Title
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC.
Abstract
We infiltrate the ASIC development chain by inserting a small denial-of-service (DoS) hardware Trojan at the fabrication design phase into an existing VLSI circuit, thereby simulating an adversary at a semiconductor foundry. Both the genuine and the altered ASICs have been fabricated using a 180 nm CMOS process. The Trojan circuit adds an overhead of only 0.5% to the original design. In order to detect the hardware Trojan, we perform side-channel analyses and apply IC-fingerprinting techniques using templates, principal component analysis (PCA), and support vector machines (SVMs). As a result, we were able to successfully identify and classify all infected ASICs from non-infected ones. To the best of our knowledge, this is the first hardware Trojan manufactured as an ASIC and has successfully been analyzed using side channels.
Year
DOI
Venue
2013
10.1145/2487726.2487727
HASP@ISCA
Keywords
Field
DocType
existing vlsi circuit,asic development chain,fabrication design phase,original design,hardware trojan,ic-fingerprinting technique,trojan circuit,infected asics,blue team hardware trojan,nm cmos process,altered asics,red team,actual asic,pca,svm
Hardware Trojan,Computer science,Support vector machine,Application-specific integrated circuit,Cmos process,Trojan,Very-large-scale integration,Embedded system
Conference
Citations 
PageRank 
References 
2
0.42
9
Authors
5
Name
Order
Citations
PageRank
Michael Muehlberghuber1424.85
Frank K. Gürkaynak226125.56
Thomas Korak3717.32
Philipp Dunst420.75
Michael Hutter534525.26