Font Size: a A A

Design And Detection Of Hardware Trojan Horse

Posted on:2018-10-23Degree:MasterType:Thesis
Country:ChinaCandidate:S HuangFull Text:PDF
GTID:2348330533466445Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Integrated circuit industry chain need CAD tool suppliers,IP core suppliers,design companies and manufacturing companies and many other companies to work together.The separation of IC industry chain,make it possible to insert hardware Trojan circuit into the original integrated circuit,which will result in information disclosure or system paralysis.It is very important to study the design and detection of the hardware circuit.This paper focuses on the design and detection of hardware Trojan.Firstly,the designs of two information leakage hardware Trojan circuits are introduced,which provide effective models for the study of Trojan detection.Further,a hardware Trojan detection circuit based on redundancy is proposed.The main contents of this paper are organized as follows:1.Using a RS232 circuit with a 9600 Baud as a target circuit,this paper designs a multiplier baud rate hardware Trojan circuit.This hardware Trojan circuit modifies the baud rate of the transmitting circuit to 115200 Baud,expands and controls the data transmission of RS232 to realize the target of leakage information.The modified RS232 circuit with a differential frequency Trojan can work properly in 9600 Baud,and the attackers can use a RS232 receiving circuit with 115200 Baud to steal the information.It is difficult for the users to find the hardware Trojan.2.Using a RS232 circuit as a target circuit,this paper designs a stop bits hardware Trojan circuit which employs the vulnerability of the RS232 protocol.For RS232 circuit,when the number of stop bits exceeds 2,the receiver will assume that the circuit is idle.This design exploits this vulnerability and modifies the number of stop bits in transmitting circuit to realize the target of information leakage.The attacker can leak information by stop bits.The modification of the target circuit is small,the area is only increased by 0.60%,the power consumption is only increased by 0.11%,and it is difficult to be found by the users.3.This paper proposes a hardware Trojan detection circuit based on redundancy which combines the advantages of credibility design and run-time detection.The whole detection process includes circuit analysis,design modification and Trojan detection.Trojan is detected by the detection module,and the error output can be replaced by a correct output.In this paper,the AES-128 encryption circuit is used as the target circuit to verify the detection method and the detection process.The simulation results show that the method is effective.
Keywords/Search Tags:Hardware Trojan Horse, RS232, Baud Rate, Stop Bits, Redundancy
PDF Full Text Request
Related items