Targeted modification of hardware trojans
Abstract
The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. Finally, this approach can bemore »
- Authors:
-
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
- Sandia National Lab. (SNL-CA), Livermore, CA (United States)
- Publication Date:
- Research Org.:
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sandia National Lab. (SNL-CA), Livermore, CA (United States)
- Sponsoring Org.:
- USDOE National Nuclear Security Administration (NNSA)
- OSTI Identifier:
- 1502452
- Alternate Identifier(s):
- OSTI ID: 1502454
- Report Number(s):
- SAND-2018-12772J; SAND-2018-9731J
Journal ID: ISSN 2509-3436; 669721
- Grant/Contract Number:
- AC04-94AL85000
- Resource Type:
- Accepted Manuscript
- Journal Name:
- Journal of Hardware and Systems Security (Online)
- Additional Journal Information:
- Journal Name: Journal of Hardware and Systems Security (Online); Journal Volume: 3; Journal Issue: 2; Journal ID: ISSN 2509-3436
- Publisher:
- Springer Nature
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; Hardware trojan prevention; Hardware trojan detection; Hardware security; Trusted hardware
Citation Formats
Hamlet, Jason R., Mayo, Jackson R., and Kammler, Vivian G. Targeted modification of hardware trojans. United States: N. p., 2019.
Web. doi:10.1007/s41635-018-0058-x.
Hamlet, Jason R., Mayo, Jackson R., & Kammler, Vivian G. Targeted modification of hardware trojans. United States. https://doi.org/10.1007/s41635-018-0058-x
Hamlet, Jason R., Mayo, Jackson R., and Kammler, Vivian G. Mon .
"Targeted modification of hardware trojans". United States. https://doi.org/10.1007/s41635-018-0058-x. https://www.osti.gov/servlets/purl/1502452.
@article{osti_1502452,
title = {Targeted modification of hardware trojans},
author = {Hamlet, Jason R. and Mayo, Jackson R. and Kammler, Vivian G.},
abstractNote = {The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. Finally, this approach can be applied to any digital circuit and does not rely on secret keys or obfuscation.},
doi = {10.1007/s41635-018-0058-x},
journal = {Journal of Hardware and Systems Security (Online)},
number = 2,
volume = 3,
place = {United States},
year = {Mon Mar 18 00:00:00 EDT 2019},
month = {Mon Mar 18 00:00:00 EDT 2019}
}
Works referenced in this record:
Hardware Trojan: Threats and emerging solutions
conference, November 2009
- Chakraborty, Rajat Subhra; Narasimhan, Seetharam; Bhunia, Swarup
- 2009 IEEE International High Level Design Validation and Test Workshop (HLDVT)
Stimulus generation for constrained random simulation
conference, November 2007
- Kitchen, Nathan; Kuehlmann, Andreas
- 2007 IEEE/ACM International Conference on Computer-Aided Design
The impact of diversity upon common mode failures
journal, January 1996
- Littlewood, Bev
- Reliability Engineering & System Safety, Vol. 51, Issue 1
Using computational game theory to guide verification and security in hardware designs
conference, May 2017
- Smith, Andrew M.; Mayo, Jackson R.; Kammler, Vivian
- 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
conference, May 2010
- Hicks, Matthew; Finnicum, Murph; King, Samuel T.
- 2010 IEEE Symposium on Security and Privacy
Scalable Test Generation for Trojan Detection Using Side Channel Analysis
journal, November 2018
- Huang, Yuanwen; Bhunia, Swarup; Mishra, Prabhat
- IEEE Transactions on Information Forensics and Security, Vol. 13, Issue 11
Guided test generation for isolation and detection of embedded trojans in ics
conference, January 2008
- Banga, Mainak; Chandrasekar, Maheshwar; Fang, Lei
- Proceedings of the 18th ACM Great Lakes symposium on VLSI - GLSVLSI '08
Common-mode failures in redundant VLSI systems: a survey
journal, January 2000
- Mitra, S.; Saxena, N. R.; McCluskey, E. J.
- IEEE Transactions on Reliability, Vol. 49, Issue 3
Functional polymorphism for intellectual property protection
conference, May 2016
- McDonald, Jeffrey T.; Kim, Yong C.; Andel, Todd R.
- 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
FANCI: identification of stealthy malicious logic using boolean functional analysis
conference, January 2013
- Waksman, Adam; Suozzo, Matthew; Sethumadhavan, Simha
- Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13
A Sensitivity Analysis of Power Signal Methods for Detecting Hardware Trojans Under Real Process and Environmental Conditions
journal, January 2010
- Rad, Reza; Plusquellic, Jim; Tehranipoor, Mohammad
- IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 18, Issue 12
Silencing Hardware Backdoors
conference, May 2011
- Waksman, Adam; Sethumadhavan, Simha
- 2011 IEEE Symposium on Security and Privacy (SP)
Dynamic Polymorphic Reconfiguration for anti-tamper circuits
conference, August 2009
- Porter, Roy; Stone, Samuel J.; Kim, Yong C.
- 2009 International Conference on Field Programmable Logic and Applications (FPL)
Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise
journal, December 2016
- Hoque, Tamzidul; Narasimhan, Seetharam; Wang, Xinmu
- Journal of Electronic Testing, Vol. 33, Issue 1
On design vulnerability analysis and trust benchmarks development
conference, October 2013
- Salmani, Hassan; Tehranipoor, Mohammad; Karri, Ramesh
- 2013 IEEE 31st International Conference on Computer Design (ICCD)
Dependable computing: From concepts to design diversity
journal, January 1986
- Avizienis, A.; Laprie, J. -C.
- Proceedings of the IEEE, Vol. 74, Issue 5
A Survey of Hardware Trojan Taxonomy and Detection
journal, January 2010
- Tehranipoor, Mohammad; Koushanfar, Farinaz
- IEEE Design & Test of Computers, Vol. 27, Issue 1
MOLES: malicious off-chip leakage enabled by side-channels
conference, January 2009
- Lin, Lang; Burleson, Wayne; Paar, Christof
- Proceedings of the 2009 International Conference on Computer-Aided Design - ICCAD '09
Towards trojan-free trusted ICs: problem analysis and detection scheme
conference, January 2008
- Wolff, Francis; Papachristou, Chris; Bhunia, Swarup
- Proceedings of the conference on Design, automation and test in Europe - DATE '08
On Computable Numbers, with an Application to the Entscheidungsproblem
journal, January 1937
- Turing, A. M.
- Proceedings of the London Mathematical Society, Vol. s2-42, Issue 1