Title | ||
---|---|---|
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC. |
Abstract | ||
---|---|---|
We infiltrate the ASIC development chain by inserting a small denial-of-service (DoS) hardware Trojan at the fabrication design phase into an existing VLSI circuit, thereby simulating an adversary at a semiconductor foundry. Both the genuine and the altered ASICs have been fabricated using a 180 nm CMOS process. The Trojan circuit adds an overhead of only 0.5% to the original design. In order to detect the hardware Trojan, we perform side-channel analyses and apply IC-fingerprinting techniques using templates, principal component analysis (PCA), and support vector machines (SVMs). As a result, we were able to successfully identify and classify all infected ASICs from non-infected ones. To the best of our knowledge, this is the first hardware Trojan manufactured as an ASIC and has successfully been analyzed using side channels. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1145/2487726.2487727 | HASP@ISCA |
Keywords | Field | DocType |
existing vlsi circuit,asic development chain,fabrication design phase,original design,hardware trojan,ic-fingerprinting technique,trojan circuit,infected asics,blue team hardware trojan,nm cmos process,altered asics,red team,actual asic,pca,svm | Hardware Trojan,Computer science,Support vector machine,Application-specific integrated circuit,Cmos process,Trojan,Very-large-scale integration,Embedded system | Conference |
Citations | PageRank | References |
2 | 0.42 | 9 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Muehlberghuber | 1 | 42 | 4.85 |
Frank K. Gürkaynak | 2 | 261 | 25.56 |
Thomas Korak | 3 | 71 | 7.32 |
Philipp Dunst | 4 | 2 | 0.75 |
Michael Hutter | 5 | 345 | 25.26 |