1. A stealthy Hardware Trojan based on a Statistical Fault Attack
- Author
-
Charles Momin, François-Xavier Standaert, Olivier Bronchain, and UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Applied Mathematics ,Clock rate ,020206 networking & telecommunications ,Context (language use) ,0102 computer and information sciences ,02 engineering and technology ,Adversary ,Fault (power engineering) ,Chip ,01 natural sciences ,Computational Theory and Mathematics ,Cipher ,010201 computation theory & mathematics ,Hardware Trojan ,Embedded system ,Stealthy Hardware Trojans ,Statistical Fault Attacks ,0202 electrical engineering, electronic engineering, information engineering ,business ,Block cipher - Abstract
Integrated Circuits (ICs) are sensible to a wide range of (passive, active, invasive, non-invasive) physical attacks. In this context, Hardware Trojans (HTs), that are malicious modifications of a circuit by an untrusted manufacturer, are one of the most challenging threats to mitigate. HTs aim to alter the functionality of the infected chip in a malicious way, e.g. under specific conditions known by the adversary. Fault attacks are a typical attack vector. However, for a HT to be exploitable by an adversary, it also has to be stealthy. For example, a HT that would directly inject exploitable faults in a block cipher may be spotted by analyzing its functional behavior (i.e. the positions and the distribution of the faulty values appearing). In this paper, we propose a stealthy HT instance leading to successful and hidden Statistical Fault Attacks (SFA). More precisely, the faults are injected when the chip is running under condition for which metastabilty occurs (i.e. with a increased clock frequency), leading to the apparition of faults at random positions within the target implementation. In addition, an internal bit is set to a value known only by the adversary, allowing him to perform efficient SFA. Compared to classical SFA, the HT uses its control on the target to circumvent behavioral detection tests. Indeed, it also adds computation errors in the early rounds of the target cipher which are not exploitable via SFA.
- Published
- 2021
- Full Text
- View/download PDF