DocumentCode
57524
Title
Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream
Author
Chakraborty, R.S. ; Saha, I. ; Palchaudhuri, A. ; Naik, G.K.
Author_Institution
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Kharagpur, Kharagpur, India
Volume
30
Issue
2
fYear
2013
fDate
Apr-13
Firstpage
45
Lastpage
54
Abstract
In this work, we have demonstrated the feasibility of hardware Trojan insertion in circuits mapped on FPGAs by direct modification of the FPGA configuration bitstream. The main challenge of this attack proved to be the lack of sufficient information in the public domain about the bitstream format and the internal architecture and configurability of the FPGA. Nevertheless, we were able to show that under certain constraints on the functionality, size and placement of the Trojan on the FPGA, it is possible to modify the configuration bitstream by a software program to insert a hardware Trojan in the design. The main strength of the attack lies in the fact that since the modification is at the configuration bitstream level, it bypasses all predeployment design validation mechanisms. We also propose some techniques to prevent the demonstrated attack. We hope that this work will raise awareness among FPGA users about the potency of the threat posed by this relatively simple attack and its improved variants. .
Keywords
field programmable gate arrays; invasive software; FPGA configuration bitstream; direct modification; hardware trojan insertion; internal architecture; predeployment design validation mechanism; software program; Computer architecture; Design automation; Field programmable gate arrays; Hardware; Integrated circuits; Oscillators; Trojan horses; CRC; Configuration bitstream; FPGA; Hardware Trojan; Ring-oscillator Trojan;
fLanguage
English
Journal_Title
Design & Test, IEEE
Publisher
ieee
ISSN
2168-2356
Type
jour
DOI
10.1109/MDT.2013.2247460
Filename
6461919
Link To Document