Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








442 Hits in 3.7 sec

Benchmarking of Hardware Trojans and Maliciously Affected Circuits

Bicky Shakya, Tony He, Hassan Salmani, Domenic Forte, Swarup Bhunia, Mark Tehranipoor
2017 Journal of Hardware and Systems Security  
To this end, we have developed a suite of Trojans and 'trust benchmarks' (i.e., benchmark circuits with a hardware Trojan inserted in them) that can be used by researchers in the community to compare and  ...  In this paper, we present a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create these trust benchmarks.  ...  Vulnerability Analysis at the Layout Level In addition to performing vulnerability analysis at the netlist level, we have also implemented a unique flow to identify Trojan-insertion prone areas in a circuit  ... 
doi:10.1007/s41635-017-0001-6 dblp:journals/jhss/ShakyaHSFBT17 fatcat:ljfyrhk3yfcybdjybqg7et7gmq

On design vulnerability analysis and trust benchmarks development

Hassan Salmani, Mohammad Tehranipoor, Ramesh Karri
2013 2013 IEEE 31st International Conference on Computer Design (ICCD)  
We have developed a vulnerability analysis flow.  ...  The flow determines hardto-detect areas in a circuit that would most probably be used for Trojan implementation to ensure a Trojan goes undetected during production test and extensive functional test analysis  ...  We propose a design vulnerability analysis flow that determines which parts of a circuit are more susceptible to Trojan insertion.  ... 
doi:10.1109/iccd.2013.6657085 dblp:conf/iccd/SalmaniTK13 fatcat:aqt6j3ltebhxtgdscepvhxx52y

Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis

Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic
2008 2008 IEEE International Symposium on Defect and Fault Tolerance of VLSI Systems  
In this paper, we propose a current integration methodology to observe Trojan activity in the circuit and a localized current analysis approach to isolate the Trojan.  ...  This paper addresses a new threat to the security of integrated circuits (ICs).  ...  We have generated the layout of the circuit and inserted the Trojan circuit in a dead space in the layout and connected the clock to the Trojan.  ... 
doi:10.1109/dft.2008.61 dblp:conf/dft/WangSTP08 fatcat:beoionkftjaiplqye2urpri35e

ICAS: an Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans

Timothy Trippel, Kang G. Shin, Kevin B. Bush, Matthew Hicks
2020 2020 IEEE Symposium on Security and Privacy (SP)  
ICAS takes a set of metrics that encode the challenge of inserting a hardware Trojan into an IC layout, a set of attacks that the defender cares about, and a completed IC layout and reports the number  ...  To demonstrate ICAS' ability to reveal defensive gaps, we analyze over 60 layouts of three real-world hardware designs (a processor, AES and DSP accelerators), protected with existing defenses.  ...  ACKNOWLEDGMENT We thank the anonymous reviewers, Ted Lyszczarz, Brian Tyrrell, and other members of the MIT Lincoln Laboratory community, for their thoughtful feedback that enhanced the quality of our  ... 
doi:10.1109/sp40000.2020.00083 dblp:conf/sp/TrippelSBH20 fatcat:4ny2her5uvdhxkckeywppqet3i

Detecting malicious inclusions in secure hardware: Challenges and solutions

Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquellic
2008 2008 IEEE International Workshop on Hardware-Oriented Security and Trust  
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems.  ...  We refer to such malicious alternations and inclusions as Hardware Trojans.  ...  Below, we provide a list of applications that could potentially be targets for adversary to insert hardware Trojans.  ... 
doi:10.1109/hst.2008.4559039 dblp:conf/host/WangTP08 fatcat:7h7dsbjfgfcx3a7ssl3rrfdv7u

Ten years of hardware Trojans: a survey from the attacker's perspective

Mingfu Xue, Chongyan Gu, Weiqiang Liu, Shichao Yu, Máire O'Neill
2020 IET Computers & Digital Techniques  
In this paper, we attempt to make a review of the hardware Trojan design and implementations in the last decade and also provide an outlook.  ...  In the last decade, hardware Trojan has emerged as a serious concern in integrated circuit (IC) industry. As such, hardware Trojan detection techniques have been studied extensively.  ...  Universal Trojan and automatic Trojan insertion VS automatic Trojan (IC vulnerability) analysis tools Most HTs reported to date are manually inserted into a specific target circuit (119) .  ... 
doi:10.1049/iet-cdt.2020.0041 fatcat:7ugjmpblfjdippalfhovzmgaky

Security of Microfluidic Biochip

Huili Chen, Seetal Potluri, Farinaz Koushanfar
2020 ACM Transactions on Design Automation of Electronic Systems  
We propose a systematic framework for applying Reverse Engineering (RE) attacks and Hardware Trojan (HT) attacks on MFBs as well as for practical countermeasures against the proposed attacks.  ...  We evaluate the attacks and defense on various benchmarks where experimental results prove the effectiveness of our methods. Security metrics are defined to quantify the vulnerability of MFBs.  ...  In Section 5.3, we demonstrate how to insert Trojans into the integrated logic circuit of DMFBs and reveal the vulnerabilities of DMFBs to Trojan attacks in FSM level.  ... 
doi:10.1145/3382127 fatcat:if3lf3sdkjf73gwsbcng7rxayi

Integrity at Every Link: A Roadmap to Trustworthy Hardware Supply Chains

Lennart M. Reimann, Dominik Sisejkovic, Rainer Leupers
2024 Zenodo  
The involvement of numerous untrusted parties in the process opens the door to vulnerabilities.  ...  Ensuring its integrity throughout the entirety of the hardware supply chain poses a significant challenge in establishing a secure computer system.  ...  Moreover, approaches like code coverage analysis, structural analysis, and functional tests are employed to identify hardware Trojans [19][20] .  ... 
doi:10.5281/zenodo.10875049 fatcat:7dnc3zecz5h4lmy6ndc67uwpzy

Hardware Security in IoT Devices with Emphasis on Hardware Trojans

Simranjeet Sidhu, Bassam J. Mohd, Thaier Hayajneh
2019 Journal of Sensor and Actuator Networks  
A deeper understanding of hardware Trojans (HTs) and protection against them is of utmost importance right now as they are the prime threat to the hardware.  ...  This paper emphasizes the need for a secure hardware-level foundation for security of these devices, as depending on software security alone is not adequate enough.  ...  B.J.M. was responsible for guiding the hardware security part, helped in the security analysis and writing the paper.  ... 
doi:10.3390/jsan8030042 fatcat:zuzw6sf2hzgdfiz65p2joz2g6a

A layout-aware approach for improving localized switching to detect hardware Trojans in integrated circuits

Hassan Salmani, Mohammad Tehranipoor, Jim Plusquellic
2010 2010 IEEE International Workshop on Information Forensics and Security  
The proposed method is aimed at improving the efficiency of power-based side-channel signal analysis techniques for detecting hardware Trojans.  ...  This helps magnify the Trojan's contribution to the total circuit transient power by increasing Trojan-to-circuit switching activity (TCA) and power consumption.  ...  Although approaches such as circuit delay analysis, full activation of Trojans, randomization-based probabilistic analysis, and extracting design characteristics are presented for hardware Trojan detection  ... 
doi:10.1109/wifs.2010.5711438 dblp:conf/wifs/SalmaniTP10 fatcat:u6i574rtyrgkfbjns4rwwh2hj4

A Survey of Hardware Trojan Detection, Diagnosis and Prevention

He Li, Qiang Liu, Jiliang Zhang, Yongqiang Lyu
2015 2015 14th International Conference on Computer-Aided Design and Computer Graphics (CAD/Graphics)  
Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive data or modify original functionality, which may lead to huge economic losses  ...  Therefore, it is very important to perform hardware Trojan detection and diagnosis, find potential safety hazards and apply protection techniques in the whole IC design cycle, in order to enhance the security  ...  HARDWARE TROJAN THREAT AND VULNERABILITIES A.  ... 
doi:10.1109/cadgraphics.2015.41 dblp:conf/cadgraphics/LiLZL15 fatcat:ktownmb45rdepnwoqhhky7b3ha

Hardware Trojans

K. Xiao, D. Forte, Y. Jin, R. Karri, S. Bhunia, M. Tehranipoor
2016 ACM Transactions on Design Automation of Electronic Systems  
We also identify the most critical lessons for those new to the field and suggest a roadmap for future hardware Trojan research.  ...  A comprehensive adversarial model taxonomy is introduced and used to examine the current state of the art.  ...  Moreover, the hardware Trojan vulnerability analysis can be extended to the system and layout level.  ... 
doi:10.1145/2906147 fatcat:24ffmzsrnbgkrkjq3ooztg4fbe

Detection of hardware Trojan in SEA using path delay

Prasanna Kumar, Ramasamy Srinivasan
2014 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science  
The comparison of path delays makes small Trojan circuits significant from a delay point of view.  ...  We inserted Trojan at different levels in the ASIC design flow of SEA crypto and most importantly we focused on Gate level and layout level Trojan insertions.  ...  Compare to Gate-level the attacker has more possibility to insert Trojan at Layout-level. Due to the advancement of reverse engineering process layout of a chip can be acquired from GDSII.  ... 
doi:10.1109/sceecs.2014.6804444 fatcat:4qlmdmuuqre2rhm74frpszdpga

An Effective and Sensitive Scan Segmentation Technique for Detecting Hardware Trojan

Fakir Sharif HOSSAIN, Tomokazu YONEDA, Michiko INOUE
2017 IEICE transactions on information and systems  
Due to outsourcing of numerous stages of the IC manufacturing process to different foundries, the security risk, such as hardware Trojan becomes a potential threat.  ...  In this paper, we present a layout aware localized hardware Trojan detection method that magnifies the detection sensitivity for small Trojan in power-based side-channel analysis.  ...  This option enables to insert Trojan without changing the layout of the original circuit and Trojan cells are inserted close to the wires that connect Trojans and the original circuit.  ... 
doi:10.1587/transinf.2016edp7246 fatcat:66cfkozxaza77gbx4ig2ls4bji

A survey of hardware Trojan threat and defense

He Li, Qiang Liu, Jiliang Zhang
2016 Integration  
Hardware Trojan diagnosis Hardware Trojan prevention IC market model a b s t r a c t Hardware Trojans (HTs) can be implanted in security-weak parts of a chip with various means to steal the internal sensitive  ...  Therefore, it is very important to analyze the specific HT threats existing in the whole life cycle of integrated circuits (ICs), and perform protection against hardware Trojans.  ...  Laboratory of Computer Network and Information Integration (Southeast University), Ministry of Education.  ... 
doi:10.1016/j.vlsi.2016.01.004 fatcat:fms3p3j7m5f7flfpewrgbz5bpy
« Previous Showing results 1 — 15 out of 442 results