Title :
Multi-level attacks: An emerging security concern for cryptographic hardware
Author :
Ali, Sk Subidh ; Chakraborty, Rajat Subhra ; Mukhopadhyay, Debdeep ; Bhunia, Swarup
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol., Kharagpur, India
Abstract :
Modern hardware and software implementations of cryptographic algorithms are subject to multiple sophisticated attacks, such as differential power analysis (DPA) and fault-based attacks. In addition, modern integrated circuit (IC) design and manufacturing follows a horizontal business model where different third-party vendors provide hardware, software and manufacturing services, thus making it difficult to ensure the trustworthiness of the entire process. Such business practices make the designs vulnerable to hard-to-detect malicious modifications by an adversary, termed as “Hardware Trojans”. In this paper, we show that malicious nexus between multiple parties at different stages of the design, manufacturing and deployment makes the attacks on cryptographic hardware more potent. We describe the general model of such an attack, which we refer to as Multi-level Attack, and provide an example of it on the hardware implementation of the Advanced Encryption Standard (AES) algorithm, where a hardware Trojan is embedded in the design. We then analytically show that the resultant attack poses a significantly stronger threat than that from a Trojan attack by a single adversary. We validate our theoretical analysis using power simulation results as well as hardware measurement and emulation on a FPGA platform.
Keywords :
cryptography; field programmable gate arrays; integrated circuit design; integrated circuit manufacture; invasive software; FPGA platform; advanced encryption standard; cryptographic hardware; differential power analysis; fault-based attacks; hardware implementations; hardware measurement; hardware trojans; horizontal business model; integrated circuit design; integrated circuit manufacturing; malicious nexus; multilevel attacks; security concern; software implementations; third-party vendors; Circuit faults; Encryption; Hardware; Integrated circuits; Manufacturing; Trojan horses;
Conference_Titel :
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011
Conference_Location :
Grenoble
Print_ISBN :
978-1-61284-208-0
DOI :
10.1109/DATE.2011.5763307