Creation and detection of hardware trojans using non-invasive off-the-shelf technologies

Catherine Rooney, Amar Seeam, Xavier Bellekens

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.

LanguageEnglish
Article number124
Number of pages21
JournalElectronics
Volume7
Issue number7
DOIs
Publication statusPublished - 22 Jul 2018

Fingerprint

Hardware
Integrated circuits
Field programmable gate arrays (FPGA)
Semiconductor materials
Fabrication
Costs
Experiments
Hardware security

Keywords

  • FPGA
  • hardware trojan taxonomy
  • infrared
  • side channel analysis
  • thermal imaging

Cite this

@article{6b6300cf73104f598fe29ca4ab6b3479,
title = "Creation and detection of hardware trojans using non-invasive off-the-shelf technologies",
abstract = "As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.",
keywords = "FPGA, hardware trojan taxonomy, infrared, side channel analysis, thermal imaging",
author = "Catherine Rooney and Amar Seeam and Xavier Bellekens",
year = "2018",
month = "7",
day = "22",
doi = "10.3390/electronics7070124",
language = "English",
volume = "7",
journal = "Electronics",
issn = "2079-9292",
number = "7",

}

Creation and detection of hardware trojans using non-invasive off-the-shelf technologies. / Rooney, Catherine; Seeam, Amar; Bellekens, Xavier.

In: Electronics, Vol. 7, No. 7, 124, 22.07.2018.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Creation and detection of hardware trojans using non-invasive off-the-shelf technologies

AU - Rooney, Catherine

AU - Seeam, Amar

AU - Bellekens, Xavier

PY - 2018/7/22

Y1 - 2018/7/22

N2 - As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.

AB - As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware.

KW - FPGA

KW - hardware trojan taxonomy

KW - infrared

KW - side channel analysis

KW - thermal imaging

UR - http://www.scopus.com/inward/record.url?scp=85050790718&partnerID=8YFLogxK

U2 - 10.3390/electronics7070124

DO - 10.3390/electronics7070124

M3 - Article

VL - 7

JO - Electronics

T2 - Electronics

JF - Electronics

SN - 2079-9292

IS - 7

M1 - 124

ER -