会议专题

Design of Hardware Trojan Horse Based on Counter

With globalization of the semiconductor design and fabrication process, hardware Trojan has become a new threat which risks to the security of integrated circuit. An adversary can design a Trojan to destroy a system or leak confidential information which is difficult for chip validation processes, such as manufacturing test, to detect. To facilitate research in this area, a better understanding of what Hardware Trojans would look like and what impact they would incur to a circuit is required. In this paper, a counter-based hardware Trojan horse within 8 LED marquee circuit is designed and implemented. First, a counterbased Trojan is designed and simulated functionally by ModelSim SE 6.2b. It is difficult to be activated and detected using random stimuli. Next, a marquee circuit is designed in Verilog HDL, which is used as a target circuit to implement and analyze the hardware Trojan. Marquee circuit was simulated by simulation tool, and implemented on a Spartan-3E Starter Kit Board. To this end, we insert the counter-based hardware Trojan into the marquee circuit to implement on a Spartan-3E Starter Kit Board. The experiment’s result shows that this type of the hardware Trojan is very flexible, it can be easily embedded in the target circuit and not easily found.

hardware trojan integrated circuit marquee circuit chip security

Huafeng LIU Hongwei LUO Liwei WANG

School of Electronic and Information Engineering South China University of Technology Guangzhou, Chi National Key Lab of Reliability Physics of Electronic Product CEPREI Guangzhou, China

国际会议

2011 International Conference on Quality,Reliability,Risk,Maintenance,and Safety Engineering(2011年质量、可靠性、风险、维修性与安全性国际会议暨第二届维修工程国际学术会议 ICQR2MSE 2011)

西安

英文

1086-1088

2011-06-17(万方平台首次上网日期,不代表论文的发表时间)