Visible to the public An Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans

TitleAn Algorithmic Method for the Implantation of Detection-Resistant Covert Hardware Trojans
Publication TypeConference Paper
Year of Publication2016
AuthorsTemkin, Kyle J., Summerville, Douglas H.
Conference NameProceedings of the 11th Annual Cyber and Information Security Research Conference
Date PublishedApril 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-3752-6
Keywordscomposability, covert hardware, Hardware Trojans horses, malicious modification, pubcrawl, Resiliency, trojan horse detection
AbstractThis work presents a new class of Covert Hardware Trojan Horses (Covert HTHs), which can be algorithmically implanted with no change to their host circuit's functional behavior and without the need for additional unrelated logic. As a result, Covert HTHs are invulnerable to functional detection methods. This work also proposes a formal methodology for implantation of Covert HTHs, which allows covert hardware to be embedded in any sufficiently-sized synchronous circuit. Synthesis results indicate that covert implantation results in nearly a 75% reduction in integrated circuit area used by the HTH. Furthermore, the covert implantation causes no increase in the host circuit's delay and, compared to the effect of an overtly implanted HTH on its host, the covert implantation results in a significantly lower dynamic and leakage power. These significant reductions in area, delay and power make a covertly implanted HTH highly resistant to existing non-functional detection methods.
URLhttps://dl.acm.org/doi/10.1145/2897795.2897811
DOI10.1145/2897795.2897811
Citation Keytemkin_algorithmic_2016