Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2591513.2591520acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures

Published: 20 May 2014 Publication History

Abstract

Reconfigurable hardware including Field programmable gate arrays (FPGAs) are being used in a wide range of embedded applications including signal processing, multimedia, and security. FPGA device production is often outsourced to off-shore facilities for economic reasons. This opens up the opportunities for insertion of malicious design alterations in the foundry, referred to as hardware Trojan attacks, to cause logical and physical malfunction. The vulnerability of these devices to hardware attacks raises security concerns regarding hardware and design assurance. In this paper, we analyze hardware Trojan attacks in FPGA considering diverse activation and payload characteristics and derive a taxonomy of Trojan attacks in FPGA. To our knowledge, this is the first effort to analyze Trojan threats in FPGA hardware. Next, we propose a novel redundancy-based protection approach based on Trojan tolerance that modifies the application mapping process to provide high-level of protection against Trojans of varying forms and sizes. We show that the proposed approach incurs significantly higher security at lower overhead than conventional fault-tolerance schemes by exploiting the nature of Trojans and reconfiguration of FPGA resources.

References

[1]
S. Trimberger, "Trusted design in FPGAs," Design Automation Conference, 2007.
[2]
I. Hadzic, S. Udani, J. Smith, "FPGA viruses," International Workshop on Field Programmable Logic and Applications, 1999.
[3]
S. Drimer, "Volatile FPGA design security: a survey," Cambridge University, 2008.
[4]
T. Huffmire, "Handbook of FPGA design security," Design Automation Conference, 2007.
[5]
S. Trimberger, "Method and apparatus for protecting proprietary decryption keys for programmable logic devices," US Patent 6654889, 2003.
[6]
Aletar: Military Anti-Tampering Solutions Using Programmable Logic. {Online}. Available: http://www.altera.com/literature/cp/CP-01007.pdf.
[7]
D. Du, S. Narasimhan, R. S. Chakraborty, and S. Bhunia, "Self-referencing: a scalable side-channel approach for hardware Trojan detection", Workshop on Cryptographic Hardware and Embedded Systems, 2010.
[8]
R. S. Chakraborty, S. Narasimhan, and S. Bhunia, "Hardware Trojan: Treats and Emerging Solutions," International High Level Design Validation and Test Workshop, pp. 166--171, 2009.
[9]
L. Lin, W. Burleson, C. Paar, "MOLES: malicious off-chip leakage enabled by side-channels," International Conference on Computer-Aided Design, 2009.
[10]
R.S. Chakraborty, F. Wolff, S. Paul, C. Papachristou, S. Bhunia, "MERO: A Statistical Approach for Hardware Trojan Detection," Workshop on Cryptographic Hardware and Embedded Systems, 2009.
[11]
F. Wolff, C. Papachristou, S. Bhunia, and R.S. Chakraborty, "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme," DATE, 2008.
[12]
H. Kubatova and P. Kubalik, "Fault-Tolerant and Fail-Safe Design Based on Reconfiguration," Design and Test Technology for Dependable Systems-on-Chip, pp. 175--194, 2011.
[13]
N. Gaitanis, "The Design of Totally Self-Checking TMR Fault-Tolerant Systems," IEEE Transaction on Computers, vol. 37, no. 11, 1988.

Cited By

View all
  • (2025)A New Dynamic Countermeasure to Strengthen Design Obfuscation in FPGAsACM Transactions on Design Automation of Electronic Systems10.1145/3716502Online publication date: 5-Feb-2025
  • (2024)Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAsCryptography10.3390/cryptography80300368:3(36)Online publication date: 8-Aug-2024
  • (2024)Resilient and Secure Programmable System-on-Chip Accelerator Offload2024 43rd International Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS64841.2024.00016(52-65)Online publication date: 30-Sep-2024
  • Show More Cited By

Index Terms

  1. Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    GLSVLSI '14: Proceedings of the 24th edition of the great lakes symposium on VLSI
    May 2014
    376 pages
    ISBN:9781450328166
    DOI:10.1145/2591513
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 May 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. design
    2. fpga
    3. hardware security
    4. harware trojans
    5. security
    6. trust

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    GLSVLSI '14
    Sponsor:
    GLSVLSI '14: Great Lakes Symposium on VLSI 2014
    May 21 - 23, 2014
    Texas, Houston, USA

    Acceptance Rates

    GLSVLSI '14 Paper Acceptance Rate 49 of 179 submissions, 27%;
    Overall Acceptance Rate 312 of 1,156 submissions, 27%

    Upcoming Conference

    GLSVLSI '25
    Great Lakes Symposium on VLSI 2025
    June 30 - July 2, 2025
    New Orleans , LA , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)67
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)A New Dynamic Countermeasure to Strengthen Design Obfuscation in FPGAsACM Transactions on Design Automation of Electronic Systems10.1145/3716502Online publication date: 5-Feb-2025
    • (2024)Natural Language Processing for Hardware Security: Case of Hardware Trojan Detection in FPGAsCryptography10.3390/cryptography80300368:3(36)Online publication date: 8-Aug-2024
    • (2024)Resilient and Secure Programmable System-on-Chip Accelerator Offload2024 43rd International Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS64841.2024.00016(52-65)Online publication date: 30-Sep-2024
    • (2024)Extending FPGA Information Leaks with Trojan Phantom Circuits2024 International Symposium on Secure and Private Execution Environment Design (SEED)10.1109/SEED61283.2024.00011(1-10)Online publication date: 16-May-2024
    • (2024)Isolation Forest Based TinyML for Detecting Hardware Trojans on FPGA in Real Time2024 IEEE Physical Assurance and Inspection of Electronics (PAINE)10.1109/PAINE62042.2024.10792760(1-5)Online publication date: 12-Nov-2024
    • (2024)Runtime Self-Attestation of FPGA-Based IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2024.342910911:20(33406-33417)Online publication date: 15-Oct-2024
    • (2024)Transformers: A Security PerspectiveIEEE Access10.1109/ACCESS.2024.350937212(181071-181105)Online publication date: 2024
    • (2024)A Zero Trust-Based Framework Employing Blockchain Technology and Ring Oscillator Physical Unclonable Functions for Security of Field Programmable Gate Array Supply ChainIEEE Access10.1109/ACCESS.2024.341857212(89322-89338)Online publication date: 2024
    • (2024)A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate ArraysArabian Journal for Science and Engineering10.1007/s13369-024-09562-wOnline publication date: 23-Sep-2024
    • (2022)Markov Chain Model and Power Spectral Density of Hardware Trojan Detection2022 International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS55569.2022.00027(69-72)Online publication date: Jul-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media