首页> 外文会议>International Conference on Frontiers of Intelligent Computing : Theory and Applications >Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores
【24h】

Analysis of Secret Key Revealing Trojan Using Path Delay Analysis for Some Cryptocores

机译:用路径延迟分析揭示特洛伊木马的秘密关键分析

获取原文

摘要

The design outsourcing of the IC supply chain across the globe has been witnessed as a major trend of the semiconductor design industry in the recent era. The increasing profit margin has been a major boost for this trend. However, the vulnerability of the introduction of malicious circuitry (Hardware Trojan Horses) in the untrusted phases of chip development has been a major deterrent in this cost effective design methodology. Analysis, detection and correction of such Trojan Horses have been the point of focus among researchers over the recent years. In this work, analysis of a secret key revealing Hardware Trojan Horse is performed. This Trojan Horse creates a conditional path delay to the resultant output of the cryptocore according to the stolen bit of secret key per iteration. The work has been extended from the RTL design stage to the pre fabrication stage of ASIC platform where area and power analysis have been made to distinguish the affected core from a normal core in 180nm technology node.
机译:全球IC供应链的设计外包已作为最近时代半导体设计行业的主要趋势。利润率越来越大的是这种趋势的重大推动力。然而,在不受信任的芯片开发阶段引入恶意电路(硬件特洛伊木马)的脆弱性在这一成本效益的设计方法中是一个主要的威慑力。分析,检测和纠正这种特洛伊木马在近年来的研究人员中一直是重点。在这项工作中,进行了揭示硬件特洛伊木马的秘密密钥的分析。根据每个迭代的秘密密钥的被盗位,这个特洛伊木马将有条件的路径延迟给Cryptocore的结果输出。该工作已经从RTL设计阶段扩展到ASIC平台的预制作阶段,其中已经进行了区域和功率分析,以将受影响的核心区分180nm技术节点的正常核心区分。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号