DocumentCode :
1787626
Title :
On Trojan side channel design and identification
Author :
Jie Zhang ; Guantong Su ; Yannan Liu ; Lingxiao Wei ; Feng Yuan ; Guoqiang Bai ; Qiang Xu
Author_Institution :
Dept. of Comput. Sci. & Eng, Chinese Univ. of Hong Kong, Hong Kong, China
fYear :
2014
fDate :
2-6 Nov. 2014
Firstpage :
278
Lastpage :
285
Abstract :
Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware cost and the complexity of the key cracking process. Next, we present our TSC identification technique based on the correlation between the key and the covert physical side channels used by attackers. Experimental results demonstrate the effectiveness of the proposed solution.
Keywords :
cryptography; invasive software; TSC identification technique; Trojan side channel design; Trojan side channel identification; covert side channels; cryptographic systems; general power-based TSC design; key cracking process complexity; Complexity theory; Correlation; Cryptography; Hardware; Power demand; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on
Conference_Location :
San Jose, CA
Type :
conf
DOI :
10.1109/ICCAD.2014.7001363
Filename :
7001363
Link To Document :
بازگشت