Red Team: Design of Intelligent Hardware Trojans with Known Defense Schemes

被引:0
|
作者
Zhang, Xuehui [1 ]
Tuzzio, Nicholas [1 ]
Tehranipoor, Mohammad [1 ]
机构
[1] Univ Connecticut, ECE Dept, Storrs, CT 06269 USA
来源
2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD) | 2011年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the past few years, several Trojan detection approaches have been developed to prevent the damages caused by Trojans, making Trojan insertion more and more difficult. As part of the Embedded Systems Challenge (ESC), we were given two different designs with two different Trojan detection methods, and we tried to design Trojans which could avoid detection. We developed Trojans that remain undetectable by the delay finger printing and ring-oscillator monitoring Trojan detection methods embedded into these benchmarks. Experimental results on a Xilinx FPGA demonstrate that most of our hardware Trojans were undetected using the inserted detection mechanisms.
引用
收藏
页码:309 / 312
页数:4
相关论文
共 50 条
  • [11] Advancing the State-of-the-Art in Hardware Trojans Design
    Haider, Syed Kamran
    Jin, Chenglu
    van Dijk, Marten
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 823 - 826
  • [12] A Red Team Blue Team approach Towards a Secure Processor Design With Hardware Shadow Stack
    Bresch, Cyril
    Michelet, Adrien
    Amato, Laurent
    Meyer, Thomas
    Hely, David
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 57 - 62
  • [13] Logic and Reduction Operation based Hardware Trojans in Digital Design
    Das, Mayukhmali
    Dutta, Sounak
    Chatterjee, Sayan
    2022 19TH INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2022, : 342 - 343
  • [14] Logic and Reduction Operation based Hardware Trojans in Digital Design
    Das, Mayukhmali
    Dutta, Sounak
    Chatterjee, Sayan
    Proceedings - International SoC Design Conference 2022, ISOCC 2022, 2022, : 342 - 343
  • [15] Blue team red team approach to hardware trust assessment
    Rajendran, Jeyavijayan
    Jyothi, Vinayaka
    Karri, Ramesh
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 285 - 288
  • [16] A hardware Trojans design using the correlation analysis of electromagnetic emanation
    Zhang, Peng
    Zou, Cheng
    Deng, Gaoming
    Chen, Kaiyan
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (10): : 22 - 25
  • [17] Intelligent, Automated Red Team Emulation
    Applebaum, Andy
    Miller, Doug
    Strom, Blake
    Korban, Chris
    Wolf, Ross
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 363 - 373
  • [18] Intelligent Hardware Somatosensory Design
    Fu, Jiuqiang
    PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 331 - 334
  • [19] Design of Hardware Trojans and its Impact on CPS Systems: A Comprehensive Survey
    Dhavlle, Abhijitt
    Hassan, Rakibul
    Mittapalli, Manideep
    Dinakarrao, Sai Manoj Pudukotai
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [20] An intelligent recommendation algorithm for red team strategy in edge computing powered massive Cyber Defense Exercise
    Jang, Moonsu
    Kim, Donghyun
    Seo, Daehee
    Ju, Yongmin
    Ryu, Seungho
    Yoon, Hyunsoo
    COMPUTER COMMUNICATIONS, 2021, 165 : 141 - 148