作者
Samaneh Ghandali, Georg T Becker, Daniel Holcomb, Christof Paar
发表日期
2016
研讨会论文
Cryptographic Hardware and Embedded Systems–CHES 2016
简介
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how particularly stealthy Trojans can be introduced to a given target circuit. The Trojans are triggered by violating the delays of very rare combinational logic paths. These are parametric Trojans, i.e., they do not require any additional logic and are purely based on subtle manipulations on the sub-transistor level to modify the parameters of the transistors. The Trojan insertion is based on a two-phase approach. In the first phase, a SAT-based algorithm identifies rarely sensitized paths in a combinational circuit. In the second phase, a genetic algorithm smartly …
引用总数
201720182019202020212022202358981247
学术搜索中的文章
S Ghandali, GT Becker, D Holcomb, C Paar - … Hardware and Embedded Systems–CHES 2016: 18th …, 2016