Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (2): 35-42.doi: 10.11959/j.issn.2096-109x.2021025

• Topic: Integrated Circuit Hardware Security • Previous Articles     Next Articles

Design and detection of hardware Trojan based on satisfiability don't cares

Lingjuan WU1,2, Jiacheng ZHU1, Shibo TANG1, Jing TAN1, Wei HU1   

  1. 1 School of Cyber Security, Northwestern Polytechnical University, Xi’an 710072, China
    2 College of Informatics, Huazhong Agricultural University, Wuhan 430070, China
  • Revised:2020-12-24 Online:2021-04-15 Published:2021-04-01
  • Supported by:
    The National Natural Science Foundation of China(62074131);The Natural Science Foundation of Hubei Province(2020CFB190)

Abstract:

Hardware Trojans are intended malicious design modifications to integrated circuits, which can be used to launch powerful low-level attacks after being activated.A new security threat of lightweight stealthy hardware Trojans leveraging discrete satisfiability don't care signals was demonstrated.These don't care could not be satisfied under normal operation and thus the circuit design with Trojan is functionally equivalent to the Trojan-free baseline.The attacker could activate the Trojan through simple yet effective fault injection.Experimental results on a 1024-bit RSA cryptographic core show that the proposed hardware Trojan can escape from logic synthesis optimization, and that the RSA private key can be retrieved by simply over-clocking the design.A defense technique that can effectively detect such stealthy Trojan design was provided.

Key words: hardware security, hardware Trojan, satisfiability don't care, fault injection, Trojan detection

CLC Number: 

No Suggested Reading articles found!