Hardware Security
05/10/2023 Hardware Security 1
05/10/2023 Hardware Security 2
Glimpses of Hardware Trojans
05/10/2023 Hardware Security 3
Hardware Trojans
Possible attacks on the IC supply chain include maliciously
modifying ICs, copying of ICs to produce cloned devices, or
stealing intellectual property (IP). A malicious modification to
an IC is call
Because the modification hides itself within the IC and possibly
even provides correct, useful functionality before it attacks,
much like its eponymous mythed a Trojan circuit or Hardware
Trojan
Cloned or counterfeit ICs lead to lost revenue and may be less
reliable than the original, potentially affecting the reputation of
the original device manufacturer and the security of the end
user.
05/10/2023 Hardware Security 4
IC supply Chain
05/10/2023 Hardware Security 5
Testing of trojan circuits
• One approach to Trojan circuit detection is to look for
additions and modifications to an IC in a laboratory setting
prior to deploying the final product.
• Lab-based detection augments the test phase of the supply
chain with silicon design authentication, which verifies that an
IC contains only the designer’s intended functionality and
nothing else
• Silicon design authentication is difficult due to increasing IC
complexity, shrinking feature sizes, rarity of conditions for
activating malicious logic, and lack of knowledge about what
functionality has been added to the IC.
05/10/2023 Hardware Security 6
Limitations of Testing
• Testing cannot capture the behavior of added functionality, so an
IC could contain all of the intended functionality while having
extra malicious logic that might not be activated or detected by
tests.
• Detection by physical inspection is insufficient due to the
complexity and size of modern ICs.
• Destructive approaches are too costly and cannot be applied to
every IC.
• Two promising directions that are active areas for research in the
area of Trojan circuit detection at the silicon design
authentication step are side-channel analysis and Trojan
activation.
05/10/2023 Hardware Security 7
Example
05/10/2023 Hardware Security 8
Example
05/10/2023 Hardware Security 9
Countermeasures
05/10/2023 Hardware Security 10
Dynamic power simulator framework
05/10/2023 Hardware Security 11
Side Channel Attack(SCA)
05/10/2023 Hardware Security 12
05/10/2023 Hardware Security 13
05/10/2023 Hardware Security 14
05/10/2023 Hardware Security 15
05/10/2023 Hardware Security 16
05/10/2023 Hardware Security 17
05/10/2023 Hardware Security 18
05/10/2023 Hardware Security 19
Power Attack
05/10/2023 Hardware Security 20
Countermeasures
05/10/2023 Hardware Security 21
05/10/2023 Hardware Security 22