TC: Small: Minimalist Hardware Trojans through Malicious Side-Channels
TC:小型:通过恶意侧通道的极简硬件木马
基本信息
- 批准号:0916854
- 负责人:
- 金额:$ 35.07万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2009
- 资助国家:美国
- 起止时间:2009-09-15 至 2013-08-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
In order to provide system security, hardware modules which function as trust anchors are used in an ever increasing number of devices. The majority of laptops and PCs are now equipped with Trusted Platform Modules (TPMs), and a large number of pervasive computing systems such as smart cards, electronic passports or high-speed routers make use of hardware for cryptographic algorithms and key storage. In almost all such applications the security of the entire system hinges on the assumption that the hardware modules are trustworthy. Recently, due to the increasing use of potentially untrusted semiconductor foundries, the threat of maliciously manipulated hardware has been raised, Since hardware manipulations, including hardware Trojans, are difficult to detect and, perhaps more importantly, even harder to repair, they form a very serious threat to system security for today's and future applications.The standard approach to Trojan hardware consists in adding extra logic to a given IC design which weakens the system. The main drawback of this approach, from an attacker's perspective, is that extra function blocks can potentially be detected through a host of techniques, including, e.g., optical inspections at different layers of the design, or power and EM fingerprinting. Our malicious circuit manipulations are orders of magnitude more subtle than previously known Trojans, but can nevertheless totally compromise secure hardware blocks by leaking cryptographic keys. The core idea is to create malicious side-channels, in particular power supply channels, through small modifications of circuit elements, e.g., at the transistor level. We will refer to these covert channels as Trojan side channels (TSC). The core parts of the research are modeling of the assumptions, development of channels and modulations schemes, their realization on the circuit level, and proof-of-concept implementations.In addition to posing a threat to system security, Trojan side-channels can also be used constructively. For instance, they have applications in anti-counterfeiting: illegal copies of ICs with the same functional behavior will not leak the same side-channel ID and can thus easily be detected. Also, TSC could be used for conveying internal status information about a circuit, increasing the testability of a circuits. Moreover, because TSC can be viewed as a form of physically encryption one can imagine other cryptographic protocols and applications using TSC as primitives.
为了提供系统安全性,在越来越多的设备中使用了作为信任锚的功能的硬件模块。 现在,大多数笔记本电脑和PC都配备了受信任的平台模块(TPM),以及大量普遍的计算系统,例如智能卡,电子护照或高速路由器,将硬件用于加密算法和密钥存储。在几乎所有此类应用程序中,整个系统的安全性都取决于硬件模块值得信赖的假设。 Recently, due to the increasing use of potentially untrusted semiconductor foundries, the threat of maliciously manipulated hardware has been raised, Since hardware manipulations, including hardware Trojans, are difficult to detect and, perhaps more importantly, even harder to repair, they form a very serious threat to system security for today's and future applications.The standard approach to Trojan hardware consists in adding extra logic to a given IC design which weakens the system.从攻击者的角度来看,这种方法的主要缺点是,可以通过多种技术检测到额外的功能块,例如,在设计的不同层,电源和EM指纹。 我们的恶意电路操作是比以前已知的特洛伊人更微妙的数量级,但是通过泄漏加密密钥,可以完全损害安全硬件块。核心想法是通过电路元素(例如在晶体管级别上的电路元素的小修改)来创建恶意的侧通道,特别是电源供应渠道。我们将这些秘密通道称为特洛伊木马侧通道(TSC)。研究的核心部分是对假设的建模,渠道和调制方案的开发,在电路级别的实现以及概念验证实现的建模。除了对系统安全构成威胁外,特洛伊木马的侧通道还可以建设性地使用。例如,它们在反爆炸中具有应用:具有相同功能行为的IC的非法副本不会泄漏相同的侧通道ID,因此很容易被检测到。同样,TSC可用于传达有关电路的内部状态信息,从而增加电路的可检验性。此外,由于可以将TSC视为一种物理加密的一种形式,因此可以想象使用TSC作为原始的其他加密协议和应用程序。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Christof Paar其他文献
Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures
轻量级分组密码的饮食建议:最近开发的架构的功率、能量和面积分析
- DOI:
10.1007/978-3-642-41332-2_7 - 发表时间:
2013 - 期刊:
- 影响因子:0
- 作者:
Lejla Batina;Amitabh Das;Baris Ege;Elif Bilge Kavun;Nele Mentens;Christof Paar;Ingrid Verbauwhede;Tolga Yalçýn - 通讯作者:
Tolga Yalçýn
Optimized arithmetic for Reed-Solomon encoders
- DOI:
10.1109/isit.1997.613165 - 发表时间:
1997-06 - 期刊:
- 影响因子:0
- 作者:
Christof Paar - 通讯作者:
Christof Paar
Das RSA-Kryptosystem
Das RSA 加密系统
- DOI:
10.1007/978-3-662-49297-0_7 - 发表时间:
2016 - 期刊:
- 影响因子:0
- 作者:
Jan Pelzl;Christof Paar - 通讯作者:
Christof Paar
Better than Brute-Force --- Optimized Hardware Architecture for Efficient Biclique Attacks on AES-128
优于暴力破解——优化硬件架构,可对 AES-128 进行高效 Biclique 攻击
- DOI:
- 发表时间:
2012 - 期刊:
- 影响因子:0
- 作者:
Andrey Bogdanov;E. Kavun;Christof Paar;Christian Rechberger;Tolga Yalçin - 通讯作者:
Tolga Yalçin
I see an IC: A Mixed-Methods Approach to Study Human Problem-Solving Processes in Hardware Reverse Engineering
我看到了一个 IC:在硬件逆向工程中研究人类问题解决过程的混合方法
- DOI:
10.1145/3613904.3642837 - 发表时间:
2024 - 期刊:
- 影响因子:0
- 作者:
René Walendy;Markus Weber;Jingjie Li;Steffen Becker;Carina Wiesen;M. Elson;Younghyun Kim;Kassem Fawaz;N. Rummel;Christof Paar - 通讯作者:
Christof Paar
Christof Paar的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Christof Paar', 18)}}的其他基金
TWC: Medium: Designing Strongly Obfuscated Hardware with Quantifiable Security against Reverse Engineering
TWC:中:设计具有可量化安全性的高度模糊硬件以防止逆向工程
- 批准号:
1563829 - 财政年份:2016
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
TWC: TTP Option: Small: Investigating Stealthy Hardware Trojans
TWC:TTP 选项:小:调查隐形硬件木马
- 批准号:
1421352 - 财政年份:2014
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
CISE Research Instrumentation: Cryptographic Algorithms and Systems on Reconfigurable Hardware
CISE 研究仪器:可重构硬件上的加密算法和系统
- 批准号:
9818415 - 财政年份:1999
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
CAREER: Cryptography on Recongfigurable Hardware: Algorithmic and System Aspects
职业:可重构硬件上的密码学:算法和系统方面
- 批准号:
9733246 - 财政年份:1998
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
相似国自然基金
靶向Treg-FOXP3小分子抑制剂的筛选及其在肺癌免疫治疗中的作用和机制研究
- 批准号:32370966
- 批准年份:2023
- 资助金额:50 万元
- 项目类别:面上项目
化学小分子激活YAP诱导染色质可塑性促进心脏祖细胞重编程的表观遗传机制研究
- 批准号:82304478
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
靶向小胶质细胞的仿生甘草酸纳米颗粒构建及作用机制研究:脓毒症相关性脑病的治疗新策略
- 批准号:82302422
- 批准年份:2023
- 资助金额:30 万元
- 项目类别:青年科学基金项目
HMGB1/TLR4/Cathepsin B途径介导的小胶质细胞焦亡在新生大鼠缺氧缺血脑病中的作用与机制
- 批准号:82371712
- 批准年份:2023
- 资助金额:49 万元
- 项目类别:面上项目
小分子无半胱氨酸蛋白调控生防真菌杀虫活性的作用与机理
- 批准号:32372613
- 批准年份:2023
- 资助金额:50 万元
- 项目类别:面上项目
相似海外基金
CSR: Small: Leveraging Physical Side-Channels for Good
CSR:小:利用物理侧通道做好事
- 批准号:
2312089 - 财政年份:2024
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
NeTS: Small: NSF-DST: Modernizing Underground Mining Operations with Millimeter-Wave Imaging and Networking
NeTS:小型:NSF-DST:利用毫米波成像和网络实现地下采矿作业现代化
- 批准号:
2342833 - 财政年份:2024
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
CPS: Small: NSF-DST: Autonomous Operations of Multi-UAV Uncrewed Aerial Systems using Onboard Sensing to Monitor and Track Natural Disaster Events
CPS:小型:NSF-DST:使用机载传感监测和跟踪自然灾害事件的多无人机无人航空系统自主操作
- 批准号:
2343062 - 财政年份:2024
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
Collaborative Research: FET: Small: Reservoir Computing with Ion-Channel-Based Memristors
合作研究:FET:小型:基于离子通道忆阻器的储层计算
- 批准号:
2403559 - 财政年份:2024
- 资助金额:
$ 35.07万 - 项目类别:
Standard Grant
政治参加の縮小期における政治的平等と政治資金
政治参与下降时期的政治平等与政治资本
- 批准号:
24KJ2165 - 财政年份:2024
- 资助金额:
$ 35.07万 - 项目类别:
Grant-in-Aid for JSPS Fellows