SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
Design, Implementation and Security Analysis of Hardware Trojan 	

Threats in FPGA
Devu Manikantan Shila andVivekVenugopal {manikad,venugov}@utrc.utc.com
• Hardware Trojan Threats (HTTs) are virus-like stealthy
malicious components that can infect the Integrated
Circuit (IC). 	

• With the increasing practice of outsourcing design
and manufacturing steps, various stages of an IC
lifecycle are vulnerable to attacks; 	

!
!
!
!
!
!
!
!
!
!
• Destructive techniques such as de-packaging, reverse
engineering and imaging of ICs are very expensive and
can be applied to only a selected quantity of ICs. 	

• Non-destructive techniques such as side-channel
analysis (aka post-silicon analysis) detect malicious
intrusions by vetting the physical characteristics of IC
(power consumption, timing variation, temperature,
layout structures) with a trusted reference model.
Adversary model
[1] D. J.Wheeler and R. M. Needham.TEA, a tiny encryption algorithm, 1995. 	

[2] T. Huffmire,et. al,“Moats and drawbridges:An isolation primitive for reconfigurable hardware based systems,” in Security and Privacy, 2007. SP ’07. IEEE Symposium on, May 2007, pp. 281–295.	

[3]Y.Jin,N.Kupp andY.Makris,“Experiences in Hardware Trojan design and implementation,” in Hardware-Oriented Security andTrust, 2009. HOST ’09. IEEE InternationalWorkshop on, 2009, pp. 50–57	

[4] S.Wei, K. Li, F. Koushanfar, and M. Potkonjak,“Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry,” in Design Automation Conference (DAC), 2012 49th ACM/IEEE, 2012.
Implementation and Results
• Our results manifest that using power, timing or utilization, only a maximum of
57% of designed HTTs were detected. 	

•We proposed a novel metric called HTT detectability metric (HDM) that uses a
weighted combination of various physical parameters. 	

•The detection rate of HTTs increased to 86% with HDM. We also determine the
optimal HTT detection threshold that minimizes the summation of false alarm and
missed detection probabilities.	

•We found that the remaining 14% HTTs can be detected by monitoring IP access
activities.
Introduction
Insights and Conclusion
References
• Propose a novel metric for hardware Trojan
detection, termed as HTT detectability metric (HDM)
that leverages a weighted combination of normalized
physical parameters; carry out analytical studies to
derive the optimal detection threshold that minimizes
the summation of false alarm and missed detection
probabilities.	

• Design and implement three hardware Trojans at the
design level in FPGA Root of Trust (RoT) testbed to
defeat the classic trusted hardware model assumptions. DetectionRate(%)
0
25
50
75
100
Power Timing Resource HDM
Detection
System model
Contributions
•The attacker model leads to potential attack surfaces that can
be exploited to successfully leverage an attack, as shown on a
Xilinx Spartan-3AN FPGA development board
• The first testbed consists of a cryptosystem
using the block cipher based on Feistel Networks,
known as the Tiny Encryption Algorithm (TEA).	

• The second testbed is a classic Root of Trust
(RoT) design that consists of a secure memory
and a key guard. The authorized module is
allowed to access the contents of memory only
via a guard module.
Denial of Service HTT
Man-In-The-Middle HTT for beating
the authentication in the system
Component Usage Type of Access
FX2 Expansion Port, Expansion Headers,
USB, Ethernet
Leakage/Trigger Physical
ADC, DAC Leakage Physical
Audio Jack, LEDs, LCD,VGA, RS-232 Leakage Physical/Local
External clock Trigger Remote
Switches, Push Buttons Trigger Physical/Local
Address
Logic
Address
Logic
Response
Generator
Challenge
Generator
Encryption
Response
Generator
Memory
Authorized module Unauthorized module
Guard module
Guard system testbed
TEA Encryption/
Decryption module
Always On HTT
keys
input output
LED
keys
TEA Encryption/
Decryption module
Internal Trigger HTT
keys
input output
LED
keys
sequence
detector
enable leak
TEA Encryption/
Decryption modulekeys
input outputLegitimate User
input trigger
HTT
malformed
input
Address
Logic
Address
Logic
Response
Generator
Challenge
Generator
Encryption
Response
Generator
Memory
Authorized module Unauthorized module Guard module
Man-In-
The-
Middle
HTT
TEA Encryption/
Decryption module
keys
input
output
Denial of Service
HTT
clock
gated
clock
track event
occurrences
enable
Legitimate User HTT
Internal Trigger HTT
Always On Trigger HTT
•The target Spartan-3AN FPGA platform was analyzed to list the
potential leakage points, access points and external triggers an
attacker could utilize to design the Trojan. 	

• Several Trojans were designed and implemented in order to
compromise both testbeds, ranging from internally activated
Trojans to externally activated Trojans. Some HTTs compromised
the device by leaking critical information, while others
compromised by performing a denial of service attack.	

• With optimization, prior to and after the Trojan being inserted,
the footprint on the device was reduced, which helped the power,
timing and utilization profiles match more closely that of the
trusted system. HDM =
mp
i=1 Wi
Oi
Ai
DetectionRate(%)
0
25
50
75
100
Threshold
1 2 3 3.1 3.2 3.3 3.6 4 5
Detection
0
25
50
75
100
Threshold
1 3.1 3.2 3.3 3.6 4 5
PFA+PMD
optimal detection threshold
• HTT detectability metric (HDM)
uses a weighted combination of
normalized physical parameters,
Specification Design Synthesis Production First Ship
• Malicious IP blocks (RTL)	

• 3rd party tools and models	

• Rogue designer	

•Add-on scripts
• IP cloning	

• Modification of bitstream
• Steal and reverse engineer
FPGA design cycle with initial entry points

Mais conteúdo relacionado

Mais procurados

Boundary Scan Basics - x1149 de Keysight
Boundary Scan Basics - x1149 de KeysightBoundary Scan Basics - x1149 de Keysight
Boundary Scan Basics - x1149 de KeysightInterlatin
 
Jtag presentation
Jtag presentationJtag presentation
Jtag presentationklinetik
 
Predicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group KeysPredicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group Keysvanhoefm
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)Nitesh Bhatia
 
Pin pointpresentation
Pin pointpresentationPin pointpresentation
Pin pointpresentationLevan Huan
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC DefconRussia
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Conceptkodela3
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devicesErez Metula
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...Marina Krotofil
 
Ferns Presentation
Ferns PresentationFerns Presentation
Ferns PresentationLangLin
 
IRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
IRJET- Design and Characteristics of LIZARD Stream Cipher IP CoreIRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
IRJET- Design and Characteristics of LIZARD Stream Cipher IP CoreIRJET Journal
 
RFID: EPC protocol
RFID: EPC protocolRFID: EPC protocol
RFID: EPC protocolAmjed Majid
 
Lowering the bar: deep learning for side-channel analysis
Lowering the bar: deep learning for side-channel analysisLowering the bar: deep learning for side-channel analysis
Lowering the bar: deep learning for side-channel analysisRiscure
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Bufferpaperpublications3
 
The Building of Pulsed NQR/NMR Spectrometer
The Building of Pulsed NQR/NMR Spectrometer The Building of Pulsed NQR/NMR Spectrometer
The Building of Pulsed NQR/NMR Spectrometer IJECEIAES
 
Unit 5_interrupt programming_Part 1
Unit 5_interrupt programming_Part 1Unit 5_interrupt programming_Part 1
Unit 5_interrupt programming_Part 1KanchanPatil34
 

Mais procurados (20)

The IEEE 1149.1 Boundary-scan test standard
The IEEE 1149.1 Boundary-scan test standardThe IEEE 1149.1 Boundary-scan test standard
The IEEE 1149.1 Boundary-scan test standard
 
Boundary Scan Basics - x1149 de Keysight
Boundary Scan Basics - x1149 de KeysightBoundary Scan Basics - x1149 de Keysight
Boundary Scan Basics - x1149 de Keysight
 
Jtag presentation
Jtag presentationJtag presentation
Jtag presentation
 
Predicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group KeysPredicting and Abusing WPA2/802.11 Group Keys
Predicting and Abusing WPA2/802.11 Group Keys
 
JTAG Interface (Intro)
JTAG Interface (Intro)JTAG Interface (Intro)
JTAG Interface (Intro)
 
Pin pointpresentation
Pin pointpresentationPin pointpresentation
Pin pointpresentation
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
 
Test versus security @ IEEE Concept
Test versus security @ IEEE ConceptTest versus security @ IEEE Concept
Test versus security @ IEEE Concept
 
Hacking RF based IoT devices
Hacking RF based IoT devicesHacking RF based IoT devices
Hacking RF based IoT devices
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
 
RFID - MIMO Prototype based on GnuRadio
RFID - MIMO Prototype based on GnuRadioRFID - MIMO Prototype based on GnuRadio
RFID - MIMO Prototype based on GnuRadio
 
Ferns Presentation
Ferns PresentationFerns Presentation
Ferns Presentation
 
dft
dftdft
dft
 
IRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
IRJET- Design and Characteristics of LIZARD Stream Cipher IP CoreIRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
IRJET- Design and Characteristics of LIZARD Stream Cipher IP Core
 
RFID: EPC protocol
RFID: EPC protocolRFID: EPC protocol
RFID: EPC protocol
 
Lowering the bar: deep learning for side-channel analysis
Lowering the bar: deep learning for side-channel analysisLowering the bar: deep learning for side-channel analysis
Lowering the bar: deep learning for side-channel analysis
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Buffer
 
The Building of Pulsed NQR/NMR Spectrometer
The Building of Pulsed NQR/NMR Spectrometer The Building of Pulsed NQR/NMR Spectrometer
The Building of Pulsed NQR/NMR Spectrometer
 
Unit 5_interrupt programming_Part 1
Unit 5_interrupt programming_Part 1Unit 5_interrupt programming_Part 1
Unit 5_interrupt programming_Part 1
 
40120140502003
4012014050200340120140502003
40120140502003
 

Destaque

シールドブックメーカーなの。使い方
シールドブックメーカーなの。使い方シールドブックメーカーなの。使い方
シールドブックメーカーなの。使い方fira_ultramarin
 
Planning powerpoint
Planning powerpointPlanning powerpoint
Planning powerpointm_thompson66
 
AkinAkintayo_CVFeb16-02-Doc
AkinAkintayo_CVFeb16-02-DocAkinAkintayo_CVFeb16-02-Doc
AkinAkintayo_CVFeb16-02-DocAkin Akintayo
 
Программный комплекс видеозаписи судебных заседаний
Программный комплекс видеозаписи судебных заседанийПрограммный комплекс видеозаписи судебных заседаний
Программный комплекс видеозаписи судебных заседанийКРОК
 
Targeting Humans by Michael King
Targeting Humans by Michael KingTargeting Humans by Michael King
Targeting Humans by Michael KingMichael King
 
Экономим на закупках оборудования
Экономим на закупках оборудованияЭкономим на закупках оборудования
Экономим на закупках оборудованияКРОК
 
Transport Layer (L4) of MIPI Unipro - An Introduction
Transport Layer (L4) of MIPI Unipro - An IntroductionTransport Layer (L4) of MIPI Unipro - An Introduction
Transport Layer (L4) of MIPI Unipro - An IntroductionArrow Devices
 
istiklal marşı ve bayrak
istiklal marşı ve bayrakistiklal marşı ve bayrak
istiklal marşı ve bayrakmavi_patikli
 
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...MIPI Alliance
 
BHEL SUMMER TRAINING REPORT
BHEL SUMMER TRAINING REPORTBHEL SUMMER TRAINING REPORT
BHEL SUMMER TRAINING REPORTBhupendra Shukla
 
Lab procedures / dental education in india
Lab procedures / dental education in indiaLab procedures / dental education in india
Lab procedures / dental education in indiaIndian dental academy
 
Guinea conakry - country profile (2006)
Guinea conakry - country profile (2006)Guinea conakry - country profile (2006)
Guinea conakry - country profile (2006)Sérgio Branco
 

Destaque (16)

シールドブックメーカーなの。使い方
シールドブックメーカーなの。使い方シールドブックメーカーなの。使い方
シールドブックメーカーなの。使い方
 
Planning powerpoint
Planning powerpointPlanning powerpoint
Planning powerpoint
 
NEHA K NASAR CV
NEHA K NASAR CVNEHA K NASAR CV
NEHA K NASAR CV
 
AkinAkintayo_CVFeb16-02-Doc
AkinAkintayo_CVFeb16-02-DocAkinAkintayo_CVFeb16-02-Doc
AkinAkintayo_CVFeb16-02-Doc
 
Ramon O' Vryan D. Vital
Ramon O' Vryan D. VitalRamon O' Vryan D. Vital
Ramon O' Vryan D. Vital
 
Программный комплекс видеозаписи судебных заседаний
Программный комплекс видеозаписи судебных заседанийПрограммный комплекс видеозаписи судебных заседаний
Программный комплекс видеозаписи судебных заседаний
 
LATEST SHORT CV 2015
LATEST SHORT CV 2015LATEST SHORT CV 2015
LATEST SHORT CV 2015
 
Targeting Humans by Michael King
Targeting Humans by Michael KingTargeting Humans by Michael King
Targeting Humans by Michael King
 
Экономим на закупках оборудования
Экономим на закупках оборудованияЭкономим на закупках оборудования
Экономим на закупках оборудования
 
Transport Layer (L4) of MIPI Unipro - An Introduction
Transport Layer (L4) of MIPI Unipro - An IntroductionTransport Layer (L4) of MIPI Unipro - An Introduction
Transport Layer (L4) of MIPI Unipro - An Introduction
 
istiklal marşı ve bayrak
istiklal marşı ve bayrakistiklal marşı ve bayrak
istiklal marşı ve bayrak
 
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...
MIPI DevCon 2016: MIPI RFFE - Challenging the WiFi/Bluetooth Status Quo by Un...
 
BHEL SUMMER TRAINING REPORT
BHEL SUMMER TRAINING REPORTBHEL SUMMER TRAINING REPORT
BHEL SUMMER TRAINING REPORT
 
Lab procedures / dental education in india
Lab procedures / dental education in indiaLab procedures / dental education in india
Lab procedures / dental education in india
 
минаков
минаковминаков
минаков
 
Guinea conakry - country profile (2006)
Guinea conakry - country profile (2006)Guinea conakry - country profile (2006)
Guinea conakry - country profile (2006)
 

Semelhante a Detecting Hardware Trojans in FPGAs Using a Novel Metric

Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kuniyasu Suzaki
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionPersiPersi1
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsAgence du Numérique (AdN)
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Riscure
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaYogesh Ojha
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018FrenchTechCentral
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSoumitra Bhattacharyya
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Ollie Whitehouse
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningVEDLIoT Project
 
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Graeme Jenkinson
 
Verification of Security for Untrusted Third Party IP Cores
Verification of  Security for Untrusted Third Party IP CoresVerification of  Security for Untrusted Third Party IP Cores
Verification of Security for Untrusted Third Party IP CoresIRJET Journal
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Chris Sistrunk
 
Bsides Puerto Rico-2017
Bsides Puerto Rico-2017Bsides Puerto Rico-2017
Bsides Puerto Rico-2017Price McDonald
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...CODE BLUE
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 

Semelhante a Detecting Hardware Trojans in FPGAs Using a Novel Metric (20)

Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
Kernel Memory Protection by an Insertable Hypervisor which has VM Introspec...
 
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsxDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
xDEFENSE: An Extended DEFENSE for mitigating Next Generation Intrusions
 
FPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusionFPGA_prototyping proccesing with conclusion
FPGA_prototyping proccesing with conclusion
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?
 
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh OjhaKazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
 
IOT Exploitation
IOT Exploitation	IOT Exploitation
IOT Exploitation
 
Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018Inria Tech Talk IoT - 28 Mars 2018
Inria Tech Talk IoT - 28 Mars 2018
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devices
 
Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems Practical Security Assessments of IoT Devices and Systems
Practical Security Assessments of IoT Devices and Systems
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
Prezentare tcs2011
Prezentare tcs2011Prezentare tcs2011
Prezentare tcs2011
 
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
 
Verification of Security for Untrusted Third Party IP Cores
Verification of  Security for Untrusted Third Party IP CoresVerification of  Security for Untrusted Third Party IP Cores
Verification of Security for Untrusted Third Party IP Cores
 
Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023Proactive Approach to OT incident response - HOUSECCON 2023
Proactive Approach to OT incident response - HOUSECCON 2023
 
Bsides Puerto Rico-2017
Bsides Puerto Rico-2017Bsides Puerto Rico-2017
Bsides Puerto Rico-2017
 
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by  Vi...
[cb22] Red light in the factory - From 0 to 100 OT adversary emulation by Vi...
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 

Último

DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectssuserb6619e
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxmamansuratman0253
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMNanaAgyeman13
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate productionChinnuNinan
 

Último (20)

DM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in projectDM Pillar Training Manual.ppt will be useful in deploying TPM in project
DM Pillar Training Manual.ppt will be useful in deploying TPM in project
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptxCooling Tower SERD pH drop issue (11 April 2024) .pptx
Cooling Tower SERD pH drop issue (11 April 2024) .pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMMchpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
chpater16.pptxMMMMMMMMMMMMMMMMMMMMMMMMMMM
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
Crushers to screens in aggregate production
Crushers to screens in aggregate productionCrushers to screens in aggregate production
Crushers to screens in aggregate production
 

Detecting Hardware Trojans in FPGAs Using a Novel Metric

  • 1. Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGA Devu Manikantan Shila andVivekVenugopal {manikad,venugov}@utrc.utc.com • Hardware Trojan Threats (HTTs) are virus-like stealthy malicious components that can infect the Integrated Circuit (IC). • With the increasing practice of outsourcing design and manufacturing steps, various stages of an IC lifecycle are vulnerable to attacks; ! ! ! ! ! ! ! ! ! ! • Destructive techniques such as de-packaging, reverse engineering and imaging of ICs are very expensive and can be applied to only a selected quantity of ICs. • Non-destructive techniques such as side-channel analysis (aka post-silicon analysis) detect malicious intrusions by vetting the physical characteristics of IC (power consumption, timing variation, temperature, layout structures) with a trusted reference model. Adversary model [1] D. J.Wheeler and R. M. Needham.TEA, a tiny encryption algorithm, 1995. [2] T. Huffmire,et. al,“Moats and drawbridges:An isolation primitive for reconfigurable hardware based systems,” in Security and Privacy, 2007. SP ’07. IEEE Symposium on, May 2007, pp. 281–295. [3]Y.Jin,N.Kupp andY.Makris,“Experiences in Hardware Trojan design and implementation,” in Hardware-Oriented Security andTrust, 2009. HOST ’09. IEEE InternationalWorkshop on, 2009, pp. 50–57 [4] S.Wei, K. Li, F. Koushanfar, and M. Potkonjak,“Hardware trojan horse benchmark via optimal creation and placement of malicious circuitry,” in Design Automation Conference (DAC), 2012 49th ACM/IEEE, 2012. Implementation and Results • Our results manifest that using power, timing or utilization, only a maximum of 57% of designed HTTs were detected. •We proposed a novel metric called HTT detectability metric (HDM) that uses a weighted combination of various physical parameters. •The detection rate of HTTs increased to 86% with HDM. We also determine the optimal HTT detection threshold that minimizes the summation of false alarm and missed detection probabilities. •We found that the remaining 14% HTTs can be detected by monitoring IP access activities. Introduction Insights and Conclusion References • Propose a novel metric for hardware Trojan detection, termed as HTT detectability metric (HDM) that leverages a weighted combination of normalized physical parameters; carry out analytical studies to derive the optimal detection threshold that minimizes the summation of false alarm and missed detection probabilities. • Design and implement three hardware Trojans at the design level in FPGA Root of Trust (RoT) testbed to defeat the classic trusted hardware model assumptions. DetectionRate(%) 0 25 50 75 100 Power Timing Resource HDM Detection System model Contributions •The attacker model leads to potential attack surfaces that can be exploited to successfully leverage an attack, as shown on a Xilinx Spartan-3AN FPGA development board • The first testbed consists of a cryptosystem using the block cipher based on Feistel Networks, known as the Tiny Encryption Algorithm (TEA). • The second testbed is a classic Root of Trust (RoT) design that consists of a secure memory and a key guard. The authorized module is allowed to access the contents of memory only via a guard module. Denial of Service HTT Man-In-The-Middle HTT for beating the authentication in the system Component Usage Type of Access FX2 Expansion Port, Expansion Headers, USB, Ethernet Leakage/Trigger Physical ADC, DAC Leakage Physical Audio Jack, LEDs, LCD,VGA, RS-232 Leakage Physical/Local External clock Trigger Remote Switches, Push Buttons Trigger Physical/Local Address Logic Address Logic Response Generator Challenge Generator Encryption Response Generator Memory Authorized module Unauthorized module Guard module Guard system testbed TEA Encryption/ Decryption module Always On HTT keys input output LED keys TEA Encryption/ Decryption module Internal Trigger HTT keys input output LED keys sequence detector enable leak TEA Encryption/ Decryption modulekeys input outputLegitimate User input trigger HTT malformed input Address Logic Address Logic Response Generator Challenge Generator Encryption Response Generator Memory Authorized module Unauthorized module Guard module Man-In- The- Middle HTT TEA Encryption/ Decryption module keys input output Denial of Service HTT clock gated clock track event occurrences enable Legitimate User HTT Internal Trigger HTT Always On Trigger HTT •The target Spartan-3AN FPGA platform was analyzed to list the potential leakage points, access points and external triggers an attacker could utilize to design the Trojan. • Several Trojans were designed and implemented in order to compromise both testbeds, ranging from internally activated Trojans to externally activated Trojans. Some HTTs compromised the device by leaking critical information, while others compromised by performing a denial of service attack. • With optimization, prior to and after the Trojan being inserted, the footprint on the device was reduced, which helped the power, timing and utilization profiles match more closely that of the trusted system. HDM = mp i=1 Wi Oi Ai DetectionRate(%) 0 25 50 75 100 Threshold 1 2 3 3.1 3.2 3.3 3.6 4 5 Detection 0 25 50 75 100 Threshold 1 3.1 3.2 3.3 3.6 4 5 PFA+PMD optimal detection threshold • HTT detectability metric (HDM) uses a weighted combination of normalized physical parameters, Specification Design Synthesis Production First Ship • Malicious IP blocks (RTL) • 3rd party tools and models • Rogue designer •Add-on scripts • IP cloning • Modification of bitstream • Steal and reverse engineer FPGA design cycle with initial entry points