Title :
Stealth assessment of hardware Trojans in a microcontroller
Author :
Reece, Trey ; Limbrick, Daniel B. ; Wang, Xiaowen ; Kiddie, Bradley T. ; Robinson, William H.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Vanderbilt Univ., Nashville, TN, USA
fDate :
Sept. 30 2012-Oct. 3 2012
Abstract :
Many experimental hardware Trojans from the literature explore the potential threat vectors, but do not address the stealthiness of the malicious hardware. If a Trojan requires a large amount of area or power, then it can be easier to detect. Instead, a more focused attack can potentially avoid detection. This paper explores the cost in both area and power consumption of several small, focused attacks on an Intel 8051 microcontroller implemented with a standard cell library. The resulting cost in total area varied from a 0.4% increase in the design, down to a 0.150% increase in the design. Dynamic and leakage power showed similar results.
Keywords :
invasive software; microcontrollers; Intel 8051 microcontroller; attack detection; hardware Trojan; malicious hardware; potential threat vector; potentially avoid detection; power consumption; standard cell library; stealth assessment; Conferences; Hardware; Microcontrollers; Production; Reliability; Trojan horses;
Conference_Titel :
Computer Design (ICCD), 2012 IEEE 30th International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4673-3051-0
DOI :
10.1109/ICCD.2012.6378631