Visible to the public EM-based detection of hardware trojans on FPGAs

TitleEM-based detection of hardware trojans on FPGAs
Publication TypeConference Paper
Year of Publication2014
AuthorsSoll, O., Korak, T., Muehlberghuber, M., Hutter, M.
Conference NameHardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on
Date PublishedMay
KeywordsAES design, Clocks, electromagnetic emanation, EM measurement, EM-based detection, field programmable gate arrays, FPGA, Hardware, hardware Trojan detection, Hardware Trojan injection, invasive software, Layout, logic design, malicious circuitry, Probes, RapidSmith, sequential denial-of-service, side-channel analysis, Software, Trojan horses, Trojan placement, Xilinx Virtex-II Pro target
Abstract

The detectability of malicious circuitry on FPGAs with varying placement properties yet has to be investigated. The authors utilize a Xilinx Virtex-II Pro target platform in order to insert a sequential denial-of-service Trojan into an existing AES design by manipulating a Xilinx-specific, intermediate file format prior to the bitstream generation. Thereby, there is no need for an attacker to acquire access to the hardware description language representation of a potential target architecture. Using a side-channel analysis setup for electromagnetic emanation (EM) measurements, they evaluate the detectability of different Trojan designs with varying location and logic distribution properties. The authors successfully distinguish the malicious from the genuine designs and provide information on how the location and distribution properties of the Trojan logic affect its detectability. To the best of their knowledge, this has been the first practically conducted Trojan detection using localized EM measurements.

DOI10.1109/HST.2014.6855574
Citation Key6855574