The undetectable clock cycle sensitive hardware trojan
Title | The undetectable clock cycle sensitive hardware trojan |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Su, G., Bai, G. |
Conference Name | 2017 International Conference on Electron Devices and Solid-State Circuits (EDSSC) |
Date Published | oct |
Keywords | Circuit faults, clock tree structure, Clocks, composability, critical path, cryptography, Cryptography chips, delays, embedded clock-cycle-sensitive hardware trojans, Embedded systems, finite state machine, finite state machines, FSM, Hardware, Hardware Trojans, HT, invasive software, Metrics, Microelectronic Security, pubcrawl, redundant circuits, resilience, Resiliency, trees (mathematics), Trojan horses, Trusted design |
Abstract | We have proposed a method of designing embedded clock-cycle-sensitive Hardware Trojans (HTs) to manipulate finite state machine (FSM). By using pipeline to choose and customize critical path, the Trojans can facilitate a series of attack and need no redundant circuits. One cannot detect any malicious architecture through logic analysis because the proposed circuitry is the part of FSM. Furthermore, this kind of HTs alerts the trusted systems designers to the importance of clock tree structure. The attackers may utilize modified clock to bypass certain security model or change the circuit behavior. |
URL | http://ieeexplore.ieee.org/document/8126460/ |
DOI | 10.1109/EDSSC.2017.8126460 |
Citation Key | su_undetectable_2017 |
- Hardware
- Trusted design
- Trojan horses
- trees (mathematics)
- Resiliency
- resilience
- redundant circuits
- pubcrawl
- Microelectronic Security
- Metrics
- invasive software
- HT
- Hardware Trojans
- Circuit faults
- FSM
- finite state machines
- finite state machine
- embedded systems
- embedded clock-cycle-sensitive hardware trojans
- delays
- Cryptography chips
- Cryptography
- critical path
- composability
- Clocks
- clock tree structure