Advanced techniques for designing stealthy hardware trojans

Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.

Original languageEnglish (US)
Title of host publicationDAC 2014 - 51st Design Automation Conference, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479930173
DOIs
StatePublished - 2014
Event51st Annual Design Automation Conference, DAC 2014 - San Francisco, CA, United States
Duration: Jun 2 2014Jun 5 2014

Publication series

NameProceedings - Design Automation Conference
ISSN (Print)0738-100X

Other

Other51st Annual Design Automation Conference, DAC 2014
Country/TerritoryUnited States
CitySan Francisco, CA
Period6/2/146/5/14

Keywords

  • Backdoors
  • Hardware
  • Intellectual property
  • Security
  • Trojans

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Advanced techniques for designing stealthy hardware trojans'. Together they form a unique fingerprint.

Cite this