A case study in hardware Trojan design and implementation

被引:0
|
作者
Alex Baumgarten
Michael Steffen
Matthew Clausman
Joseph Zambreno
机构
[1] Iowa State University,Electrical and Computer Engineering
关键词
Hardware hacking; Trojans; Security; FPGA;
D O I
暂无
中图分类号
学科分类号
摘要
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted some of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [41] FPGA Implementation of Traffic Light Controller and its Analysis in the Presence of Hardware Trojan
    Bhardwaj, Aastha
    Chhabra, Surbhi
    Lata, Kusum
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 375 - 380
  • [42] Trojan-D2: Post-Layout Design and Detection of Stealthy Hardware Trojans - a RISC-V Case Study
    Parvin, Sajjad
    Goli, Mehran
    Torres, Frank Sill
    Drechsler, Rolf
    2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, : 683 - 689
  • [43] Tapeout of a RISC-V Crypto Chip with Hardware Trojans: A Case-Study on Trojan Design and Pre-Silicon Detectability
    Hepp, Alexander
    Sigl, Georg
    PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 213 - 220
  • [44] Strategic hardware trojan testing with hierarchical trojan types
    2021, Institute of Electrical and Electronics Engineers Inc.
  • [45] Strategic Hardware Trojan Testing with Hierarchical Trojan Types
    Brahma, Swastik
    Nan, Satyaki
    Njilla, Laurent
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [46] The Design and Implementation of the Trojan Horse Based on Kernel Hacking
    Feng Wanli
    Zhou Hong
    Yu Changhui
    ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2891 - 2894
  • [47] Towards hardware Trojan: Problem analysis and Trojan simulation
    Department of Computer Science and Technology, Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
    Int. Conf. Inf. Eng. Comput. Sci. - Proc., ICIECS,
  • [48] The design and implementation of the Trojan Horse based on kernel hacking
    Faculty of Computer Engineering, Huaiyin Institute of Technology, Huai'an, China
    Appl. Mech. Mater., 1660, (2891-2894):
  • [49] Hardware Trojan Detection Method Against Balanced Controllability Trigger Design
    Hsu, Wei-Ting
    Lo, Pei-Yu
    Chen, Chi-Wei
    Tien, Chin-Wei
    Kuo, Sy-Yen
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (02) : 178 - 181
  • [50] A method of hardware-trojan detection using design verification techniques
    Graduate school of Engineering, Oita University, 700 Dannoharu, Oita
    870-1192, Japan
    不详
    870-1192, Japan
    Adv. Intell. Sys. Comput., (978-987):