首页> 外文会议>Cryptographic hardware and embedded systems-CHES 2009 >Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering
【24h】

Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering

机译:木马侧通道:通过侧通道工程的轻量级硬件木马

获取原文
获取原文并翻译 | 示例

摘要

The general trend in semiconductor industry to separate design from fabrication leads to potential threats from untrusted integrated circuit foundries. In particular, malicious hardware components can be covertly inserted at the foundry to implement hidden backdoors for unauthorized exposure of secret information. This paper proposes a new class of hardware Trojans which intentionally induce physical side-channels to convey secret information. We demonstrate power side-channels engineered to leak information below the effective noise power level of the device. Two concepts of very small implementations of Trojan side-channels (TSC) are introduced and evaluated with respect to their feasibility on Xilinx FPGAs. Their lightweight implementations indicate a high resistance to detection by conventional test and inspection methods. Furthermore, the proposed TSCs come with a physical encryption property, so that even a successful detection of the artificially introduced side-channel will not allow unhindered access to the secret information.
机译:半导体行业将设计与制造分离的总体趋势导致不受信任的集成电路铸造厂的潜在威胁。特别是,恶意硬件组件可以秘密地插入到铸造厂中,以实现隐藏的后门,以未经授权地暴露秘密信息。本文提出了一种新的硬件特洛伊木马程序,该特洛伊木马程序有意诱使物理辅助信道传达秘密信息。我们演示了设计用于将信息泄漏到低于设备有效噪声功率水平的功率侧通道。引入并评估了特洛伊木马侧通道(TSC)的非常小的实现的两个概念,并就其在Xilinx FPGA上的可行性进行了评估。它们的轻量级实现表明对常规测试和检查方法的检测具有很高的抵抗力。此外,提出的TSC具有物理加密属性,因此,即使成功检测到人工引入的边信道,也不会无阻碍地访问机密信息。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号