当前位置: X-MOL 学术Microelectron. J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A trojan framework in AES core to evade state-of-the-art HT detection schemes
Microelectronics Journal ( IF 1.9 ) Pub Date : 2021-03-11 , DOI: 10.1016/j.mejo.2021.105023
Nilanjana Das , Riom Sen , Dwaipayan Ray , Nandini Banerjee , Joy Halder , Hannu Tenhunen , Biplab K. Sikdar

This paper explores cipher-destroying and secret key emitting Hardware Trojan (HT) in Advanced Encryption Standard (AES) cores. It reports a malicious trojan circuit which is implanted in the 10th round of encryption modules to make the AES core vulnerable for system design. Stealthiness of the combinational trojan against the dimension of signal lines, involved to trigger the trojan, is examined. It is shown that such trojans are malicious and hard to detect following the existing trojan detection methodologies. The explored malevolent HT can be the cause of severe damage to a system as it leaks out the secret key to an intruder. An existing trojan detection technique is, therefore, modified to propose seamless detection of such trojans.



中文翻译:

AES内核中的特洛伊木马程序规避最先进的HT检测方案

本文探讨了高级加密标准(AES)内核中的破坏密码和生成秘密密钥的硬件特洛伊木马(HT)。它报告了一个恶意木马电路,该电路被植入第十轮加密模块中,从而使AES内核容易受到系统设计的攻击。检查了涉及触发木马的组合木马相对于信号线尺寸的隐身性。结果表明,这种木马是恶意的,很难按照现有的木马检测方法进行检测。探索的恶意HT可能会严重破坏系统,因为它会将密钥泄露给入侵者。因此,对现有的特洛伊木马检测技术进行了修改,以提出对此类特洛伊木马的无缝检测。

更新日期:2021-03-15
down
wechat
bug