A case study in hardware Trojan design and implementation

被引:0
|
作者
Alex Baumgarten
Michael Steffen
Matthew Clausman
Joseph Zambreno
机构
[1] Iowa State University,Electrical and Computer Engineering
关键词
Hardware hacking; Trojans; Security; FPGA;
D O I
暂无
中图分类号
学科分类号
摘要
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted some of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [21] A stealthy Hardware Trojan design and corresponding detection method
    Su, Yu
    Shen, Haihua
    Lu, Renjie
    Ye, Yunying
    2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [22] A New Design of Hardware Trojan Based on Path Delay
    Sun, Hai-lin
    Li, Lei
    Zhou, Wan-ting
    INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY (ICMEIT 2018), 2018, : 419 - 423
  • [23] SRAM Security and Vulnerability To Hardware Trojan: Design Considerations
    Saeidi, Roghayeh
    Nabavi, Morteza
    Savaria, Yvon
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 722 - 725
  • [24] Design and LSI Prototyping of Security Module with Hardware Trojan
    Yoshikawa, Masaya
    Tsukadaira, Takuya
    Kumaki, Takeshi
    2015 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2015, : 426 - 427
  • [25] A Hardware Trojan Detection Method Design Based on TensorFlow
    Wu, Wenzhi
    Wei, Ying
    Ye, Ruizhe
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 11910 LNCS : 244 - 252
  • [26] Hardware Trojan Design and Detection in Asynchronous NCL Circuits
    Ponugoti, Kushal K.
    Srinivasan, Sudarshan K.
    Smith, Scott C.
    2020 27TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS (ICECS), 2020,
  • [27] New Design Strategy for Improving Hardware Trojan Detection and Reducing Trojan Activation Time
    Salmani, Hassan
    Tehranipoor, Mohammad
    Plusquellic, Jim
    2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, : 66 - +
  • [28] Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAs
    Dofe, Jaya
    Danesh, Wafi
    More, Vaishnavi
    Chaudhari, Aaditya
    CRYPTOGRAPHY, 2024, 8 (03)
  • [29] An Improved AES Hardware Trojan Benchmark to Validate Trojan Detection Schemes in an ASIC Design Flow
    Kumar, Sudeendra K.
    Chanamala, Rakesh
    Sahoo, Sauvagya Ranjan
    Mahapatra, K. K.
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [30] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187