1 research outputs found
Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream
The threat of inserting hardware Trojans during the design, production, or
in-field poses a danger for integrated circuits in real-world applications. A
particular critical case of hardware Trojans is the malicious manipulation of
third-party FPGA configurations. In addition to attack vectors during the
design process, FPGAs can be infiltrated in a non-invasive manner after
shipment through alterations of the bitstream. First, we present an improved
methodology for bitstream file format reversing. Second, we introduce a novel
idea for Trojan insertion