Aderinola Gbade-Alabi, D. Keezer, V. Mooney, A. Poschmann, Marc Stöttinger, Kshitij Divekar
{"title":"基于签名的木马检测体系结构","authors":"Aderinola Gbade-Alabi, D. Keezer, V. Mooney, A. Poschmann, Marc Stöttinger, Kshitij Divekar","doi":"10.1145/2668322.2668325","DOIUrl":null,"url":null,"abstract":"Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards \"fabless\" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques. In this paper we propose an architecture to detect HTs during IC test or at run-time. An HT that would corrupt an IC's output and otherwise proceed undetected will then be rendered useless by this architecture. This approach will therefore discourage the insertion of HTs in the first place. The proposed architecture takes encryption hardware as a paradigmatic case-study and uses digital \"signatures\" derived from the plaintext to identify if the ciphertext has been corrupted by HTs. We test this methodology through simulation on various types of HTs inserted into a lightweight cryptographic system called \"PRESENT\"[13]. Our results validate that activated HTs are detected by this methodology.","PeriodicalId":434126,"journal":{"name":"WESS '14","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A signature based architecture for Trojan detection\",\"authors\":\"Aderinola Gbade-Alabi, D. Keezer, V. Mooney, A. Poschmann, Marc Stöttinger, Kshitij Divekar\",\"doi\":\"10.1145/2668322.2668325\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards \\\"fabless\\\" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques. In this paper we propose an architecture to detect HTs during IC test or at run-time. An HT that would corrupt an IC's output and otherwise proceed undetected will then be rendered useless by this architecture. This approach will therefore discourage the insertion of HTs in the first place. The proposed architecture takes encryption hardware as a paradigmatic case-study and uses digital \\\"signatures\\\" derived from the plaintext to identify if the ciphertext has been corrupted by HTs. We test this methodology through simulation on various types of HTs inserted into a lightweight cryptographic system called \\\"PRESENT\\\"[13]. Our results validate that activated HTs are detected by this methodology.\",\"PeriodicalId\":434126,\"journal\":{\"name\":\"WESS '14\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"WESS '14\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/2668322.2668325\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"WESS '14","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2668322.2668325","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A signature based architecture for Trojan detection
Trust in the integrated circuit (IC) fabrication industry is an ongoing concern given the trend towards "fabless" design and associated use of third-parties for fabrication. A Hardware Trojan (HT) introduced during fabrication can corrupt an IC's outputs, leak secret information, and yet go undetected by traditional system testing techniques. In this paper we propose an architecture to detect HTs during IC test or at run-time. An HT that would corrupt an IC's output and otherwise proceed undetected will then be rendered useless by this architecture. This approach will therefore discourage the insertion of HTs in the first place. The proposed architecture takes encryption hardware as a paradigmatic case-study and uses digital "signatures" derived from the plaintext to identify if the ciphertext has been corrupted by HTs. We test this methodology through simulation on various types of HTs inserted into a lightweight cryptographic system called "PRESENT"[13]. Our results validate that activated HTs are detected by this methodology.