DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Targeted modification of hardware trojans

Abstract

The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. Finally, this approach can bemore » applied to any digital circuit and does not rely on secret keys or obfuscation.« less

Authors:
 [1];  [2];  [1]
  1. Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
  2. Sandia National Lab. (SNL-CA), Livermore, CA (United States)
Publication Date:
Research Org.:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandia National Lab. (SNL-CA), Livermore, CA (United States)
Sponsoring Org.:
USDOE National Nuclear Security Administration (NNSA)
OSTI Identifier:
1502452
Alternate Identifier(s):
OSTI ID: 1502454
Report Number(s):
SAND-2018-12772J; SAND-2018-9731J
Journal ID: ISSN 2509-3436; 669721
Grant/Contract Number:  
AC04-94AL85000
Resource Type:
Accepted Manuscript
Journal Name:
Journal of Hardware and Systems Security (Online)
Additional Journal Information:
Journal Name: Journal of Hardware and Systems Security (Online); Journal Volume: 3; Journal Issue: 2; Journal ID: ISSN 2509-3436
Publisher:
Springer Nature
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; Hardware trojan prevention; Hardware trojan detection; Hardware security; Trusted hardware

Citation Formats

Hamlet, Jason R., Mayo, Jackson R., and Kammler, Vivian G. Targeted modification of hardware trojans. United States: N. p., 2019. Web. doi:10.1007/s41635-018-0058-x.
Hamlet, Jason R., Mayo, Jackson R., & Kammler, Vivian G. Targeted modification of hardware trojans. United States. https://doi.org/10.1007/s41635-018-0058-x
Hamlet, Jason R., Mayo, Jackson R., and Kammler, Vivian G. Mon . "Targeted modification of hardware trojans". United States. https://doi.org/10.1007/s41635-018-0058-x. https://www.osti.gov/servlets/purl/1502452.
@article{osti_1502452,
title = {Targeted modification of hardware trojans},
author = {Hamlet, Jason R. and Mayo, Jackson R. and Kammler, Vivian G.},
abstractNote = {The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. Finally, this approach can be applied to any digital circuit and does not rely on secret keys or obfuscation.},
doi = {10.1007/s41635-018-0058-x},
journal = {Journal of Hardware and Systems Security (Online)},
number = 2,
volume = 3,
place = {United States},
year = {Mon Mar 18 00:00:00 EDT 2019},
month = {Mon Mar 18 00:00:00 EDT 2019}
}

Works referenced in this record:

Hardware Trojan: Threats and emerging solutions
conference, November 2009

  • Chakraborty, Rajat Subhra; Narasimhan, Seetharam; Bhunia, Swarup
  • 2009 IEEE International High Level Design Validation and Test Workshop (HLDVT)
  • DOI: 10.1109/HLDVT.2009.5340158

Stimulus generation for constrained random simulation
conference, November 2007

  • Kitchen, Nathan; Kuehlmann, Andreas
  • 2007 IEEE/ACM International Conference on Computer-Aided Design
  • DOI: 10.1109/ICCAD.2007.4397275

The impact of diversity upon common mode failures
journal, January 1996


Using computational game theory to guide verification and security in hardware designs
conference, May 2017

  • Smith, Andrew M.; Mayo, Jackson R.; Kammler, Vivian
  • 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
  • DOI: 10.1109/HST.2017.7951808

Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
conference, May 2010

  • Hicks, Matthew; Finnicum, Murph; King, Samuel T.
  • 2010 IEEE Symposium on Security and Privacy
  • DOI: 10.1109/SP.2010.18

Scalable Test Generation for Trojan Detection Using Side Channel Analysis
journal, November 2018

  • Huang, Yuanwen; Bhunia, Swarup; Mishra, Prabhat
  • IEEE Transactions on Information Forensics and Security, Vol. 13, Issue 11
  • DOI: 10.1109/TIFS.2018.2833059

Guided test generation for isolation and detection of embedded trojans in ics
conference, January 2008

  • Banga, Mainak; Chandrasekar, Maheshwar; Fang, Lei
  • Proceedings of the 18th ACM Great Lakes symposium on VLSI - GLSVLSI '08
  • DOI: 10.1145/1366110.1366196

Common-mode failures in redundant VLSI systems: a survey
journal, January 2000

  • Mitra, S.; Saxena, N. R.; McCluskey, E. J.
  • IEEE Transactions on Reliability, Vol. 49, Issue 3
  • DOI: 10.1109/24.914545

Functional polymorphism for intellectual property protection
conference, May 2016

  • McDonald, Jeffrey T.; Kim, Yong C.; Andel, Todd R.
  • 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
  • DOI: 10.1109/HST.2016.7495557

FANCI: identification of stealthy malicious logic using boolean functional analysis
conference, January 2013

  • Waksman, Adam; Suozzo, Matthew; Sethumadhavan, Simha
  • Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
  • DOI: 10.1145/2508859.2516654

A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions
journal, January 2010

  • Rad, Reza; Plusquellic, Jim; Tehranipoor, Mohammad
  • IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 18, Issue 12
  • DOI: 10.1109/TVLSI.2009.2029117

Silencing Hardware Backdoors
conference, May 2011

  • Waksman, Adam; Sethumadhavan, Simha
  • 2011 IEEE Symposium on Security and Privacy (SP)
  • DOI: 10.1109/SP.2011.27

Dynamic Polymorphic Reconfiguration for anti-tamper circuits
conference, August 2009

  • Porter, Roy; Stone, Samuel J.; Kim, Yong C.
  • 2009 International Conference on Field Programmable Logic and Applications (FPL)
  • DOI: 10.1109/FPL.2009.5272469

Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise
journal, December 2016

  • Hoque, Tamzidul; Narasimhan, Seetharam; Wang, Xinmu
  • Journal of Electronic Testing, Vol. 33, Issue 1
  • DOI: 10.1007/s10836-016-5632-y

On design vulnerability analysis and trust benchmarks development
conference, October 2013

  • Salmani, Hassan; Tehranipoor, Mohammad; Karri, Ramesh
  • 2013 IEEE 31st International Conference on Computer Design (ICCD)
  • DOI: 10.1109/ICCD.2013.6657085

Dependable computing: From concepts to design diversity
journal, January 1986


A Survey of Hardware Trojan Taxonomy and Detection
journal, January 2010

  • Tehranipoor, Mohammad; Koushanfar, Farinaz
  • IEEE Design & Test of Computers, Vol. 27, Issue 1
  • DOI: 10.1109/MDT.2010.7

MOLES: malicious off-chip leakage enabled by side-channels
conference, January 2009

  • Lin, Lang; Burleson, Wayne; Paar, Christof
  • Proceedings of the 2009 International Conference on Computer-Aided Design - ICCAD '09
  • DOI: 10.1145/1687399.1687425

Towards trojan-free trusted ICs: problem analysis and detection scheme
conference, January 2008

  • Wolff, Francis; Papachristou, Chris; Bhunia, Swarup
  • Proceedings of the conference on Design, automation and test in Europe - DATE '08
  • DOI: 10.1145/1403375.1403703

On Computable Numbers, with an Application to the Entscheidungsproblem
journal, January 1937