{"title":"An Implementation of Trojan Side-Channel with a Masking Scheme","authors":"Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan","doi":"10.1109/CIS.2017.00131","DOIUrl":null,"url":null,"abstract":"Hardware trojans have posed great threats to the security of cryptographic devices, due to their invisibility and difficulty of removal. Trojan side-channel (TSC) is a kind of hardware trojan which leaks side channel information of the secrets in the devices. In this article, we present a new implementation of TSC for FPGAs. In the experiments, to verify its feasibility, we analysis the leakage model of our TSC implementation on FPGAs. Moreover, to resist the TSC detection, we apply a masking technique to our scheme by blinding the output of our TSC.","PeriodicalId":304958,"journal":{"name":"2017 13th International Conference on Computational Intelligence and Security (CIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 13th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2017.00131","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Hardware trojans have posed great threats to the security of cryptographic devices, due to their invisibility and difficulty of removal. Trojan side-channel (TSC) is a kind of hardware trojan which leaks side channel information of the secrets in the devices. In this article, we present a new implementation of TSC for FPGAs. In the experiments, to verify its feasibility, we analysis the leakage model of our TSC implementation on FPGAs. Moreover, to resist the TSC detection, we apply a masking technique to our scheme by blinding the output of our TSC.