Hardware Trojan with Frequency Modulation

04/03/2020
by   Ash Luft, et al.
0

The use of third-party IP cores in implementing applications in FPGAs has given rise to the threat of malicious alterations through the insertion of hardware Trojans. To address this threat, it is important to predict the way hardware Trojans are built and to identify their weaknesses. This paper describes a logic family for implementing robust hardware Trojans, which can evade the two major detection methods, namely unused-circuit identification and side-channel analysis. This robustness is achieved by encoding information in frequency rather than amplitude so that the Trojan trigger circuitry's state will never stay constant during 'normal' operation. In addition, the power consumption of Trojan circuits built using the proposed logic family can be concealed with minimal design effort and supplementary hardware resources. Defense measures against hardware Trojans with frequency modulation are described.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/21/2022

High-Level Approaches to Hardware Security: A Tutorial

Designers use third-party intellectual property (IP) cores and outsource...
research
03/04/2022

Contrastive Graph Convolutional Networks for Hardware Trojan Detection in Third Party IP Cores

The availability of wide-ranging third-party intellectual property (3PIP...
research
07/05/2023

A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

A major security threat to an integrated circuit (IC) design is the Hard...
research
10/01/2019

Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

The threat of inserting hardware Trojans during the design, production, ...
research
09/18/2018

Validating the Claim - Defeating HaTCh : Building Malicious IP cores

This paper defends the design of hardware Trojan proposed in the paper "...
research
03/12/2019

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

With the globalization of the semiconductor manufacturing process, elect...
research
04/13/2018

Comments on "Defeating HaTCh: Building Malicious IP Cores"

Recently, Haider et al. introduced the first rigorous hardware Trojan de...

Please sign up or login with your details

Forgot password? Click here to reset