Hardware Trojans in Reconfigurable Computing

被引:0
作者
Ahmed, Qazi Arbab [1 ]
机构
[1] Paderborn Univ, Dept Comp Sci, Comp Engn Grp, Paderborn, Germany
来源
PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC) | 2021年
关键词
D O I
10.1109/VLSI-SoC53125.2021.9606974
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The design flow for field-programmable gate arrays (FPGAs), besides conventional methods of inserting Trojans into a design by a malicious entity, can also be surreptitiously compromised to assist an attacker to perform a successful malfunctioning or information leakage attack. The advanced stealthy malicious look-up-table (LUT) attack activates a Trojan only when generating the FPGA bitstream and can thus not be detected by register transfer and gate level testing and verification. This work aims to discuss a potential pre-configuration countermeasure against this "malicious LUT"-hardware Trojan, by employing bitstream-level Proof-Carrying Hardware (PCH). Further, this work proposes a novel attack that leverages malicious routing of the inserted Trojan circuit to acquire a dormant state even in the generated and transmitted bitstream, thus, the attack can currently neither be prevented by conventional testing and verification methods nor by bitstream-level verification techniques.
引用
收藏
页码:182 / 183
页数:2
相关论文
共 9 条
[1]  
Ahmed Q. A., 2019, LECT NOTES COMPUTER, V1444
[2]   Malicious Routing: Circumventing Bitstream-level Verification for FPGAs [J].
Ahmed, Qazi Arbab ;
Wiersema, Tobias ;
Platzner, Marco .
PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, :1490-1495
[3]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[4]   Proof-carrying Hardware: Towards Runtime Verification of Reconfigurable Modules [J].
Drzevitzky, Stephanie ;
Kastens, Uwe ;
Platzner, Marco .
2009 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS, 2009, :189-194
[5]   Malicious LUT: A Stealthy FPGA Trojan Injected and Triggered by the Design Flow [J].
Krieg, Christian ;
Wolf, Clifford ;
Jantsch, Axel .
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
[6]  
Suozzo M., 2013, P 2013 ACM SIGSAC C, P697
[7]  
Wiersema T, 2014, PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), P167, DOI 10.1109/FPT.2014.7082771
[8]  
Wolf C., 2015, Project icestorm
[9]  
Zhang J, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P107, DOI 10.1109/HST.2013.6581574