Academia.eduAcademia.edu

Outline

Efficient Triggering of Trojan Hardware Logic

Abstract

—The detection of malicious hardware logic (hardware Trojan) requires test patterns that succeed in exciting the malicious logic part. Testing of all possible input patterns is often prohibitively expensive. As an alternative, we explored previously the applicability of the combinatorial testing principles. In this paper, we turn our focus on the efficiency of this approach for triggering the hidden malicious logic. We present a series of experiments with Trojan designs of various activation patterns and lengths that target a cryptographic module performing AES cryptography. Our findings indicate that the available test suites succeed in triggering the malicious logic in all cases requiring only a very small number of test vectors. Thus, it is an efficient means for detecting malicious hardware logic.

References (24)

  1. R. George, "Why we should worry about the supply chain," International Jornal of Critical Infrastructure Protection, vol. 11, pp. 22-23, 2015.
  2. M. Rogers and C. D. Ruppersberger, Investigative Report on the US Na- tional Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE: A Report. US House of Representatives, 2012.
  3. J. Boyens, C. Paulsen, R. Moorthy, N. Bartol, and S. A. Shankles, "Sup- ply chain risk management practices for federal information systems and organizations," NIST Special Publication, vol. 800, no. 161, p. 1, 2014.
  4. European Network and Information Security (NIS) Platform, "Cyberse- curity Strategic Research Agenda -SRA," August 2015, final version v0.96.
  5. S. Adee, "The hunt for the kill switch," IEEE Spectrum, vol. 45, no. 5, pp. 34-39, 2008.
  6. A. Dabrowski, H. Hobel, J. Ullrich, K. Krombholz, and E. Weippl, "Towards a hardware Trojan detection cycle," in Availability, Reliability and Security (ARES), 2014 Ninth International Conference on, Sept 2014, pp. 287-294.
  7. P. Kitsos and A. Voyiatzis, "Towards a hardware Trojan detection methodology," in 2nd EUROMICRO/IEEE Workshop on Embedded and Cyber-Physical Systems (ECYPS 2014), Budva, Montenegro, Jun. 2014.
  8. D. Kuhn, R. Bryce, F. Duan, L. Ghandehari, Y. Lei, and R. Kacker, "Combinatorial testing: Theory and practice," Advances in Computers, 2015.
  9. P. Kitsos, D. Simos, J. Torres-Jimenez, and A. Voyiatzis, "Exciting FPGA cryptographic Trojans using combinatorial testing," in 26th IEEE International Symposium on Software Reliability Engineering, ser. ISSRE 2015. Gaithersburg, MD, USA, November 2-5, 2015: IEEE Computer Society, 2015, pp. 69-76.
  10. S. Bhasin, J.-L. Danger, S. Guilley, X. T. Ngo, and L. Sauvage, "Hardware Trojan horses in cryptographic IP cores," in Fault Diagnosis and Tolerance in Cryptography (FDTC), 2013 Workshop on. IEEE, 2013, pp. 15-29.
  11. P. Kitsos and A. Voyiatzis, "FPGA Trojan detection using length- optimized ring oscillators," in 17th EUROMICRO Conference on Digital System Design (DSD 2014). Verona, Italy: IEEE CPS, Aug. 2014.
  12. K. S. Kumar, R. Chanamala, S. R. Sahoo, and K. Mahapatra, "An improved AES hardware Trojan benchmark to validate Trojan detection schemes in an ASIC design flow," in VLSI Design and Test (VDAT), 2015 19th International Symposium on. IEEE, 2015, pp. 1-6.
  13. N. Lesperance, S. Kulkarni, and K.-T. T. Cheng, "Hardware Trojan detection using exhaustive testing of k-bit subspaces," in Design Au- tomation Conference (ASP-DAC), 2015 20th Asia and South Pacific. Tokyo, Japan: IEEE, Jan. 2015, pp. 755-760.
  14. M.-L. Flottes, S. Dupuis, P.-S. Ba, and B. Rouzeyre, "On the limitations of logic testing for detecting hardware Trojans horses," in Design & Technology of Integrated Systems in Nanoscale Era (DTIS), 2015 10th IEEE International Conference On. IEEE, 2015.
  15. R. S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, and S. Bhunia, "MERO: A statistical approach for hardware Trojan detection," in Cryp- tographic Hardware and Embedded Systems (CHES 2009). Springer, 2009, pp. 396-410.
  16. L. Fand, L. Li, and Z. Li, "A practical test patterns generation technique for hardware Trojan detection," ELEKTROTEHNIKI VESTNIK, vol. 80, no. 5, pp. 266-270, 2013.
  17. H. Salmani, M. Tehranipoor, and J. Plusquellic, "A novel technique for improving hardware Trojan detection and reducing Trojan activation time," Very Large Scale Integration (VLSI) Systems, IEEE Transactions on, vol. 20, no. 1, pp. 112-125, 2012.
  18. A. Sreedhar, S. Kundu, and I. Koren, "On reliability Trojan injection and detection," Journal of Low Power Electronics, vol. 8, no. 5, pp. 674-683, 2012.
  19. S. Ray, J. Yang, A. Basak, and S. Bhunia, "Correctness and security at odds: Post-silicon validation of modern SoC designs," in Proceedings of the 52nd Annual Design Automation Conference, ser. DAC '15. New York, NY, USA: ACM, 2015, pp. 146:1-146:6.
  20. T. Vidas and N. Christin, "Evading Android runtime analysis via sandbox detection," in Proceedings of the 9th ACM symposium on Information, computer and communications security. ACM, 2014, pp. 447-458.
  21. M. Lindorfer, C. Kolbitsch, and P. M. Comparetti, "Detecting environment-sensitive malware," in Recent Advances in Intrusion De- tection. Springer, 2011, pp. 338-357.
  22. X. Mingfu, H. Aiqun, H. Yi, and L. Guyue, "Monte Carlo based test pattern generation for hardware Trojan detection," in Dependable, Au- tonomic and Secure Computing (DASC), 2013 IEEE 11th International Conference on. IEEE, 2013, pp. 131-136.
  23. S. Dupuis, P.-S. Ba, M.-L. Flottes, G. Di Natale, and B. Rouzeyre, "New testing procedure for finding insertion sites of stealthy hardware Trojans," in Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE). EDA Consortium, 2015, pp. 776-781.
  24. A. Satoh, S. Morioka, K. Takano, and S. Munetoh, "A compact Ri- jndael hardware architecture with S-box optimization," in Advances in CryptologyASIACRYPT 2001. Springer, 2001, pp. 239-254.