Visible to the public The undetectable clock cycle sensitive hardware trojan

TitleThe undetectable clock cycle sensitive hardware trojan
Publication TypeConference Paper
Year of Publication2017
AuthorsSu, G., Bai, G.
Conference Name2017 International Conference on Electron Devices and Solid-State Circuits (EDSSC)
Date Publishedoct
KeywordsCircuit faults, clock tree structure, Clocks, composability, critical path, cryptography, Cryptography chips, delays, embedded clock-cycle-sensitive hardware trojans, Embedded systems, finite state machine, finite state machines, FSM, Hardware, Hardware Trojans, HT, invasive software, Metrics, Microelectronic Security, pubcrawl, redundant circuits, resilience, Resiliency, trees (mathematics), Trojan horses, Trusted design
Abstract

We have proposed a method of designing embedded clock-cycle-sensitive Hardware Trojans (HTs) to manipulate finite state machine (FSM). By using pipeline to choose and customize critical path, the Trojans can facilitate a series of attack and need no redundant circuits. One cannot detect any malicious architecture through logic analysis because the proposed circuitry is the part of FSM. Furthermore, this kind of HTs alerts the trusted systems designers to the importance of clock tree structure. The attackers may utilize modified clock to bypass certain security model or change the circuit behavior.

URLhttp://ieeexplore.ieee.org/document/8126460/
DOI10.1109/EDSSC.2017.8126460
Citation Keysu_undetectable_2017