Securing FPGA design using PUF-chain and exploitation of other trojan detection circuits
نویسنده
چکیده
Recently, there have been reports of trojans being inserted at hardware. We propose a trojan detection method which uses ring oscillators to detect trojans that are inserted at gate level. We designed a trojan that bypasses the cryptohardware module when activated. We also analyze other teams trojan detection methods and compare it with our design.
منابع مشابه
Secure FPGA Design by Filling Unused Spaces
Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...
متن کاملExtraction of intrinsic structure for Hardware Trojan detection
In this paper we present a novel solution to address the problem of potential malicious circuitry on FPGA. This method is based on an a technique of structure extraction which consider the infection of an all lot. This structure is related to the design (place and route, power grid. . . ) of the integrated circuits which composes the lot. In case of additional circuitry this design will be modi...
متن کاملDesign, Fabrication, and Run-time Strategies for Hardware-Assisted Security
Title of dissertation: DESIGN, FABRICATION, AND RUN-TIME STRATEGIES FOR HARDWARE-ASSISTED SECURITY Domenic J. Forte, Doctor of Philosophy, 2013 Dissertation directed by: Dr. Ankur Srivastava Department of Electrical and Computer Engineering Today, electronic computing devices are critically involved in our daily lives, basic infrastructure, and national defense systems. With the growing number ...
متن کاملHardware Trojan Side-Channels Based on Physical Unclonable Functions
The separation design and fabrication process in the semiconductor industry leads to potential threats such as trojan side-channels (TSCs). In this paper we design a new family of TSCs from physical unclonable functions (PUFs). In particular, a dedicated attack on the PRESENT block cipher is described by using our PUF-based TSCs. Finally we analyze the performance of our PUF-based TSCs and disc...
متن کاملSelf-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection
Malicious modification of integrated circuits (ICs) in untrusted foundry, referred to as “Hardware Trojan”, has emerged as a serious security threat. While side-channel analysis has been reported as an effective approach to detect hardware Trojans, increasing process variations in nanoscale technologies pose a major challenge, since process noise can easily mask the Trojan effect on a measured ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009