Stealthy dopant-level hardware Trojans: extended version

被引:54
作者
Becker, Georg T. [1 ]
Regazzoni, Francesco [2 ]
Paar, Christof [1 ,3 ]
Burleson, Wayne P. [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
[2] Univ Lugano, ALaRI, Lugano, Switzerland
[3] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
关键词
Hardware Trojans; Malicious hardware; Layout modifications; Trojan side-channel;
D O I
10.1007/s13389-013-0068-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, hardware Trojans have drawn the attention of governments and industry aswell as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like and how difficult it would be in practice to implement one. In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips". We demonstrate the effectiveness of our approach by inserting Trojans into two designs-a digital post-processing derived from Intel's cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation-and by exploring their detectability and their effects on security.
引用
收藏
页码:19 / 31
页数:13
相关论文
共 25 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]  
[Anonymous], 2005, REP DEF SCI BOARD TA
[3]   Correlation power analysis with a leakage model [J].
Brier, E ;
Clavier, C ;
Olivier, F .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 :16-29
[4]  
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441
[5]  
Gierlichs B, 2008, LECT NOTES COMPUT SC, V5154, P426
[6]   Counterfeit Chips on the Rise [J].
Gorman, Celia .
IEEE SPECTRUM, 2012, 49 (06) :16-17
[7]  
Hamburg Mike, 2012, TECHNICAL REPORT
[8]   Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically [J].
Hicks, Matthew ;
Finnicum, Murph ;
King, Samuel T. ;
Martin, Milo M. K. ;
Smith, Jonathan M. .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :159-172
[9]  
Intel, INT DIG RAND NUMB GE
[10]  
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049