Hardware Trojan Insertion in Finalized Layouts: From Methodology to a Silicon Demonstration

نویسندگان

چکیده

Owning a high-end semiconductor foundry is luxury very few companies can afford. Thus, fabless design outsource integrated circuit fabrication to third parties. Within foundries, rogue elements may gain access the customer’s layout and perform malicious acts, including insertion of hardware trojan (HT). Many works focus on structure/effects HT, while have demonstrated viability their HTs in silicon. Even fewer disclose how are inserted or time required for this activity. Our work details, first time, effortlessly HT be into finalized by presenting an framework based engineering change order flow. For validation, we built ASIC prototype 65nm CMOS technology comprising four trojaned cryptocores. A side-channel each core with intent leaking cryptokey over power channel. Moreover, determined that entire attack mounted little one hour. We also show was successful all tested samples. Finally, our measurements demonstrate robustness SCT against skews manufacturing process.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

Hardware Trojan vulnerability

Many basic analog blocks and structures, which contain positive feedback loops, are vulnerable to the presence of one or more undesired stable equilibrium points. The phenomena of multiple equilibrium points is investigated with emphasis on using a temperature-domain representation to identify equilibrium points in some circuits that have a single positive feedback loop. By example, it is shown...

متن کامل

from linguistics to literature: a linguistic approach to the study of linguistic deviations in the turkish divan of shahriar

chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...

15 صفحه اول

Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability

Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...

متن کامل

Hardware Trojan Identification and Detection

The majority of techniques developed to detect hardware trojans are based on specific attributes. Further, the ad hoc approaches employed to design methods for trojan detection are largely ineffective. Hardware trojans have a number of attributes which can be used to systematically develop detection techniques. Based on this concept, a detailed examination of current trojan detection techniques...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems

سال: 2023

ISSN: ['1937-4151', '0278-0070']

DOI: https://doi.org/10.1109/tcad.2022.3223846