TY - GEN
T1 - Advanced techniques for designing stealthy hardware trojans
AU - Tsoutsos, Nektarios Georgios
AU - Konstantinou, Charalambos
AU - Maniatakos, Michail
PY - 2014
Y1 - 2014
N2 - The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.
AB - The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.
KW - Backdoors
KW - Hardware
KW - Intellectual property
KW - Security
KW - Trojans
UR - http://www.scopus.com/inward/record.url?scp=84903164661&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84903164661&partnerID=8YFLogxK
U2 - 10.1145/2593069.2596668
DO - 10.1145/2593069.2596668
M3 - Conference contribution
AN - SCOPUS:84903164661
SN - 9781479930173
T3 - Proceedings - Design Automation Conference
BT - DAC 2014 - 51st Design Automation Conference, Conference Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 51st Annual Design Automation Conference, DAC 2014
Y2 - 2 June 2014 through 5 June 2014
ER -