Title
Hardware Trojans In Wireless Cryptographic Ics: Silicon Demonstration &Amp; Detection Method Evaluation
Abstract
We present a silicon implementation of a hardware Trojan, which is capable of leaking the secret key of a wireless cryptographic integrated circuit (IC) consisting of an Advanced Encryption Standard (AES) core and an Ultra-Wide-Band (UWB) transmitter. With its impact carefully hidden in the transmission specification margins allowed for process variations, this hardware Trojan cannot be detected by production testing methods of either the digital or the analog part of the IC and does not violate the transmission protocol or any system-level specifications. Nevertheless, the informed adversary, who knows what to look for in the transmission power waveform, is capable of retrieving the 128-bit AES key, which is leaked with every 128-bit ciphertext block sent by the UWB transmitter. Using silicon measurements from 40 chips fabricated in TSMC's 0.35μm technology, we also assess the effectiveness of a side channel-based statistical analysis method in detecting this hardware Trojan. © 2013 IEEE.
Publication Date
12-1-2013
Publication Title
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD
Number of Pages
399-404
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICCAD.2013.6691149
Copyright Status
Unknown
Socpus ID
84893397569 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/84893397569
STARS Citation
Liu, Yu; Jin, Yier; and Makris, Yiorgos, "Hardware Trojans In Wireless Cryptographic Ics: Silicon Demonstration &Amp; Detection Method Evaluation" (2013). Scopus Export 2010-2014. 5830.
https://stars.library.ucf.edu/scopus2010/5830