A case study in hardware Trojan design and implementation

被引:0
|
作者
Alex Baumgarten
Michael Steffen
Matthew Clausman
Joseph Zambreno
机构
[1] Iowa State University,Electrical and Computer Engineering
关键词
Hardware hacking; Trojans; Security; FPGA;
D O I
暂无
中图分类号
学科分类号
摘要
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted some of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [31] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [32] SRAM Hardware Trojan
    Saeidi, Roghayeh
    Garakani, Hossein Gharaee
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
  • [33] Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges
    Tehranipoor, Mohammad
    Salmani, Hassan
    Zhang, Xuehui
    Wang, Xiaoxiao
    Karri, Ramesh
    Rajendran, Jeyavijayan
    Rosenfeld, Kurt
    COMPUTER, 2011, 44 (07) : 66 - 74
  • [34] Design and Validation for FPGA Trust under Hardware Trojan Attacks
    Mal-Sarkar, Sanchita
    Karam, Robert
    Narasimhan, Seetharam
    Ghosh, Anandaroop
    Krishna, Aswin
    Bhunia, Swarup
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 186 - 198
  • [35] LOW OVERHEAD DESIGN FOR IMPROVING HARDWARE TROJAN DETECTION EFFICIENCY
    Xue, Hao
    Moody, Tyler
    Li, Shuo
    Zhang, Xiaomeng
    Ren, Saiyu
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON 2014), 2014, : 379 - 383
  • [36] A Smart Design of Hardware Trojan and Differential Fault Analysis in AES
    Wang, Xiaohan
    Wang, Tao
    Li, Xiongwei
    Zhang, Yang
    Huang, Changyang
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 1548 - 1551
  • [37] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [38] Towards Hardware Trojan Resilient Design of Convolutional Neural Networks
    Sun, Peiyao
    Halak, Basel
    Kazmierski, Tomasz
    2022 IEEE 35TH INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (IEEE SOCC 2022), 2022, : 130 - 135
  • [39] Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
    Almeida, Felipe
    Imran, Malik
    Raik, Jaan
    Pagliarini, Samuel
    IEEE ACCESS, 2022, 10 : 44827 - 44839
  • [40] FPGA Based Implementation of a Floating Point Multiplier and its Hardware Trojan Models
    Nikhila, S.
    Yamuna, B.
    Balasubramanian, Karthi
    Mishra, Deepak
    2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,