scispace - formally typeset
Open AccessProceedings ArticleDOI

Hardware Trojan Horses in Cryptographic IP Cores

Reads0
Chats0
TLDR
In this article, the authors study hardware trojan horses insertion and detection in cryptographic IP blocks, based on the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader.
Abstract
Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. First, we show the efficiency of a medium cost hardware trojans detection method if the placement or the routing have been redone by the foundry. It consists in the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader. Second, we analyze the ability of an attacker to introduce a hardware trojan horse without changing neither the placement nor the routing of the cryptographic IP logic. On the example of an AES engine, we show that if the placement density is beyond 80%, the insertion is basically impossible. Therefore, this settles a simple design guidance to avoid trojan horses insertion in cryptographic IP blocks: have the design be compact enough, so that any functionally discreet trojan necessarily requires a complete replace and re-route, which is detected by mere optical imaging (and not complete chip reverse-engineering).

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

Complementary dual codes for counter-measures to side-channel attacks

TL;DR: In this article, the authors recall why linear codes with complementary duals (LCD codes) play a role in countermeasures to passive and active side-channel analyses on embedded cryptosystems.
Proceedings ArticleDOI

A survey on hardware trojan detection techniques

TL;DR: Several techniques for detecting malicious modification of circuit introduced at different phases of the design flow are surveyed and their capabilities limitations in thwarting hardware Trojans are highlighted.
Posted Content

Complementary Dual Codes for Counter-measures to Side-Channel Attacks.

TL;DR: In this paper, the authors recall why linear codes with complementary duals (LCD codes) play a role in countermeasures to passive and active side-channel analyses on embedded cryptosystems, and characterize conditions under which codes obtained by direct sum, direct product, puncturing, shortening, extending codes, or obtained by the Plotkin sum can be LCD.
Proceedings ArticleDOI

A high efficiency hardware trojan detection technique based on fast SEM imaging

TL;DR: The integration of an almost automatic Hardware Trojan detection based on a visual inspection implemented within the integrated circuit life cycle is included.
Proceedings ArticleDOI

Introduction to hardware trojan detection methods

TL;DR: The general context of HTs is introduced, recent advances in HT detection from a French funded research project named HOMERE are summarized and some of these results will be detailed in the related special session.
References
More filters
Book ChapterDOI

Differential Power Analysis

TL;DR: In this paper, the authors examine specific methods for analyzing power consumption measurements to find secret keys from tamper resistant devices. And they also discuss approaches for building cryptosystems that can operate securely in existing hardware that leaks information.
Book ChapterDOI

On the importance of checking cryptographic protocols for faults

TL;DR: In this article, the authors present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults, including RSA and Rabin signatures, and also show how various authentication protocols, such as Fiat-Shamir and Schnorr, can be broken using hardware faults.
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Journal ArticleDOI

Encryption: Advanced Encryption Standard (AES)

TL;DR: The 'Caesar' Cypher shows how old encryption is and how simple old ciphers now are for us to break.
Book ChapterDOI

ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards

TL;DR: It is shown that the electromagnetic attack obtains at least the same result as power consumption and consequently must be carefuly taken into account.
Related Papers (5)