A case study in hardware Trojan design and implementation

被引:40
作者
Baumgarten, Alex [1 ]
Steffen, Michael [1 ]
Clausman, Matthew [1 ]
Zambreno, Joseph [1 ]
机构
[1] Iowa State Univ, Ames, IA 50011 USA
关键词
Hardware hacking; Trojans; Security; FPGA;
D O I
10.1007/s10207-010-0115-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As integrated circuits (ICs) continue to have an overwhelming presence in our digital information-dominated world, having trust in their manufacture and distribution mechanisms is crucial. However, with ever-shrinking transistor technologies, the cost of new fabrication facilities is becoming prohibitive, pushing industry to make greater use of potentially less reliable foreign sources for their IC supply. The 2008 Computer Security Awareness Week (CSAW) Embedded Systems Challenge at the Polytechnic Institute of NYU highlighted some of the vulnerabilities of the IC supply chain in the form of a hardware hacking challenge. This paper explores the design and implementation of our winning entry.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 27 条
[1]   Fragile IP watermarking techniques [J].
Abdel-Hamid, Amr T. ;
Tahar, Sofiene .
PROCEEDINGS OF THE 2008 NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS, 2008, :513-+
[2]   A public-key watermarking technique for IP designs [J].
Abdel-Hamid, AT ;
Tahar, S ;
Aboulhamid, EM .
DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, :330-335
[3]  
ABDELHAMID A, 2006, P C AD HARDW SYST AH, P457
[4]  
Alkabani Y., 2007, Inproceedings of 16th USENIX security symposium on USENIX security symposium, P1
[5]  
Alkabani Y, 2007, IEEE IC CAD, P674
[6]  
[Anonymous], 2007, TRUST INT CIRC TIC
[7]  
[Anonymous], IEEE SPECTRUM
[8]  
[Anonymous], 2003, INTELLECTUAL PROPERT
[9]  
[Anonymous], 2007, 2007 IEEE INT SOLID
[10]  
*BAS SYST BOARD, 2008, DIG