2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2019
DOI: 10.1109/asianhost47458.2019.9006725
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Unspecified Functionality in Obfuscated Hardware for Trojan and Fault Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Hu et al used internal don't-care conditions as a Trojan trigger [24]. Finally, Hu et al targeted obfuscated designs by focusing on incorrect obfuscation keys as unspecified functionality to insert the Trojan [62]. Works on hardware Trojans assume a strong threat model, where the adversary has physical or logical access to the design.…”
Section: A Don't-care Hardware Trojansmentioning
confidence: 99%
“…Hu et al used internal don't-care conditions as a Trojan trigger [24]. Finally, Hu et al targeted obfuscated designs by focusing on incorrect obfuscation keys as unspecified functionality to insert the Trojan [62]. Works on hardware Trojans assume a strong threat model, where the adversary has physical or logical access to the design.…”
Section: A Don't-care Hardware Trojansmentioning
confidence: 99%
“…Such don't care HTs can be hard to detect since they are out of the functional specification. A more recent work hides HT in the unspecified functionality in obfuscated hardware designs [13]. Based on the fact that the design functionality under incorrect obfuscation keys cannot be explicitly specified in order to protect the correct key, the IP designer has numerous flexibility in implementing the obfuscation logic, including inserting malicious circuitry.…”
Section: Hardware Trojanmentioning
confidence: 99%
“…Besides, several HTs target emerging computing technologies. In [13], a HT is hidden in the obfuscation logic intended for IP protection. In [6], a remote HT attack targeting multitenant FPGAs deployed in the cloud was demonstrated.…”
Section: ) Trojans Insertion Throughmentioning
confidence: 99%
See 1 more Smart Citation
“…Their idea was to use internal design states that will never be satisfied (e.g., two signals cannot be logical 1 at the same time) in normal operation as Trojan trigger. Another recent work used the unspecified functionality in an obfuscated design to implement hardware Trojans [16]; it leveraged the fact that the end user usually does not care about the design behavior under incorrect obfuscation keys. Existing don't-care Trojan research usually relies on a strong threat model, assuming physical or logical access to the Trojan design in order to manipulate inputs, inject faults, and probe the Trojan payload.…”
Section: B Don't-care Hardware Trojansmentioning
confidence: 99%