Stealthy Dopant-Level Hardware Trojans
http://people.umass.edu/gbecker/BeckerChes13.pdf Stealthy Dopant-Level Hardware Trojans ? Georg T. Becker1 , Francesco Regazzoni2 , Christof Paar1,3 , and Wayne P. Burleson1 1University of Massachusetts Amherst, USA 2TU Delft, The Netherlands and ALaRI - University of Lugano, Switzerland 3Horst ortz Institut for IT-Security, Ruhr-Universiat Bochum, Germany Abstract. In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or critical infrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans in practice yet, little is known about how such a Trojan would look like, and how dicult it would be in practice to implement one. In this paper we propose an extremely stealthy approach for implementing hardware Trojans below the gate level, and we evaluate their impact on the security of the target device. Instead of adding additional circuitry to the target design, we insert our hardware Trojans by changing the dopant polarity of existing transistors. Since the modified circuit appears legitimate on all wiring layers (including all metal and polysilicon), our family of Trojans is resistant to most detection techniques, including fine-grain optical inspection and checking against "golden chips". We demonstrate the ectiveness of our approach by inserting Trojans into two designs | a digital post-processing derived from Intel's cryptographically secure RNG design used in the Ivy Bridge processors and a side-channel resistant SBox implementation and by exploring their detectability and their ects on security. Keywords: Hardware Trojans, malicious hardware, layout modifications, Trojan side-channel
On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl <eugen@leitl.org> wrote:
... http://people.umass.edu/gbecker/BeckerChes13.pdf
Stealthy Dopant-Level Hardware Trojans ?
Georg T. Becker1
this paper has disappeared from the net. any one have copies? (looking at you, JYA ;) [bonus points for backstory on the distribution woes]
On Sun, Jun 22, 2014 at 01:46:44AM -0700, coderman wrote:
On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl <eugen@leitl.org> wrote:
... http://people.umass.edu/gbecker/BeckerChes13.pdf
Stealthy Dopant-Level Hardware Trojans ?
Georg T. Becker1
this paper has disappeared from the net. any one have copies?
http://sgnsa2lp64l6v3l6.onion/BeckerChes13.pdf -- otr fp: https://www.ctrlc.hu/~stef/otr.txt
If I may, use the digital time capsule and you will get the file. On 22/06/2014 10:46, coderman wrote:
On Fri, Sep 13, 2013 at 2:49 AM, Eugen Leitl <eugen@leitl.org> wrote:
... http://people.umass.edu/gbecker/BeckerChes13.pdf
Stealthy Dopant-Level Hardware Trojans ?
Georg T. Becker1
this paper has disappeared from the net. any one have copies? (looking at you, JYA ;)
[bonus points for backstory on the distribution woes]
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 06/22/2014 01:46 AM, coderman wrote:
this paper has disappeared from the net. any one have copies? (looking at you, JYA ;)
Got a copy right here (note: link is behind a self-signed cert): https://drwho.virtadpt.net/files/BeckerChes13.pdf SHA-512: 58a92fe0bccbad8aacb9ca073836d43b9789426b3869f1f7630f73e0cdc4f967d64fc8b1e7b83b31d58a62e1b1cb6e8027ad0605d37675f79c3270e84270de65 - -- The Doctor [412/724/301/703] [ZS] Developer, Project Byzantium: http://project-byzantium.org/ PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F DD89 3BD8 FF2B 807B 17C1 WWW: https://drwho.virtadpt.net/ Your sword has begun to glow very brightly. -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJTqI+VAAoJED1np1pUQ8Rki3EP/ReTd9+tKn82/LzlJPrdOspv wM1we3i30EjiHGltIZpKvnZQ2mAqB/JRwPnfqDkmSP02a/PRT2r83esIh0pIq4rH 1pEzpjyTfjmtj3laHFl8GJrIbsAGMpkEcvxJTWeBa/njde7Xf3H7inS6usm1s1OO OjCL9PqUf4XcIHXtzQZW8/Xu83xivKVdC7GbCa4WeiJxrCdBrorIu2LaHGk0Oo+G Kg2t8VULr1z/5Xjs0pG/wH5zjI/68B3uxwDyrVG0Ulyfzo41LzLLB5sa/fnkhK83 C96Puj36QDVRIP/5T5vF1Zee7g7X5alzr6LDjzvxQnyJizjKhVpPBys0xIDSYdY9 RwUttDAPk3WpdAxZTGuBFbTVornSzeH0HD460Ki0KTyTcS+SXxHaNc2WIy2J7/rN qo9orwkSUjRHMmTnpYZ8El2foO07G88GnN2y4y6oT+j/hctr4Hls/y2wnR2mZQWU 0BND+dOdjvzMu3PCapXn5D8jC6KyByiivco5yfNKTcaoPAdnm6GYR7L9eEm2ws9a wuA6tM0xgmMiRoMdHBegIjrB5fhKgmgZ4BLwiYIuu7TaFB8TiX7c6l/uFyzUH4Ka +2fJzLXj6Xs34p/GLNVt6wXPNmwGbuM+SofQFBqBvSrsAKJBl7kJofrSHq3rUevU VQWAAh9+Yq9zacnwN8jm =4Bpe -----END PGP SIGNATURE-----
participants (5)
-
beam
-
coderman
-
Eugen Leitl
-
stef
-
The Doctor