Targeted modification of hardware trojans View Full Text


Ontology type: schema:ScholarlyArticle      Open Access: True


Article Info

DATE

2019-03-18

AUTHORS

Jason R. Hamlet, Jackson R. Mayo, Vivian G. Kammler

ABSTRACT

The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. This approach can be applied to any digital circuit and does not rely on secret keys or obfuscation. More... »

PAGES

189-197

References to SciGraph publications

  • 2016-12-28. Golden-Free Hardware Trojan Detection with High Sensitivity Under Process Noise in JOURNAL OF ELECTRONIC TESTING
  • 2009. MERO: A Statistical Approach for Hardware Trojan Detection in CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s41635-018-0058-x

    DOI

    http://dx.doi.org/10.1007/s41635-018-0058-x

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1112839564


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Sandia National Laboratories, Mail Stop 0672, PO Box 5800, 87185, Albuquerque, NM, USA", 
              "id": "http://www.grid.ac/institutes/grid.474520.0", 
              "name": [
                "Sandia National Laboratories, Mail Stop 0672, PO Box 5800, 87185, Albuquerque, NM, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Hamlet", 
            "givenName": "Jason R.", 
            "id": "sg:person.016534113343.28", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016534113343.28"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Sandia National Laboratories, Mail Stop 9158, PO Box 969, 94551-0969, Livermore, CA, USA", 
              "id": "http://www.grid.ac/institutes/grid.474523.3", 
              "name": [
                "Sandia National Laboratories, Mail Stop 9158, PO Box 969, 94551-0969, Livermore, CA, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Mayo", 
            "givenName": "Jackson R.", 
            "id": "sg:person.0664172750.17", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0664172750.17"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Sandia National Laboratories, Mail Stop 0620, PO Box 5800, 87185, Albuquerque, NM, USA", 
              "id": "http://www.grid.ac/institutes/grid.474520.0", 
              "name": [
                "Sandia National Laboratories, Mail Stop 0620, PO Box 5800, 87185, Albuquerque, NM, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kammler", 
            "givenName": "Vivian G.", 
            "id": "sg:person.016365264023.99", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016365264023.99"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-04138-9_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047877944", 
              "https://doi.org/10.1007/978-3-642-04138-9_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10836-016-5632-y", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015331850", 
              "https://doi.org/10.1007/s10836-016-5632-y"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2019-03-18", 
        "datePublishedReg": "2019-03-18", 
        "description": "The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. This approach can be applied to any digital circuit and does not rely on secret keys or obfuscation.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s41635-018-0058-x", 
        "inLanguage": "en", 
        "isAccessibleForFree": true, 
        "isPartOf": [
          {
            "id": "sg:journal.1290439", 
            "issn": [
              "2509-3428", 
              "2509-3436"
            ], 
            "name": "Journal of Hardware and Systems Security", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "2", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "3"
          }
        ], 
        "keywords": [
          "design tool", 
          "design-time method", 
          "device fabrication", 
          "commercial design tools", 
          "fabrication", 
          "circuit functionality", 
          "design flow", 
          "circuit", 
          "design", 
          "properties", 
          "digital circuits", 
          "functionality", 
          "simulation suite", 
          "flow", 
          "hardware Trojans", 
          "simulations", 
          "theoretical results", 
          "modification", 
          "exhibit characteristics", 
          "functional specification", 
          "designers", 
          "characteristics", 
          "tool", 
          "widespread use", 
          "method", 
          "use", 
          "components", 
          "specification", 
          "results", 
          "state space", 
          "possibility", 
          "approach", 
          "probabilistic confidence", 
          "suite", 
          "advances", 
          "space", 
          "large state space", 
          "portion", 
          "malicious modifications", 
          "secret key", 
          "Trojans", 
          "test suite", 
          "key", 
          "program", 
          "concern", 
          "intellectual property", 
          "confidence", 
          "obfuscation", 
          "untrusted design tools", 
          "untrusted device fabrication", 
          "party intellectual property", 
          "least probabilistic confidence", 
          "unintended functionality", 
          "comprehensive simulation suite"
        ], 
        "name": "Targeted modification of hardware trojans", 
        "pagination": "189-197", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1112839564"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s41635-018-0058-x"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s41635-018-0058-x", 
          "https://app.dimensions.ai/details/publication/pub.1112839564"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2021-11-01T18:34", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20211101/entities/gbq_results/article/article_804.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s41635-018-0058-x"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0058-x'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0058-x'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0058-x'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s41635-018-0058-x'


     

    This table displays all metadata directly associated to this object as RDF triples.

    139 TRIPLES      22 PREDICATES      81 URIs      71 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s41635-018-0058-x schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N038bca9160f04e63a9cd94ecc791ade3
    4 schema:citation sg:pub.10.1007/978-3-642-04138-9_28
    5 sg:pub.10.1007/s10836-016-5632-y
    6 schema:datePublished 2019-03-18
    7 schema:datePublishedReg 2019-03-18
    8 schema:description The use of untrusted design tools, components, and designers, coupled with untrusted device fabrication, introduces the possibility of malicious modifications being made to integrated circuits (ICs) during their design and fabrication. These modifications are known as hardware trojans. The widespread use of commercially purchased 3rd party intellectual property (3PIP) and commercial design tools extends even into trusted design flows. Unfortunately, due to the theoretical result that there is no program that can decide whether any other program will eventually halt, we know that the properties of a program, or circuit, cannot be known in advance of running it. While we can design a circuit to meet some functional specification and generate a simulation or test suite to obtain at least probabilistic confidence that the circuit implements the intended functionality, we cannot test a circuit for unintended functionality due to the combinatorially large state space. To address these concerns, we have developed a design-time method for automatically and systematically modifying portions of a design that exhibit characteristics of hardware trojans. After each modification, the functionality of the design is verified against a comprehensive simulation suite to ensure that the intended circuit functionality has not been changed. This approach can be applied to any digital circuit and does not rely on secret keys or obfuscation.
    9 schema:genre article
    10 schema:inLanguage en
    11 schema:isAccessibleForFree true
    12 schema:isPartOf N19005b0394684d728f786c7565a35998
    13 N923fd55e6243444ab8b413c66b3ba830
    14 sg:journal.1290439
    15 schema:keywords Trojans
    16 advances
    17 approach
    18 characteristics
    19 circuit
    20 circuit functionality
    21 commercial design tools
    22 components
    23 comprehensive simulation suite
    24 concern
    25 confidence
    26 design
    27 design flow
    28 design tool
    29 design-time method
    30 designers
    31 device fabrication
    32 digital circuits
    33 exhibit characteristics
    34 fabrication
    35 flow
    36 functional specification
    37 functionality
    38 hardware Trojans
    39 intellectual property
    40 key
    41 large state space
    42 least probabilistic confidence
    43 malicious modifications
    44 method
    45 modification
    46 obfuscation
    47 party intellectual property
    48 portion
    49 possibility
    50 probabilistic confidence
    51 program
    52 properties
    53 results
    54 secret key
    55 simulation suite
    56 simulations
    57 space
    58 specification
    59 state space
    60 suite
    61 test suite
    62 theoretical results
    63 tool
    64 unintended functionality
    65 untrusted design tools
    66 untrusted device fabrication
    67 use
    68 widespread use
    69 schema:name Targeted modification of hardware trojans
    70 schema:pagination 189-197
    71 schema:productId N13886b1896334db89d23fc8b327db46e
    72 N874cdfd3f29f4996bc6b9ffb672afb79
    73 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112839564
    74 https://doi.org/10.1007/s41635-018-0058-x
    75 schema:sdDatePublished 2021-11-01T18:34
    76 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    77 schema:sdPublisher N5533bddb416645ed9c35a669131e4d4b
    78 schema:url https://doi.org/10.1007/s41635-018-0058-x
    79 sgo:license sg:explorer/license/
    80 sgo:sdDataset articles
    81 rdf:type schema:ScholarlyArticle
    82 N038bca9160f04e63a9cd94ecc791ade3 rdf:first sg:person.016534113343.28
    83 rdf:rest N30d11c8814e54373ae6f63ab329e5515
    84 N13886b1896334db89d23fc8b327db46e schema:name dimensions_id
    85 schema:value pub.1112839564
    86 rdf:type schema:PropertyValue
    87 N19005b0394684d728f786c7565a35998 schema:volumeNumber 3
    88 rdf:type schema:PublicationVolume
    89 N30d11c8814e54373ae6f63ab329e5515 rdf:first sg:person.0664172750.17
    90 rdf:rest N4286731e1ecd4007aee5a82c775207e4
    91 N4286731e1ecd4007aee5a82c775207e4 rdf:first sg:person.016365264023.99
    92 rdf:rest rdf:nil
    93 N5533bddb416645ed9c35a669131e4d4b schema:name Springer Nature - SN SciGraph project
    94 rdf:type schema:Organization
    95 N874cdfd3f29f4996bc6b9ffb672afb79 schema:name doi
    96 schema:value 10.1007/s41635-018-0058-x
    97 rdf:type schema:PropertyValue
    98 N923fd55e6243444ab8b413c66b3ba830 schema:issueNumber 2
    99 rdf:type schema:PublicationIssue
    100 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    101 schema:name Information and Computing Sciences
    102 rdf:type schema:DefinedTerm
    103 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    104 schema:name Artificial Intelligence and Image Processing
    105 rdf:type schema:DefinedTerm
    106 sg:journal.1290439 schema:issn 2509-3428
    107 2509-3436
    108 schema:name Journal of Hardware and Systems Security
    109 schema:publisher Springer Nature
    110 rdf:type schema:Periodical
    111 sg:person.016365264023.99 schema:affiliation grid-institutes:grid.474520.0
    112 schema:familyName Kammler
    113 schema:givenName Vivian G.
    114 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016365264023.99
    115 rdf:type schema:Person
    116 sg:person.016534113343.28 schema:affiliation grid-institutes:grid.474520.0
    117 schema:familyName Hamlet
    118 schema:givenName Jason R.
    119 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016534113343.28
    120 rdf:type schema:Person
    121 sg:person.0664172750.17 schema:affiliation grid-institutes:grid.474523.3
    122 schema:familyName Mayo
    123 schema:givenName Jackson R.
    124 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0664172750.17
    125 rdf:type schema:Person
    126 sg:pub.10.1007/978-3-642-04138-9_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047877944
    127 https://doi.org/10.1007/978-3-642-04138-9_28
    128 rdf:type schema:CreativeWork
    129 sg:pub.10.1007/s10836-016-5632-y schema:sameAs https://app.dimensions.ai/details/publication/pub.1015331850
    130 https://doi.org/10.1007/s10836-016-5632-y
    131 rdf:type schema:CreativeWork
    132 grid-institutes:grid.474520.0 schema:alternateName Sandia National Laboratories, Mail Stop 0620, PO Box 5800, 87185, Albuquerque, NM, USA
    133 Sandia National Laboratories, Mail Stop 0672, PO Box 5800, 87185, Albuquerque, NM, USA
    134 schema:name Sandia National Laboratories, Mail Stop 0620, PO Box 5800, 87185, Albuquerque, NM, USA
    135 Sandia National Laboratories, Mail Stop 0672, PO Box 5800, 87185, Albuquerque, NM, USA
    136 rdf:type schema:Organization
    137 grid-institutes:grid.474523.3 schema:alternateName Sandia National Laboratories, Mail Stop 9158, PO Box 969, 94551-0969, Livermore, CA, USA
    138 schema:name Sandia National Laboratories, Mail Stop 9158, PO Box 969, 94551-0969, Livermore, CA, USA
    139 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...