Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

09/22/2019
by   Samaneh Ghandali, et al.
0

Hardware Trojans have drawn the attention of academia, industry and government agencies. Effective detection mechanisms and countermeasures against such malicious designs can only be developed when there is a deep understanding of how hardware Trojans can be built in practice, in particular Trojans specifically designed to avoid detection. In this work, we present a mechanism to introduce an extremely stealthy hardware Trojan into cryptographic primitives equipped with provably-secure first-order side-channel countermeasures. Once the Trojan is triggered, the malicious design exhibits exploitable side-channel leakage, leading to successful key recovery attacks. Generally, such a Trojan requires neither addition nor removal of any logic which makes it extremely hard to detect. On ASICs, it can be inserted by subtle manipulations at the sub-transistor level and on FPGAs by changing the routing of particular signals, leading to zero logic overhead. The underlying concept is based on modifying a securely-masked hardware implementation in such a way that running the device at a particular clock frequency violates one of its essential properties, leading to exploitable leakage. We apply our technique to a Threshold Implementation of the PRESENT block cipher realized in two different CMOS technologies, and show that triggering the Trojan makes the ASIC prototypes vulnerable.

READ FULL TEXT

page 1

page 8

page 13

page 15

research
08/07/2022

HWGN2: Side-channel Protected Neural Networks through Secure and Private Function Evaluation

Recent work has highlighted the risks of intellectual property (IP) pira...
research
07/04/2021

Real-time Detection and Adaptive Mitigation of Power-based Side-Channel Leakage in SoC

Power-based side-channel is a serious security threat to the System on C...
research
12/21/2019

Socio-network Analysis of RTL Designs for Hardware Trojan Localization

The recent surge in hardware security is significant due to offshoring t...
research
10/11/2020

SIGNED: A Challenge-Response Based Interrogation Scheme for Simultaneous Watermarking and Trojan Detection

The emergence of distributed manufacturing ecosystems for electronic har...
research
09/22/2019

Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs

True random number generators (TRNGs) are essential components of crypto...
research
08/07/2022

An Enclave-based TEE for SE-in-SoC in RISC-V Industry

Secure Element (SE) in SoC sees an increasing adoption in industry. Many...
research
06/12/2023

Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning

Hardware-based cryptographic implementations utilize countermeasures to ...

Please sign up or login with your details

Forgot password? Click here to reset