3 research outputs found

    Implementing hardware Trojans: Experiences from a hardware Trojan challenge

    No full text
    Abstract—Hardware Trojans have become a growing concern in the design of secure integrated circuits. In this work, we present a set of novel hardware Trojans aimed at evading detection methods, designed as part of the CSAW Embedded System Challenge 2010. We introduced and implemented unique Trojans based on side-channel analysis that leak the secret key in the reference encryption algorithm. These side-channel-based Trojans do not impact the functionality of the design to minimize the possibility of detection. We have demonstrated the statistical analysis approach to attack such Trojans. Besides, we introduced Trojans that modify either the functional behavior or the electrical characteristics of the reference design. Novel techniques such as a Trojan draining the battery of a device do not have an immediate impact and hence avoid detection, but affect the long term reliability of the system. Keywords- Hardware Trojan, side-channel, hardware security I

    INTENTIONAL AND UNINTENTIONAL SIDE-CHANNELS IN EMBEDDED SYSTEMS

    No full text
    I would also like to thank CRI for a great internship as well as the students of my Security Engineering class for their patience with me (I really hope you enjoyed the class as I did). Last not least I want to thank my siblings, my “old friends ” in Germany, as well as my “new friends ” in the US for helping me keeping sane. Due to you guys, the last four years were actually quite fun:
    corecore