Design of Hardware Trojan Horse Based on Counter
With globalization of the semiconductor design and fabrication process, hardware Trojan has become a new threat which risks to the security of integrated circuit. An adversary can design a Trojan to destroy a system or leak confidential information which is difficult for chip validation processes, such as manufacturing test, to detect. To facilitate research in this area, a better understanding of what Hardware Trojans would look like and what impact they would incur to a circuit is required. In this paper, a counter-based hardware Trojan horse within 8 LED marquee circuit is designed and implemented. First, a counterbased Trojan is designed and simulated functionally by ModelSim SE 6.2b. It is difficult to be activated and detected using random stimuli. Next, a marquee circuit is designed in Verilog HDL, which is used as a target circuit to implement and analyze the hardware Trojan. Marquee circuit was simulated by simulation tool, and implemented on a Spartan-3E Starter Kit Board. To this end, we insert the counter-based hardware Trojan into the marquee circuit to implement on a Spartan-3E Starter Kit Board. The experiment’s result shows that this type of the hardware Trojan is very flexible, it can be easily embedded in the target circuit and not easily found.
hardware trojan integrated circuit marquee circuit chip security
Huafeng LIU Hongwei LUO Liwei WANG
School of Electronic and Information Engineering South China University of Technology Guangzhou, Chi National Key Lab of Reliability Physics of Electronic Product CEPREI Guangzhou, China
国际会议
西安
英文
1086-1088
2011-06-17(万方平台首次上网日期,不代表论文的发表时间)