DocumentCode
1787626
Title
On Trojan side channel design and identification
Author
Jie Zhang ; Guantong Su ; Yannan Liu ; Lingxiao Wei ; Feng Yuan ; Guoqiang Bai ; Qiang Xu
Author_Institution
Dept. of Comput. Sci. & Eng, Chinese Univ. of Hong Kong, Hong Kong, China
fYear
2014
fDate
2-6 Nov. 2014
Firstpage
278
Lastpage
285
Abstract
Trojan side channels (TSCs) are serious threats to the security of cryptographic systems because they facilitate to leak secret keys to attackers via covert side channels that are unknown to designers. To tackle this problem, we present a new hardware Trojan detection technique for TSCs. To be specific, we first investigate general power-based TSC designs and discuss the tradeoff between their hardware cost and the complexity of the key cracking process. Next, we present our TSC identification technique based on the correlation between the key and the covert physical side channels used by attackers. Experimental results demonstrate the effectiveness of the proposed solution.
Keywords
cryptography; invasive software; TSC identification technique; Trojan side channel design; Trojan side channel identification; covert side channels; cryptographic systems; general power-based TSC design; key cracking process complexity; Complexity theory; Correlation; Cryptography; Hardware; Power demand; Trojan horses;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer-Aided Design (ICCAD), 2014 IEEE/ACM International Conference on
Conference_Location
San Jose, CA
Type
conf
DOI
10.1109/ICCAD.2014.7001363
Filename
7001363
Link To Document