2021 IEEE International Symposium on Circuits and Systems (ISCAS) 2021
DOI: 10.1109/iscas51556.2021.9401481
|View full text |Cite
|
Sign up to set email alerts
|

Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO

Abstract: Design companies often outsource their integrated circuit (IC) fabrication to third parties where ICs are susceptible to malicious acts such as the insertion of a side-channel hardware trojan horse (SCT). In this paper, we present a framework for designing and inserting an SCT based on an engineering change order (ECO) flow, which makes it the first to disclose how effortlessly a trojan can be inserted into an IC. The trojan is designed with the goal of leaking multiple bits per power signature reading. Our fi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…2. Our trojan insertion methodology for an SCT capable of leaking 2 bits per power signature reading (modified from [10]).…”
Section: A Side-channel Trojan Designmentioning
confidence: 99%
See 3 more Smart Citations
“…2. Our trojan insertion methodology for an SCT capable of leaking 2 bits per power signature reading (modified from [10]).…”
Section: A Side-channel Trojan Designmentioning
confidence: 99%
“…Despite encouraging results reported from the SCT studies, only in [10] the authors discuss how SCTs could be inserted from the perspective of the attacker. Even more concerning, this discussion is also absent from silicon-validated trojans [15], [16], [21].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Hardware Trojans are known as one of the greatest threats against the trustworthiness of ICs, and they have raised serious concerns about the reliability and security of digital designs [2]. If an IC is utilized in a product/system while Trojan(s) remain there, it may lead to functionality change, reliability degradation/denial of service, and information or data leakage [3].…”
Section: Introductionmentioning
confidence: 99%