits, Their Impacts, and Defense
    Roy, Rupshali
    Das, Subrata
    Ghosh, Swaroop
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [3] Hardware Trojans: The Defense and Attack of Integrated Circuits
    Reece, Trey
    Robinson, William H.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
  • [4] Hardware Trojans: The defense and attack of integrated circuits
    Vanderbilt University, EECS Department, Nashville, TN, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (293-296):
  • [5] The Novel Design Method of Hardware Trojans
    Wei, Zhengyou
    Feng, Wenfeng
    Li, Lei
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 173 - 176
  • [6] Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip
    Bobda, Christophe
    Mead, Joshua
    Whitaker, Taylor J. L.
    Kamhoua, Charles
    Kwiat, Kevin
    APPLIED RECONFIGURABLE COMPUTING, 2017, 10216 : 47 - 59
  • [7] Design and analysis of hardware Trojans in approximate circuits
    Dou, Yuqin
    Wang, Chenghua
    Gu, Chongyan
    O'Neill, Maire
    Liu, Weiqiang
    ELECTRONICS LETTERS, 2022, 58 (05) : 197 - 199
  • [8] SWAN: Mitigating Hardware Trojans with Design Ambiguity
    Linscott, Timothy
    Ehrett, Pete
    Bertacco, Valeria
    Austin, Todd
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [9] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhal
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 682 - 687
  • [10] Design of AI Trojans for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhat
    Proceedings of the 2022 Design, Automation and Test in Europe Conference and Exhibition, DATE 2022, 2022, : 682 - 687