Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging

07/21/2021
by   Thilo Krachenfels, et al.
0

The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecting dormant HTs with small or zero-overhead triggers and payloads on these platforms is still a challenging task, as the Trojan might not get activated during the chip verification using logical testing or physical measurements. In this work, we present a novel Trojan detection approach based on a technique known from integrated circuit (IC) failure analysis, capable of detecting virtually all classes of dormant Trojans. Using laser logic state imaging (LLSI), we show how supply voltage modulations can awaken inactive Trojans, making them detectable using laser voltage imaging techniques. Therefore, our technique does not require triggering the Trojan. To support our claims, we present two case studies on 28 SRAM- and flash-based field-programmable gate arrays (FPGAs). We demonstrate how to detect with high confidence small changes in sequential and combinatorial logic as well as in the routing configuration of FPGAs in a non-invasive manner. Finally, we discuss the practical applicability of our approach on dormant analog Trojans in ASICs.

READ FULL TEXT

page 1

page 6

page 7

page 8

page 9

page 10

research
07/05/2023

A Survey Report on Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis

A major security threat to an integrated circuit (IC) design is the Hard...
research
09/18/2023

Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis

Physical attacks form one of the most severe threats against secure comp...
research
10/10/2018

Computational ghost imaging using a field-programmable gate array

Computational ghost imaging is a promising technique for single-pixel im...
research
02/21/2023

Counterfeit Chip Detection using Scattering Parameter Analysis

The increase in the number of counterfeit and recycled microelectronic c...
research
04/29/2022

Hardware Trojan Detection Using Unsupervised Deep Learning on Quantum Diamond Microscope Magnetic Field Images

This paper presents a method for hardware trojan detection in integrated...
research
05/28/2021

18.8 Gbps real-time quantum random number generator with a photonic integrated chip

Quantum random number generators (QRNGs) can produce true random numbers...
research
01/17/2023

A Review of Techniques for Ageing Detection and Monitoring on Embedded Systems

Embedded digital devices, such as Field-Programmable Gate Arrays (FPGAs)...

Please sign up or login with your details

Forgot password? Click here to reset