Proceedings of the 24th Edition of the Great Lakes Symposium on VLSI 2014
DOI: 10.1145/2591513.2591520
|View full text |Cite
|
Sign up to set email alerts
|

Hardware trojan attacks in FPGA devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 43 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Mal-Sarkar [10] and Jacob [11] demonstrated that thirdparty IPs can allow attacks such as hardware Trojans and malware that can be launched within any device using the compromised IP. A use case is to compromise a SoC running a secure update.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Mal-Sarkar [10] and Jacob [11] demonstrated that thirdparty IPs can allow attacks such as hardware Trojans and malware that can be launched within any device using the compromised IP. A use case is to compromise a SoC running a secure update.…”
Section: Background and Related Workmentioning
confidence: 99%
“…OneofthemainsecurityissuesfacedbyanAESacceleratoronFPGAsthatareusedincloud environmentisthesecurityofsecretkeyusedforencryptioninsidetheFPGA (Trimberger&Moore, 2014). Several types of hardware Trojans are being inserted into the accelerator by attackers for leakingthesecretkey.TheTrojanscanbeinsertedindifferentphasesinacceleratorcreationsuch asdesign,integration,testing,andbitstreamtransfer.Generally,itisdifficulttofindaTrojanorthe triggeringconditionofaTrojanbecausetheTrojancircuitwilldisguiseasafunctionalcircuitthat isnecessaryforthedesign.Poweranalysis,comparingthedesignwithagoldenone(Trojan-free design),andsoonarethemainmethodsusedtofindaTrojaninadesign.Ifthereisakey-leaking Trojan,thenittakesmorepowerthanusual (Bhasin,Danger,Guilley,Ngo,&Sauvage,2013;Jin& Makris,2010;Johnson,Saha,Chakraborty,Mukhopadhyay,&Gören,2014).DetectingaTrojanina designthroughpoweranalysisisdifficultbecausetofindthetriggeringconditionistimeconsuming andneedtocheckwithalargenumberoftestinputs.Comparingwithagoldendesignislessefficient asthereisaneedtostoremorethantwogoldendesigns (Mal-Sarkar,Krishna,Ghosh,&Bhunia, 2014;Mal-Sarkar,Karametal.,2016).…”
Section: Introductionmentioning
confidence: 99%