首页> 外文会议> >Advanced techniques for designing stealthy hardware trojans
【24h】

Advanced techniques for designing stealthy hardware trojans

机译:设计隐形硬件木马的先进技术

获取原文

摘要

The necessity of detecting malicious modifications in hardware designs has led to the development of various detection tools. Trojan detection approaches aim to reveal compromised designs using several methods such as static code analysis, side-channel dynamic signal analysis, design for testing, verification, and monitoring architectures etc. This paper demonstrates new approaches for circumventing some of the latest Trojan detection techniques. We introduce and implement stealthy Trojans designs that do not violate the functional specifications of the corresponding original models. The designs chosen to demonstrate the effectiveness of our techniques correspond to encryption algorithms and a pseudo random number generator. The proposed Trojans are inserted into the original RTL, and decrease the overall security of the designs, minimizing detection probability by state-of-the-art static analysis tools.
机译:检测硬件设计中恶意修改的必要性导致了各种检测工具的开发。特洛伊木马检测方法旨在使用多种方法(例如静态代码分析,边信道动态信号分析,测试设计,验证和监视体系结构等)来揭示受损的设计。本文演示了规避某些最新特洛伊木马检测技术的新方法。我们介绍并实现不违反相应原始模型功能规格的隐秘特洛伊木马程序设计。为证明我们技术的有效性而选择的设计对应于加密算法和伪随机数生成器。建议的特洛伊木马程序被插入到原始RTL中,从而降低了设计的整体安全性,并通过最新的静态分析工具将检测概率降至最低。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号