Hardware trojan horses in cryptographic IP cores

  • Shivam Bhasin
  • , Jean Luc Danger
  • , Sylvain Guilley
  • , Xuan Thuy Ngo
  • , Laurent Sauvage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. First, we show the efficiency of a medium cost hardware trojans detection method if the placement or the routing have been redone by the foundry. It consists in the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader. Second, we analyze the ability of an attacker to introduce a hardware trojan horse without changing neither the placement nor the routing of the cryptographic IP logic. On the example of an AES engine, we show that if the placement density is beyond 80%, the insertion is basically impossible. Therefore, this settles a simple design guidance to avoid trojan horses insertion in cryptographic IP blocks: have the design be compact enough, so that any functionally discreet trojan necessarily requires a complete replace and re-route, which is detected by mere optical imaging (and not complete chip reverse-engineering).

Original languageEnglish
Title of host publicationProceedings - 10th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2013
Pages15-29
Number of pages15
DOIs
Publication statusPublished - 9 Dec 2013
Externally publishedYes
Event10th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2013 - Santa Barbara, CA, United States
Duration: 20 Aug 201320 Aug 2013

Publication series

NameProceedings - 10th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2013

Conference

Conference10th Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2013
Country/TerritoryUnited States
CitySanta Barbara, CA
Period20/08/1320/08/13

Keywords

  • CUR
  • ECO P/R
  • Hardware trojan detection & insertion
  • optical vs GDSII comparison

Fingerprint

Dive into the research topics of 'Hardware trojan horses in cryptographic IP cores'. Together they form a unique fingerprint.

Cite this