TAINT: Tool for automated insertion of trojans

Vinayaka Jyothi, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Testing designs implemented in a Field Programmable Gate Array (FPGA) against hardware-based attacks requires one to inject numerous classes of vulnerabilities (e.g., hardware Trojans) into the FPGA based designs. We developed a Tool for Automated INsertion of Trojans (TAINT) providing numerous benefits. First, TAINT can evaluate FPGA based designs against known and unknown attacks. Second, TAINT can insert Trojans at different stages in the FPGA based design cycle such as the Register-Transfer Logic and the post-synthesis translate, map, and route. Moreover, TAINT offers fine-grained controls to a user to precisely insert Trojans in particular FPGA resources. Most importantly, TAINT can automate Trojan Testing. Our experiments will use TAINT to explore the attack spaces at the pre-and post-synthesis stages of a FPGA design.

Original languageEnglish (US)
Title of host publicationProceedings - 35th IEEE International Conference on Computer Design, ICCD 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages545-548
Number of pages4
ISBN (Electronic)9781538622544
DOIs
StatePublished - Nov 22 2017
Event35th IEEE International Conference on Computer Design, ICCD 2017 - Boston, United States
Duration: Nov 5 2017Nov 8 2017

Publication series

NameProceedings - 35th IEEE International Conference on Computer Design, ICCD 2017

Other

Other35th IEEE International Conference on Computer Design, ICCD 2017
Country/TerritoryUnited States
CityBoston
Period11/5/1711/8/17

Keywords

  • Automated Tool
  • FPGA
  • Hardware Trojan
  • Penetration Testing tool
  • Security

ASJC Scopus subject areas

  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'TAINT: Tool for automated insertion of trojans'. Together they form a unique fingerprint.

Cite this