DocumentCode :
1786999
Title :
Advanced techniques for designing stealthy hardware trojans
Author :
Tsoutsos, Nektarios Georgios ; Konstantinou, Charalambos ; Maniatakos, Michail
Author_Institution :
Polytech. Sch. of Eng., NYU, New York, NY, USA
fYear :
2014
fDate :
1-5 June 2014
Firstpage :
1
Lastpage :
4
Abstract :
The necessity of detecting malicious modifications in hardware designs has led to the development of various detection tools. Trojan detection approaches aim to reveal compromised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verification, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specifications of the corresponding original models. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.
Keywords :
cryptography; invasive software; probability; random number generation; RTL; Trojan detection techniques; design for testing; encryption algorithms; functional specifications; malicious modifications detection; monitoring architectures; pseudorandom number generator; side-channel dynamic signal analysis; static code analysis; stealthy hardware Trojan design; verification architectures; Algorithm design and analysis; Ciphers; Clocks; Encryption; Hardware; Trojan horses; backdoors; hardware; intellectual property; security; trojans;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1145/2593069.2596668
Filename :
6881501
Link To Document :
بازگشت