Proceedings of the 51st Annual Design Automation Conference 2014
DOI: 10.1145/2593069.2596677
|View full text |Cite
|
Sign up to set email alerts
|

Designing Stealthy Trojans with Sequential Logic

Abstract: This paper describes how a stealthy Trojan circuit can be inserted into a stream cipher module. The stream cipher utilizes several shift register-like structures to implement the keystream generator and to process the encrypted text. We demonstrate how an effective trigger can be built with the addition of just a few logic gates inserted between the shift registers and one additional flipflop. By distributing the inserted Trojan logic both temporally and over the logic design space, the malicious circuit is ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…The HTs proposed in Ref. [20] demonstrate the insertion of a few logic gates between the shift registers and an additional flip-flop to build the effective trigger. It implements a large number of small input gates to evade FANCI.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The HTs proposed in Ref. [20] demonstrate the insertion of a few logic gates between the shift registers and an additional flip-flop to build the effective trigger. It implements a large number of small input gates to evade FANCI.…”
Section: Discussionmentioning
confidence: 99%
“…The basic strategy of the HTs in Ref. [20] is to distribute the detection of the input sequence over time. This is based on the state information stored in the encryption circuit.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some articles designed or considered some potential HTs from the attacker’s point of view and put forward solutions to these HTs [ 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ]. Some researchers applied HTs to the real environment and designed a scheme to defend it [ 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 ]. Individual scholars proposed methods to reduce the effect of the HTs [ 44 , 45 ].…”
Section: Introductionmentioning
confidence: 99%