Title :
EM-based detection of hardware trojans on FPGAs
Author :
Soll, Oliver ; Korak, Thomas ; Muehlberghuber, Michael ; Hutter, Marcus
Author_Institution :
Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol., Graz, Austria
Abstract :
The detectability of malicious circuitry on FPGAs with varying placement properties yet has to be investigated. The authors utilize a Xilinx Virtex-II Pro target platform in order to insert a sequential denial-of-service Trojan into an existing AES design by manipulating a Xilinx-specific, intermediate file format prior to the bitstream generation. Thereby, there is no need for an attacker to acquire access to the hardware description language representation of a potential target architecture. Using a side-channel analysis setup for electromagnetic emanation (EM) measurements, they evaluate the detectability of different Trojan designs with varying location and logic distribution properties. The authors successfully distinguish the malicious from the genuine designs and provide information on how the location and distribution properties of the Trojan logic affect its detectability. To the best of their knowledge, this has been the first practically conducted Trojan detection using localized EM measurements.
Keywords :
field programmable gate arrays; invasive software; logic design; AES design; EM measurement; EM-based detection; FPGA; Xilinx Virtex-II Pro target; electromagnetic emanation; hardware Trojan detection; malicious circuitry; sequential denial-of-service; side-channel analysis; Clocks; Field programmable gate arrays; Hardware; Layout; Probes; Software; Trojan horses; Hardware Trojan injection; RapidSmith; Trojan placement; electromagnetic emanation; side-channel analysis;
Conference_Titel :
Hardware-Oriented Security and Trust (HOST), 2014 IEEE International Symposium on
Conference_Location :
Arlington, VA
Print_ISBN :
978-1-4799-4114-8
DOI :
10.1109/HST.2014.6855574