Hardware Trojan

60

Transcript of Hardware Trojan

Page 1: Hardware Trojan
Page 2: Hardware Trojan

Content

0 Trojan

0 Software Trojan & its types

0 Hardware Trojan

0 Trigger Mechanism

0 Hardware Trojan Actions

0 Classification on the base of location of Trojan

0 Design Phases of Hardware Trojan

0 Prevention

0 Trojan Detection- Destructive & Non-Destructive Way

0 Examples of Hardware Trojan

Page 3: Hardware Trojan

Trojans

Page 4: Hardware Trojan

Trojan means playing any trick that causes a target to

invite a foe(unknowingly) into a securely protected space.

Page 5: Hardware Trojan

Trojan

Software Trojans

Hardware

Trojans

Page 6: Hardware Trojan

Software Trojan

Page 7: Hardware Trojan

Software Trojan is a program in

which malicious or harmful code is contained inside apparently

harmless programming or data in such a way that it can get control and do its chosen form of damage

Page 8: Hardware Trojan

Types of Software Trojan

0 Remote Access Trojans

0 Data Sending Trojans

0 Destructive Trojans

0 Proxy Trojans

0 FTP Trojans

0 Security software disabler Trojans

0 Denial-of-service attack (DoS) Trojans

Page 9: Hardware Trojan

Hardware Trojan

Page 10: Hardware Trojan

It a malicious addition or modification to the existing circuit elements that can change the functionality, reduce the

reliability, or leak valuable information which can be inserted at any phase of the

IC design

Page 11: Hardware Trojan

Trojans that are triggered usually requires two parts:

Trigger: It acts like a sensing circuitry, which activates a Trojan to perform a specific task.

Payload: It is responsible for the malicious activity of the trojan.

Once inserted into a system most Hardware Trojans will lie dormant until activated (or triggered) to perform malicious activity.

Page 12: Hardware Trojan

Trigger Mechanism

Trigger

Always On

Internally Triggered Externally Triggered

Page 13: Hardware Trojan

Always ON

0 Trojans that are always-on consists of only the payload part.

Examples:

0 Leaking data through a circuit based side channel

0 Devices on a wafer are modified to wear out after a certain time period (Reliability based Hardware Trojan)

Page 14: Hardware Trojan
Page 15: Hardware Trojan

Externally Triggered

0 External triggers rely on some interaction with the outside world, distinct from the system that the target device is integrated within

0 embedding a receiver or antenna within a target device

0 On-chip sensors that could monitor the external environment, including sensing temperature, voltages, EMI, humidity, and altitude.

Page 16: Hardware Trojan

Externally Triggered

0 A trigger may also come from another component that is externally connected, e.g., a connected memory device

Page 17: Hardware Trojan

Internally Triggered

0 Internally triggered Hardware Trojans rely on some specific internal state of the target device being reached

Page 18: Hardware Trojan

Internally Triggered

Combinational Activation

Sequential Activation

Page 19: Hardware Trojan

Combinational Activation

0 A Hardware Trojan is activated when certain values are detected simultaneously at specific internal circuit nodes within a device – a trigger state.

0 This type of trigger mechanism can be implemented solely by combinational logic.

0 e.g A specific address on bus triggers the Hardware Trojan

Page 20: Hardware Trojan
Page 21: Hardware Trojan

Sequential Activation

0 Sequentially triggered Hardware Trojans rely on a sequence of events occurring for activation.

Page 22: Hardware Trojan
Page 23: Hardware Trojan

Hardware Trojan Actions

Modify Functionality

Modify Specification Leak Information

Denial of Service

Page 24: Hardware Trojan

Modify Functionalities

0 Add logic

0 Remove logic

0 Bypass Logic

0 Change Content of programmable ROM

Page 25: Hardware Trojan

Modify Specification

0 Change Target IC’s parametric properties

Clock or timing parameters

Power usage

0 Done by directly influencing internsic IC properties that of wire and transistor geometry

Page 26: Hardware Trojan

Leak Information

0 Transmit information without knowledge to the user

RF

RS232

JTAG interface

Optical

Thermal

Power

Page 27: Hardware Trojan

Denial of Service

0 Trojan that affect service by exhausting scarce resources such as bandwidth

0 Disable partial or all power supply to a device

Page 28: Hardware Trojan

Location

Processor

Memory

Power Supply

I/0

Clock Grid

Page 29: Hardware Trojan

Specification

Design Fabrication

Testing and Assembling

Page 30: Hardware Trojan

Prevention

Page 31: Hardware Trojan

Trojan Detection

Page 32: Hardware Trojan

Trojan Detection

Destructive Method Non-Destructive Method

Page 33: Hardware Trojan

Trojan Detection- Destructive Method

Techniques:

0 Scanning optical microscopy(SOM)

0 Scanning Electron Microscope (SEM)

0 Voltage Contrast imaging(VCI)

0 Light-induced voltage alternation(LIVA)

0 Charge induced Voltage alternation(CIVA)

Page 34: Hardware Trojan

Light-induced voltage alternation(LIVA)

0 Optical beam generates photocarriers at focal point.

0 Photoconductive effect in integrated circuit (IC) creates local changes in resistance.

0 Change in Resistance causes the change in voltage

0 Digital record of voltage versus scanner position produces LIVA image.

Page 35: Hardware Trojan

Trojan Detection- Destructive Method

0 These techniques are ineffective in nanometer domain

0 Hacker is most likely to modify only a small random sample of chips in the production line.

0 Destructive methods of validating an IC are extremely expensive with respect to time and cost and technology intensive, with validation of a single IC taking months

Page 36: Hardware Trojan

Non-Destructive Method

Side-Channel Analysis

Logical Analysis

Built in TEST

Page 37: Hardware Trojan

Trojan Detection- Side-Channel Analysis

0 The side–channel analysis based techniques utilize the effect of an inserted Trojan on a measurable physical quantity like:

the supply current

path delays

Amount of heat produced in certain locations

Page 38: Hardware Trojan

Trojan Detection- Side-Channel Analysis

0 Such a measured circuit parameter can be referred as a fingerprint for the IC.

0 The Trojan does not need to be activated in order to be detected.

Page 39: Hardware Trojan

Trojan Detection- Side-Channel Analysis

0 An intelligent adversary can craft a very small Trojan circuit with just a few logic gates which causes minimal impact on circuit power or delay. Thus it can easily evade side–channel detection techniques

Page 40: Hardware Trojan

Trojan Detection- Side-Channel Analysis

1. Select a few ICs at random from a family of ICs (i.e., ICs with the same mask and manufactured in the same unit).

2. Run sufficient I/O tests multiple times on the selected ICs so as to exercise all of their expected circuitry and collect one or more side-channel signals from the ICs during these tests.

3. Use these side-channel signals to build a “side-channel fingerprint” for the IC family.

Page 41: Hardware Trojan

Trojan Detection- Side-Channel Analysis

4. Destructively test the selected ICs to validate that they are compliant to the original specifications.

5. All other ICs from the same family are nondestructively validated by subjecting them to the same I/O tests and validating that their side-channel signals are consistent with the “side-channel fingerprint” of the family.

Page 42: Hardware Trojan

Real Circuit(Green) Trojan Circuit (Blue)

100 MHz 500 Khz

Page 43: Hardware Trojan

Shadow Register

Page 44: Hardware Trojan
Page 45: Hardware Trojan

Logic Test Based Approach

Page 46: Hardware Trojan

y

0

0

0

0

0

x

0

z

Page 47: Hardware Trojan

y

0

0

0

0

1

x

0

z

Page 48: Hardware Trojan

0 000000

0 000001

0 001000

0 001001

0 001100

0 001101

0 010000

0 010001

0 011000

0 011001

0 011100

0 011101

0 100000

0 100001

0 101000

0 101001

0 101100

0 101101

0 110000

0 110001

0 111000

0 111001

0 111100

0 111101

Page 49: Hardware Trojan

y

0

0

0

0

1

x

0

z

Page 50: Hardware Trojan

Build in Test

Page 51: Hardware Trojan

Ring Oscillator

Page 52: Hardware Trojan

R01

R02

Page 53: Hardware Trojan
Page 54: Hardware Trojan
Page 55: Hardware Trojan

Examples

Page 56: Hardware Trojan

Assume a chip receives encrypted commands from an RF channel and stores the value in a register for subsequent decryption

Adversary transmits "code" that causes activation - missile detonates before reaching its target

Page 57: Hardware Trojan

Cell Phone Hardware Trojan

Page 58: Hardware Trojan

References 0 TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE

TROJANS - Ramesh Karri and Jeyavijayan Rajendran, Kurt Rosenfeld, Mohammad Tehranipoo

0 Hardware Trojan- Prevention, Detection & countermeasures - Mark

Beaumont, Bradley Hopkins and Tristan Newby

0 Hardware Trojan Detection Using Path Delay Fingerprint - Yier Jin, Yiorgos Makris

0 Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions - Xiaoxiao Wang, Mohammad Tehranipoor and Jim Plusquellic

0 Trojan Detection using IC Fingerprinting - Dakshi Agrawal, Selc¸uk Baktır,Deniz Karakoyunlu, Pankaj Rohatgi, Berk Sunar

0 Hardware Trojan Horse Detection Using Gate-Level Characterization - Miodrag Potkonjak, Ani Nahapetian, Michael Nelson, Tammara Massey

0 Design and Analysis of Ring Oscillator based Design-for-Trust technique - Jeyavijayan Rajendran, Vinayaka Jyothi, Ozgur Sinanoglu & Ramesh Karri

Page 59: Hardware Trojan

References

0 Hardware Trojan Detection Solutions and Design-for-Trust Challenges - Mohammad Tehranipoor, Hassan Salmani, Xuehui Zhang, Xiaoxiao Wang, Ramesh Karri, Jeyavijayan Rajendran, and Kurt Rosenfeld

0 At-Speed Delay Characterization for IC Authentication and Trojan Horse Detection - Jie Li, John Lach

0 A Survey of Hardware Trojan Taxonomy and Detection - Mohammad Tehranipoor, Farinaz Koushanfar

Page 60: Hardware Trojan

Thank You