DocumentCode :
3547027
Title :
Designing and implementing hardware Trojans in ARM9 IP
Author :
Li Zhen ; Li Lei ; Feng WenFeng ; Fang Lei ; Zhao Zhiqiang
Author_Institution :
Res. Inst. of Electron. Sci. & Technol., UESTC, Chengdu, China
Volume :
2
fYear :
2013
fDate :
15-17 Nov. 2013
Firstpage :
524
Lastpage :
527
Abstract :
Hardware security to ensure trust in ICs has emerged as important research topic in recent years; several Trojan detection approaches are developed to prevent Trojans damage, which making Trojan inserting more and more difficult. In this paper we design Trojans in a simple ARM9 IP, which formed by 3-stage pipeline. This is the first time insert Hardware Trojans into popular processor. Our simulation result show that, with a negligible area overhead, our proposed method can significantly influence performance even disable the processor.
Keywords :
invasive software; microprocessor chips; pipeline processing; 3-stage pipeline; ARM9 IP; IC; Trojan detection approaches; Trojan inserting; Trojans damage; hardware Trojans; hardware security; Hardware; IP networks; Logic gates; Payloads; Random access memory; Registers; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, Circuits and Systems (ICCCAS), 2013 International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-3050-0
Type :
conf
DOI :
10.1109/ICCCAS.2013.6765398
Filename :
6765398
Link To Document :
بازگشت