...
首页> 外文期刊>Journal of cryptographic engineering >Stealthy dopant-level hardware Trojans: extended version
【24h】

Stealthy dopant-level hardware Trojans: extended version

机译:隐形掺杂剂级别的硬件木马:扩展版本

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical-infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like and how difficult it would be in practice to implement one. In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips". We demonstrate the effectiveness of our approach by inserting Trojans into two designs-a digital post-processing derived from Intel's cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation-and by exploring their detectability and their effects on security.
机译:近年来,硬件木马已经引起了政府,行业以及科学界的关注。主要关注的问题之一是,例如在军事或关键基础设施应用中的集成电路可能在制造过程中被恶意操纵,而制造过程通常发生在国外。但是,由于至今还没有关于硬件特洛伊木马的报道,因此对于这种特洛伊木马的外观以及在实践中实施该木马的难度知之甚少。在本文中,我们提出了一种非常隐蔽的方法来实现低于门级别的硬件木马,并且我们评估了它们对目标设备安全性的影响。无需在目标设计中添加其他电路,而是通过更改现有晶体管的掺杂极性来插入硬件木马。由于修改后的电路在所有布线层(包括所有金属和多晶硅)上看起来都是合法的,因此我们的木马家族可以抵抗大多数检测技术,包括细粒度光学检查和“金芯片”检查。我们通过将特洛伊木马程序插入两个设计中来展示我们的方法的有效性-一种数字后处理,该数字后处理来自Ivy Bridge处理器中使用的Intel加密安全RNG设计和抗侧通道SBox实施-并探索了它们的可检测性及其对安全。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号