Advanced techniques for designing stealthy hardware trojans

Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

Abstract

The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools. Copyright 2014 ACM.
Original languageEnglish (US)
Title of host publicationProceedings - Design Automation Conference
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479930173
DOIs
StatePublished - Jan 1 2014
Externally publishedYes

Bibliographical note

Generated from Scopus record by KAUST IRTS on 2022-09-13

Fingerprint

Dive into the research topics of 'Advanced techniques for designing stealthy hardware trojans'. Together they form a unique fingerprint.

Cite this