Title

Hardware Trojans In Wireless Cryptographic Ics: Silicon Demonstration &Amp; Detection Method Evaluation

Abstract

We present a silicon implementation of a hardware Trojan, which is capable of leaking the secret key of a wireless cryptographic integrated circuit (IC) consisting of an Advanced Encryption Standard (AES) core and an Ultra-Wide-Band (UWB) transmitter. With its impact carefully hidden in the transmission specification margins allowed for process variations, this hardware Trojan cannot be detected by production testing methods of either the digital or the analog part of the IC and does not violate the transmission protocol or any system-level specifications. Nevertheless, the informed adversary, who knows what to look for in the transmission power waveform, is capable of retrieving the 128-bit AES key, which is leaked with every 128-bit ciphertext block sent by the UWB transmitter. Using silicon measurements from 40 chips fabricated in TSMC's 0.35μm technology, we also assess the effectiveness of a side channel-based statistical analysis method in detecting this hardware Trojan. © 2013 IEEE.

Publication Date

12-1-2013

Publication Title

IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD

Number of Pages

399-404

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/ICCAD.2013.6691149

Socpus ID

84893397569 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/84893397569

This document is currently not available here.

Share

COinS