EM-based detection of hardware trojans on FPGAs
Title | EM-based detection of hardware trojans on FPGAs |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Soll, O., Korak, T., Muehlberghuber, M., Hutter, M. |
Conference Name | Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on |
Date Published | May |
Keywords | AES design, Clocks, electromagnetic emanation, EM measurement, EM-based detection, field programmable gate arrays, FPGA, Hardware, hardware Trojan detection, Hardware Trojan injection, invasive software, Layout, logic design, malicious circuitry, Probes, RapidSmith, sequential denial-of-service, side-channel analysis, Software, Trojan horses, Trojan placement, Xilinx Virtex-II Pro target |
Abstract | The detectability of malicious circuitry on FPGAs with varying placement properties yet has to be investigated. The authors utilize a Xilinx Virtex-II Pro target platform in order to insert a sequential denial-of-service Trojan into an existing AES design by manipulating a Xilinx-specific, intermediate file format prior to the bitstream generation. Thereby, there is no need for an attacker to acquire access to the hardware description language representation of a potential target architecture. Using a side-channel analysis setup for electromagnetic emanation (EM) measurements, they evaluate the detectability of different Trojan designs with varying location and logic distribution properties. The authors successfully distinguish the malicious from the genuine designs and provide information on how the location and distribution properties of the Trojan logic affect its detectability. To the best of their knowledge, this has been the first practically conducted Trojan detection using localized EM measurements. |
DOI | 10.1109/HST.2014.6855574 |
Citation Key | 6855574 |
- Layout
- Xilinx Virtex-II Pro target
- Trojan placement
- Trojan horses
- Software
- side-channel analysis
- sequential denial-of-service
- RapidSmith
- Probes
- malicious circuitry
- logic design
- AES design
- invasive software
- Hardware Trojan injection
- hardware Trojan detection
- Hardware
- FPGA
- field programmable gate arrays
- EM-based detection
- EM measurement
- electromagnetic emanation
- Clocks