Visible to the public Design, implementation and security analysis of Hardware Trojan Threats in FPGA

TitleDesign, implementation and security analysis of Hardware Trojan Threats in FPGA
Publication TypeConference Paper
Year of Publication2014
AuthorsShila, D.M., Venugopal, V.
Conference NameCommunications (ICC), 2014 IEEE International Conference on
Date PublishedJune
Keywordsdenial of service, Design, Encryption, field programmable gate arrays, FPGA testbed, Hardware, hardware Trojan detection technique, hardware Trojan threats, Hardware Trojans, HDM, HTT detectability metric, HTT detection, ICs, integrated circuits, integrated logic circuits, invasive software, missed detection probability, normalized physical parameters, optimal detection threshold, power consumption, Power demand, Resiliency, root of trust, RoT, security, security analysis, sensitive information leak, summation of false alarm, Timing, timing variation, Trojan horses, Trojan taxonomy
Abstract

Hardware Trojan Threats (HTTs) are stealthy components embedded inside integrated circuits (ICs) with an intention to attack and cripple the IC similar to viruses infecting the human body. Previous efforts have focused essentially on systems being compromised using HTTs and the effectiveness of physical parameters including power consumption, timing variation and utilization for detecting HTTs. We propose a novel metric for hardware Trojan detection coined as HTT detectability metric (HDM) that uses a weighted combination of normalized physical parameters. HTTs are identified by comparing the HDM with an optimal detection threshold; if the monitored HDM exceeds the estimated optimal detection threshold, the IC will be tagged as malicious. As opposed to existing efforts, this work investigates a system model from a designer perspective in increasing the security of the device and an adversary model from an attacker perspective exposing and exploiting the vulnerabilities in the device. Using existing Trojan implementations and Trojan taxonomy as a baseline, seven HTTs were designed and implemented on a FPGA testbed; these Trojans perform a variety of threats ranging from sensitive information leak, denial of service to beat the Root of Trust (RoT). Security analysis on the implemented Trojans showed that existing detection techniques based on physical characteristics such as power consumption, timing variation or utilization alone does not necessarily capture the existence of HTTs and only a maximum of 57% of designed HTTs were detected. On the other hand, 86% of the implemented Trojans were detected with HDM. We further carry out analytical studies to determine the optimal detection threshold that minimizes the summation of false alarm and missed detection probabilities.

DOI10.1109/ICC.2014.6883404
Citation Key6883404