Title :
Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream
Author :
Chakraborty, R.S. ; Saha, I. ; Palchaudhuri, A. ; Naik, G.K.
Author_Institution :
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Kharagpur, Kharagpur, India
Abstract :
In this work, we have demonstrated the feasibility of hardware Trojan insertion in circuits mapped on FPGAs by direct modification of the FPGA configuration bitstream. The main challenge of this attack proved to be the lack of sufficient information in the public domain about the bitstream format and the internal architecture and configurability of the FPGA. Nevertheless, we were able to show that under certain constraints on the functionality, size and placement of the Trojan on the FPGA, it is possible to modify the configuration bitstream by a software program to insert a hardware Trojan in the design. The main strength of the attack lies in the fact that since the modification is at the configuration bitstream level, it bypasses all predeployment design validation mechanisms. We also propose some techniques to prevent the demonstrated attack. We hope that this work will raise awareness among FPGA users about the potency of the threat posed by this relatively simple attack and its improved variants. .
Keywords :
field programmable gate arrays; invasive software; FPGA configuration bitstream; direct modification; hardware trojan insertion; internal architecture; predeployment design validation mechanism; software program; Computer architecture; Design automation; Field programmable gate arrays; Hardware; Integrated circuits; Oscillators; Trojan horses; CRC; Configuration bitstream; FPGA; Hardware Trojan; Ring-oscillator Trojan;
Journal_Title :
Design & Test, IEEE
DOI :
10.1109/MDT.2013.2247460