Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels

IF 1 4区 工程技术 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Iet Circuits Devices & Systems Pub Date : 2021-06-25 DOI:10.1049/cds2.12088
Ying Zhang, Minghui Ge, Xin Chen, Jiaqi Yao, Zhiming Mao
{"title":"Blinding HT: Hiding Hardware Trojan signals traced across multiple sequential levels","authors":"Ying Zhang,&nbsp;Minghui Ge,&nbsp;Xin Chen,&nbsp;Jiaqi Yao,&nbsp;Zhiming Mao","doi":"10.1049/cds2.12088","DOIUrl":null,"url":null,"abstract":"<p>Modern electronic systems usually use third-party IP cores to build basic blocks. However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. But these methods can still be defeated by designing novel HTs. In this article, a method called Blinding HT is proposed, which camouflages itself as a normal circuit and is difficult to be triggered. The Blinding HT hides input signals of HT modules by tracing across multiple sequential levels. This method increases the influence of HT trigger inputs on output signals, so that trigger inputs are not be identified as redundant inputs. In this way, this approach can defeat the detection methods which identify weakly affecting trigger inputs and redundant trigger inputs across multiple sequential levels. As shown in the experimental results, the proposed HTs are hardly detected even by the novel HT detection approach based on machine learning algorithm. These HTs have small footprints on the design in terms of area and power to resist the side-channel effect analysis. The proposed HT has stealthiness, general applicability and imperceptibility.</p>","PeriodicalId":50386,"journal":{"name":"Iet Circuits Devices & Systems","volume":null,"pages":null},"PeriodicalIF":1.0000,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cds2.12088","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Iet Circuits Devices & Systems","FirstCategoryId":"5","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cds2.12088","RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Modern electronic systems usually use third-party IP cores to build basic blocks. However, there may be Hardware Trojans (HTs) in IP cores, which will cause critical security problem. There are already many HT detection methods which claim to detect all publicly available HT benchmarks. But these methods can still be defeated by designing novel HTs. In this article, a method called Blinding HT is proposed, which camouflages itself as a normal circuit and is difficult to be triggered. The Blinding HT hides input signals of HT modules by tracing across multiple sequential levels. This method increases the influence of HT trigger inputs on output signals, so that trigger inputs are not be identified as redundant inputs. In this way, this approach can defeat the detection methods which identify weakly affecting trigger inputs and redundant trigger inputs across multiple sequential levels. As shown in the experimental results, the proposed HTs are hardly detected even by the novel HT detection approach based on machine learning algorithm. These HTs have small footprints on the design in terms of area and power to resist the side-channel effect analysis. The proposed HT has stealthiness, general applicability and imperceptibility.

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
盲HT:隐藏硬件木马信号跟踪跨多个顺序级别
现代电子系统通常使用第三方IP核来构建基本模块。但是,IP核中可能存在硬件木马(Hardware Trojans),会造成严重的安全问题。已经有许多高温检测方法声称可以检测所有公开可用的高温基准。但是,这些方法仍然可以通过设计新颖的高温超导来击败。本文提出了一种称为盲HT的方法,该方法将自身伪装成正常电路,难以触发。盲HT通过跟踪多个顺序电平来隐藏HT模块的输入信号。该方法增加了高温触发输入对输出信号的影响,使触发输入不被识别为冗余输入。通过这种方式,该方法可以击败识别弱影响触发输入和跨多个连续级别冗余触发输入的检测方法。实验结果表明,即使采用基于机器学习算法的新型高温检测方法,也很难检测到高温。这些ht在面积和功率方面对设计的影响很小,可以抵抗侧通道效应分析。所提出的HT具有隐蔽性、通用性和不可感知性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Iet Circuits Devices & Systems
Iet Circuits Devices & Systems 工程技术-工程:电子与电气
CiteScore
3.80
自引率
7.70%
发文量
32
审稿时长
3 months
期刊介绍: IET Circuits, Devices & Systems covers the following topics: Circuit theory and design, circuit analysis and simulation, computer aided design Filters (analogue and switched capacitor) Circuit implementations, cells and architectures for integration including VLSI Testability, fault tolerant design, minimisation of circuits and CAD for VLSI Novel or improved electronic devices for both traditional and emerging technologies including nanoelectronics and MEMs Device and process characterisation, device parameter extraction schemes Mathematics of circuits and systems theory Test and measurement techniques involving electronic circuits, circuits for industrial applications, sensors and transducers
期刊最新文献
An Efficient Approximate Multiplier with Encoded Partial Products and Inexact Counter for Joint Photographic Experts Group Compression Synthetic Aperture Interferometric Passive Radiometer Imaging to Locate Electromagnetic Leakage From Spacecraft Surface Simultaneous Optimal Allocation of EVCSs and RESs Using an Improved Genetic Method Intelligent Control of Surgical Robot for Telesurgery: An Application to Smart Healthcare Systems A Multiphysical Field Dynamic Behavioral Model of Perpendicular STT-MTJ
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1