• DocumentCode
    1787626
  • Title

    On Trojan side channel design and identification

  • Author

    Jie Zhang ; Guantong Su ; Yannan Liu ; Lingxiao Wei ; Feng Yuan ; Guoqiang Bai ; Qiang Xu

  • Author_Institution
    Dept. of Comput. Sci. & Eng, Chinese Univ. of Hong Kong, Hong Kong, China
  • fYear
    2014
  • fDate
    2-6 Nov. 2014
  • Firstpage
    278
  • Lastpage
    285
  • Abstract
    Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware cost and the complexity of the key cracking process. Next, we present our TSC identification technique based on the correlation between the key and the covert physical side channels used by attackers. Experimental results demonstrate the effectiveness of the proposed solution.
  • Keywords
    cryptography; invasive software; TSC identification technique; Trojan side channel design; Trojan side channel identification; covert side channels; cryptographic systems; general power-based TSC design; key cracking process complexity; Complexity theory; Correlation; Cryptography; Hardware; Power demand; Trojan horses;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on
  • Conference_Location
    San Jose, CA
  • Type

    conf

  • DOI
    10.1109/ICCAD.2014.7001363
  • Filename
    7001363