The Research of Hiding Technology of Hardware Trojan in Chip

Article Preview

Abstract:

To solve the hiding problem of hardware Trojan in chip, we first analyzed the self-protection technology of malicious software, and then proposed a trigger mechanism that base on timing finite state machine (TFSM), energy flow, and distributed Trojan design method. As for the trigger mechanism that based on TFSM, one must enter the right pattern on the correct time to activate the Trojan. The mechanism based on energy flow can make the hardware Trojan keep hiding in the RTL code logical analysis. The distributed hardware Trojan design is to divide a complete Trojan into several components, and the Trojan will keep silent if all the components are not in order. The design methods of hardware Trojan have been verified in our self-made hardware threat simulate platform, it can reduce the rate of been detected out, and the possibility of been triggered out by random operations.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

876-881

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] King S T, Tucek J, Cozzie A, et al. Designing and implementing malicious hardware[C]. Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'2008). USENIX Association Berkeley, CA, USA, (2008).

Google Scholar

[2] Das A., Memik G, Zambreno J, et al. Detecting/preventing information leakage on the memory bus due to malicious hardware[C]. Proceedings of the Conference on Design, Automation and Test in Europe (DATE'2010), New York, NY: ACM, 2010, pp.861-866.

DOI: 10.1109/date.2010.5456930

Google Scholar

[3] Adamov A, Saprykin A, Melnik D. The Problem of Hardware Trojans Detection in System-on-Chip[C]. Proceedings of CAD Systems in Microelectronics (CADSM'2009), Polyana-Svalyava, pp.24-28.

Google Scholar

[4] Di J, Smith S C. A Hardware Threat Modeling Concept for Trustable Integrated Circuits, to appear in IEEE Region 5 Technical Conference, April, (2007).

DOI: 10.1109/tpsd.2007.4380353

Google Scholar

[5] Jin Y, Makris Y, Hardware Trojan Detection Using Path Delay Fingerprint, Proceeding of Workshop on Hardware-Oriented Security and Trust 2008, pp.62-67.

DOI: 10.1109/hst.2008.4559049

Google Scholar

[6] Wang X, Salmani H, Tehranipoor M, Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis, Proceeding of IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems (DFTVS'08), 2008, p.87.

DOI: 10.1109/dft.2008.61

Google Scholar

[7] Chen Z, Guo X, Nagesh R, Reddy A, Hardware Trojan Designs on BASYS FPGA Board, Proceeding of Embedded System Challenge Contest in Cyber Security Awareness Week (CSAW08), (2008).

Google Scholar