首页> 外文期刊>IEEE transactions on very large scale integration (VLSI) systems >Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations
【24h】

Side-Channel Hardware Trojan for Provably-Secure SCA-Protected Implementations

机译:侧通道硬件特洛伊木马用于可透明的SCA保护的实现

获取原文
获取原文并翻译 | 示例

摘要

Hardware Trojans have drawn the attention of academia, industry, and government agencies. Effective detection mechanisms and countermeasures against such malicious designs can only be developed when there is a deep understanding of how hardware Trojans can be built in practice, in particular, Trojans specifically designed to avoid detection. In this article, we present a mechanism to introduce an extremely stealthy hardware Trojan into cryptographic primitives equipped with provably-secure first-order side-channel countermeasures. Once the Trojan is triggered, the malicious design exhibits exploitable side-channel leakage, leading to successful key recovery attacks. Generally, such a Trojan requires neither addition nor removal of any logic which makes it extremely hard to detect. On ASICs, it can be inserted by subtle manipulations at the subtransistor level and on FPGAs by changing the routing of particular signals, leading to zero logic overhead. The underlying concept is based on modifying a securely masked hardware implementation in such a way that running the device at a particular clock frequency violates one of its essential properties, leading to exploitable leakage. We apply our technique to a threshold implementation of the PRESENT block cipher realized in two different CMOS technologies and show that triggering the Trojan makes the ASIC prototypes vulnerable.
机译:硬件特洛伊木马引起了学术界,工业和政府机构的关注。当有深入了解硬件特洛伊木马在实践中,特别是特洛伊木马,唯一可以开发有效的检测机制和对抗这种恶意设计的对策,特别是避免检测的特洛伊木马。在本文中,我们提出了一种机制,将一个非常隐蔽的硬件木马进入配备有可克定的一阶侧频道对策的加密原语。一旦特洛伊木马被触发,恶意设计就展示了可利用的侧通道泄漏,导致成功的恢复攻击。通常,这种特洛伊木马既不需要加法也不删除任何逻辑,这使得它非常难以检测。在ASIC上,它可以通过改变特定信号的路由,通过Subtrantistor级别和FPGA的微妙操作插入它,导致零逻辑开销。底层概念基于修改安全屏蔽的硬件实现,使得在特定时钟频率下运行设备的方式违反其基本属性之一,导致可利用泄漏。我们将技术应用于在两个不同的CMOS技术中实现的本块密码的阈值实现,并显示触发特洛伊木马使ASIC原型易受攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号