Advanced techniques for designing stealthy hardware trojans

Nektarios Georgios Tsoutsos, Charalambos Konstantinou, Mihalis Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.

Original languageEnglish (US)
Title of host publicationDAC 2014 - 51st Design Automation Conference, Conference Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781479930173
DOIs
StatePublished - Jan 1 2014
Event51st Annual Design Automation Conference, DAC 2014 - San Francisco, CA, United States
Duration: Jun 2 2014Jun 5 2014

Other

Other51st Annual Design Automation Conference, DAC 2014
CountryUnited States
CitySan Francisco, CA
Period6/2/146/5/14

Fingerprint

Hardware
Side-channel Analysis
Pseudorandom number Generator
Detection Probability
Signal Analysis
Signal analysis
Static analysis
Violate
Static Analysis
Dynamic Analysis
Encryption
Demonstrate
Cryptography
Design
Monitoring
Decrease
Testing

Keywords

  • Backdoors
  • Hardware
  • Intellectual property
  • Security
  • Trojans

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Cite this

Tsoutsos, N. G., Konstantinou, C., & Maniatakos, M. (2014). Advanced techniques for designing stealthy hardware trojans. In DAC 2014 - 51st Design Automation Conference, Conference Proceedings [2596668] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1145/2593069.2596668

Advanced techniques for designing stealthy hardware trojans. / Tsoutsos, Nektarios Georgios; Konstantinou, Charalambos; Maniatakos, Mihalis.

DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014. 2596668.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tsoutsos, NG, Konstantinou, C & Maniatakos, M 2014, Advanced techniques for designing stealthy hardware trojans. in DAC 2014 - 51st Design Automation Conference, Conference Proceedings., 2596668, Institute of Electrical and Electronics Engineers Inc., 51st Annual Design Automation Conference, DAC 2014, San Francisco, CA, United States, 6/2/14. https://doi.org/10.1145/2593069.2596668
Tsoutsos NG, Konstantinou C, Maniatakos M. Advanced techniques for designing stealthy hardware trojans. In DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc. 2014. 2596668 https://doi.org/10.1145/2593069.2596668
Tsoutsos, Nektarios Georgios ; Konstantinou, Charalambos ; Maniatakos, Mihalis. / Advanced techniques for designing stealthy hardware trojans. DAC 2014 - 51st Design Automation Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2014.
@inproceedings{db277cc650d54adb9a5983b98ed6197a,
title = "Advanced techniques for designing stealthy hardware trojans",
abstract = "The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.",
keywords = "Backdoors, Hardware, Intellectual property, Security, Trojans",
author = "Tsoutsos, {Nektarios Georgios} and Charalambos Konstantinou and Mihalis Maniatakos",
year = "2014",
month = "1",
day = "1",
doi = "10.1145/2593069.2596668",
language = "English (US)",
isbn = "9781479930173",
booktitle = "DAC 2014 - 51st Design Automation Conference, Conference Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Advanced techniques for designing stealthy hardware trojans

AU - Tsoutsos, Nektarios Georgios

AU - Konstantinou, Charalambos

AU - Maniatakos, Mihalis

PY - 2014/1/1

Y1 - 2014/1/1

N2 - The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.

AB - The necessity of detecting malicious modications in hard-ware designs has led to the development of various detec-tion tools. Trojan detection approaches aim to reveal com-promised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verication, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specications of the corresponding original mod-els. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.

KW - Backdoors

KW - Hardware

KW - Intellectual property

KW - Security

KW - Trojans

UR - http://www.scopus.com/inward/record.url?scp=84903164661&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84903164661&partnerID=8YFLogxK

U2 - 10.1145/2593069.2596668

DO - 10.1145/2593069.2596668

M3 - Conference contribution

AN - SCOPUS:84903164661

SN - 9781479930173

BT - DAC 2014 - 51st Design Automation Conference, Conference Proceedings

PB - Institute of Electrical and Electronics Engineers Inc.

ER -