Stealthy Dopant-Level Hardware Trojans

نویسندگان

  • Tiit Pikma
  • Dominique Unruh
چکیده

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel information to a known trojan-free golden chip, and just plain functional testing. This seminar paper, based on [1] by Becker, Regazzoni, Paar, and Burleson, describes a method of implementing hardware trojans on the dopant-level without being detectable by the aforementioned methods. The trojans circuits look physically the same as a trojan-free one, with modi cations in only the physical composition of the materials used. The attack is demonstrated on two casestudies: reducing the quality of random numbers generated by Intel's Ivy Bridge processors random number generator, and introducing a power side-channel to an AES SBox implemented in side-channel resistant logic. To understand the operation of transistors and how these dopant-level hardware trojans work, it is rst necessary to have a basic understanding of semiconductor doping this will be brie y introduced in Section 2. Section 3 explains the construction and operation of most transistors used today and how logic gates are built from them. Section 4 describes the dopant-level attack on a simple component and Section 5 gives an overview of the two case studies to see practical applicability of the attack. The last section summarizes the results and gives conclusions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealthy Dopant-Level Hardware Trojans

In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...

متن کامل

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks

Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how particularly stealthy Trojans can be i...

متن کامل

A Practical Test Patterns Generation Technique for Hardware Trojan Detection

Due to the globalization of the integrated circuit manufacturing industry, hardware Trojans constitutes an increasingly probable threat to both military and commercial applications. The Trojans being stealthy in nature, the Trojan hardware is hard to be triggered under random patterns. In this paper, we propose practical test patterns generation technique based on rare logic conditions at inter...

متن کامل

Two Countermeasures Against Hardware Trojans Exploiting Non-Zero Aliasing Probability of BIST

The threat of hardware Trojans has been widely recognized by academia, industry, and government agencies. A Trojan can compromise security of a system in spite of cryptographic protection. The damage caused by a Trojan may not be limited to a business or reputation, but could have a severe impact on public safety, national economy, or national security. An extremely stealthy way of implementing...

متن کامل

Hardwar Trojan classification and implementation and offer a new detection approach

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013