Journal of Guangdong University of Technology ›› 2013, Vol. 30 ›› Issue (4): 70-73.doi: 10.3969/j.issn.1007-7162.2013.04.012

• Comprehensive Studies • Previous Articles     Next Articles

Design and Detection of Hardware Trojan Based on Electromagnetic Leakage

Xie Hai1, 2,  En Yun-fei2, Wang Li-wei2   

  1. 1. School of Materials and Energy,Guangdong University of Technology, Guangzhou 510640, China; 2. Science and Technology on Reliability Physics and Application of Electronic Component Laboratory, CEPREI, Guangzhou 510610, China
  • Received:2013-03-18 Online:2013-12-30 Published:2013-12-30

Abstract: Aimed at the problem that integrated circuits (ICs) may be attacked by hardware Trojan during the process of design or fabrication, thereby posing a significant risk in terms of their trusted field operation, it introduces the basic principles and taxonomy of hardware Trojan, and proposes the design of a kind of hardware Trojan, based on electromagnetic leakage. The Trojan circuit can reveal the encryption key of cipher IC by using electromagnetic emission. Based on FPGA(Field Programmable Gate Array) chips, an automatic cipher circuit test platform of AES (Advanced Encryption Standard) was constructed. By the analysis of the side channel, the hardware Trojan circuit could be detected. The experimental results show that the hardware Trojan can secretly steal the 128 bit AES encryption key, and that the detection method can help to identify this type of Trojan in AES cipher circuit, achieving the detection rate of 10-2.

Key words: hardware Trojan; IC Security; FPGA(Field Programmable Gate Array); detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!