Hardware trojan horse

Top PDF Hardware trojan horse:

Exploiting  Safe  Error  based  Leakage  of  RFID  Authentication  Protocol  using  Hardware  Trojan  Horse

Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse

HTHs have been leveraged in multiple works in the past to launch side-channel attack [1] and fault attack ( [2], [3]) on hardware implementation of cryptographic algorithms such as Advanced Encryption Standard (AES), leading to the recovery of the secret key. In this paper, we focus on lightweight authentication protocols which are rigourously analysed for RFID applications, and their vulnerability to HTH-induced fault attack. In [4], Avoine et al. have provided a survey of the most prominent ultralightweight authentication protocols for RFID tags and their common flaws. Among them, one of the significant family of protocols had its origins in ”HB” which is a secure identification scheme based on Learning Parity with Noise (LPN) problem designed in [5] by Hopper and Blum. Subsequently several HB-like protocols such as HB + [6], GHB # [7], LAPIN [8], LCMQ [9] have been pro- posed. Several cryptanalysis techniques proposed in [10], [11] have successfully attacked most of these HB-family protocols. Moreover, researchers have also started to realize the impact of side channel based attacks on the physical implementation of these protocols. In [12], Carrijo et al. proposed a fault analytic model which can lead to a cogent attack against HB-like protocols. Similarly in [13], Gaspar et al. illustrated a DPA-like attack on the hardware implementation of Masked Lapin algo- rithm. In 2013, Li et al. presented a novel entity authentication protocol titled LCMQ which is not direct descendant of HB protocol, rather a consolidation of LPN, Circulant Matrix and Multivariate Quadratic (MQ) problem that has been proved to be secure against mathematical cryptanalysis. In this paper, our two major contributions are:
Show more

6 Read more

Hardware  Trojan  Horses  in  Cryptographic  IP  Cores

Hardware Trojan Horses in Cryptographic IP Cores

Abstract—Detecting hardware trojans is a difficult task in general. In this article we study hardware trojan horses insertion and detection in cryptographic intellectual property (IP) blocks. The context is that of a fabless design house that sells IP blocks as GDSII hard macros, and wants to check that final products have not been infected by trojans during the foundry stage. First, we show the e ffi ciency of a medium cost hardware trojans detection method if the placement or the routing have been redone by the foundry. It consists in the comparison between optical microscopic pictures of the silicon product and the original view from a GDSII layout database reader. Second, we analyze the ability of an attacker to introduce a hardware trojan horse without changing neither the placement nor the routing of the cryptographic IP logic. On the example of an AES engine, we show that if the placement density is beyond 80%, the insertion is basically impossible. Therefore, this settles a simple design guidance to avoid trojan horses insertion in cryptographic IP blocks: have the design be compact enough, so that any functionally discreet trojan necessarily requires a complete re-place and re-route, which is detected by mere optical imaging (and not complete chip reverse-engineering).
Show more

15 Read more

Hardware Trojan Detection by Delay and Electromagnetic Measurements

Hardware Trojan Detection by Delay and Electromagnetic Measurements

The trust and security of Integrated Circuits (IC) design and fabrication is critical for sensitive fields like finance, health, and governmental communications. Due to the complexity and the high cost of IC fabrication cycle, more and more firms outsource their production. This trend gives a possibility for an adversary to introduce malicious circuit, called Hardware Trojan horse (HT), in any IC. It can either perform a Denial Of Service (DOS), deteriorate circuit performance [ 8 ], or steal sensitive information. Therefore, the HTs are considered a real threat which has gained attention from researchers.
Show more

7 Read more

At the origins of the Trojan Horse Method

At the origins of the Trojan Horse Method

The possibility of using the deuteron as virtual source of low energy protons or, more interesting, neutrons opened new opportunities not only in nuclear astrophysics but also in nuclear physics. For this reason and also for its low binding energy and its well-known momentum distribution, the deuteron can be considered as the ideal Trojan Horse nucleus. Claudio Spitaleri firmly believed in the use of quasi-free reactions in nuclear astrophysics [12] and devoted his efforts to the involvement of a quite large number of researchers in international collaborations working on this topic. The result is that important improvements have been introduced in these years, from the point of view of the THM formalism as well as from the point of view of the use of more sophisticated experimental set-ups. Nowadays the THM has an important role as a tool for the indirect study of nuclear astrophysical processes, together with the Coulomb dissociation and the ANC method [13]. Around Claudio Spitaleri, a group of young researchers grew in Catania attracted by the
Show more

6 Read more

Mitigation of Hardware Trojan Attacks on Networks-on-Chip

Mitigation of Hardware Trojan Attacks on Networks-on-Chip

stages that are considered trusted and those that are considered untrusted. The design stage is a viable option for insertion of malicious hardware, but this assumes an insider within the company designing the system. The fabrication stage is the most likely target to insert malicious hardware as the system’s design is already out of the hands of the one who designed it. These problematic additions to hardware during the fabrication process have become known as Hardware Trojans.

437 Read more

Extraction  of  intrinsic  structure  for  Hardware  Trojan  detection

Extraction of intrinsic structure for Hardware Trojan detection

Due to the recent trend of outsourcing integrated circuit (IC) manufacturing and design, structural integrity verification of ICs has become a hot topic. From the specification step to that of packaging, and especially during the design step, a circuit can be corrupted by a malicious adversary. This malicious alteration of the IC structure is called a Hardware Trojan (HT) insertion and its effects can range from performance degradation (e.g. denial of service) up to more sophisticated functionalities (memory dumping etc) [21]. Similarly with the multiplication of foundries and IC vendors, counterfeits are spreading rapidly, ranging from simple copies to a complete replacement of an given IC by one of lower quality.
Show more

16 Read more

Cryptococci at the brain gate: break and enter or use a Trojan horse?

Cryptococci at the brain gate: break and enter or use a Trojan horse?

The mechanism by which Cryptococcus neoformans invades the central nervous system is fundamental for understanding pathogenesis because cryptococ- cosis commonly presents as meningoencephalitis. There is evidence for both direct invasion of the endothelial cells lining the brain vasculature and a “Tro- jan horse” mechanism whereby cryptococci enter the central nervous system after macrophage ingestion. However, in this issue of the JCI, Shi et al. use intravital microscopy to reveal that brain invasion by C. neoformans follows a capillary microembolic event. They find that after suddenly stopping in brain capillaries, cryptococci cross into the central nervous system in a process that is urease dependent, requires viability, and involves cellular deformation. This observation provides evidence for direct brain invasion by C. neoformans, but a consideration of all the currently available evidence suggests a role for both direct and phagocyte-associated invasion. Hence, the remarkable neurotro- pism of C. neoformans may have more than one mechanism.
Show more

5 Read more

Brexit: ‘Revolt’ against the ‘elites’ or Trojan horse for more deregulation?

Brexit: ‘Revolt’ against the ‘elites’ or Trojan horse for more deregulation?

Riley-Smith B (2015) Boris Johnson: I could vote for Britain to leave the European Union.. Available at:.[r]

20 Read more

The accidental Trojan horse: Plea bargaining as an anticorruption tool in Brazil

The accidental Trojan horse: Plea bargaining as an anticorruption tool in Brazil

It is curious to note, however, that SAL’s reluctance to accept the most forceful measures in the bill did not count with the vocal support of civil society organizations, since neithe[r]

57 Read more

First measurements of Trojan Horse injection in a plasma wakefield accelerator

First measurements of Trojan Horse injection in a plasma wakefield accelerator

, and a fully motorized off-axis parabo- la for injection. These dedicated improvements, in addi- tion with the combination of plasma-based spatiotemporal alignment techniques and state-of-the-art diagnostics, have paved the way for successful Trojan Horse injection campaigns on the final leg of FACET’s lifetime in 2016. As a complementary stepping stone towards TH injection, the so called Plasma Torch laser-triggered injection scheme [20,21] has been demonstrated. The latter tech- nique had been theoretically developed as a multi-purpose injection and beam manipulation technique which allows, amongst other things, an all-optical generated plasma density downramp injection mode with strongly relaxed temporal synchronization requirements. These injection techniques both are the first truly tunable, laser-triggered injection demonstrations in PWFA. They have at the same time both proven to be remarkably robust as a result of the decoupling of wakefield excitation and injection, mainly limited only by the inherent shot-to-shot temporal jitter of the SLAC driver electron beam, which originates from the thermal cathode and large compression require- ments. Key publications discussing the many scientific ISBN 978-3-95450-182-3
Show more

6 Read more

Research on Detection Technology and Protection of Hardware Trojan

Research on Detection Technology and Protection of Hardware Trojan

According to the form of third party IP (3PIP) core can be divided into soft core, solid and hard core three categories. The uncontrolled third-party IP soft-core introduced in the process is easier to be implanted into the hardware Trojan. IP soft disk in the proposed hardware Trojan detection. The specific flow chart is shown in Figure 10. [9] Proposed a logical abstraction inspection based on IP soft-core hardware Trojan feature matching detection method.

9 Read more

The Trojan Horse Method for nuclear astrophysics and its recent applications

The Trojan Horse Method for nuclear astrophysics and its recent applications

The Trojan Horse Method (THM) [3–6] allows one to extract the bare-nucleus cross-section of a charged-particle induced reaction a+x → c+C at astrophysical energies free of Coulomb suppression, by properly selecting the quasi-free (QF) contribution of an appropriate reaction a+A → c+C+s, performed at energies well above the Coulomb barrier, where the nucleus A has a dominant x ⊕ s cluster configuration. The a+x → c+C reaction studied with THM is not affected by tunneling, since the a + x interaction occurs in the pure nuclear field without the influence of the Coulomb barrier. This allows to the experimentalist to measure the corresponding S(E)-factor even at energies at which direct measurements can access only via the extrapolations. However, it must be stressed here that the TH S(E)-factor determination requires a normalization procedure to the available direct measurements performed at higher energies, thus rendering the THM a complementary experimental technique for nuclear astrophysics aimed at reaching the ultra-low energy region of interest for astrophysical applications. THM has been used in studying several problems, ranging from BBN [7], light element burning reactions [8–12], CNO reactions [13–15], explosive nucleosynthesis involving RIB [16, 17] and removing / producing neutron reactions [18, 19].
Show more

8 Read more

Theory of the Trojan-Horse Method − From the Original Idea to Actual Applications

Theory of the Trojan-Horse Method − From the Original Idea to Actual Applications

is studied with energies in the initial state above the Coulomb barrier, see the diagram in the left panel of figure 1. The nucleus a is assumed to be well described as a bound state composed of two nuclear clusters b and x. Reaction (1) can be considered as a sub-process of (2) where x is the transfered particle and b acts as a spectator. Nucleus x is hidden inside a and brought across the Coulomb barrier to induce the reaction with A. This description clearly justifies to call nucleus a the Trojan horse, thus explaining the name of the method. It goes back to Homer’s epic poems on the Trojan War and subsequent events. Actually, the capture of Troy with the subterfuge using the Trojan horse is mentioned only shortly in the Odyssey at two places, e.g., as ’. . .κεκαλὺ̀ενοι ιππω’ [6]. A more detailed account of the story can be found in Virgil’s Aeneid [7].
Show more

6 Read more

Electromagnetic Spectrum Analysis Based Hardware Trojan Detection Methodology

Electromagnetic Spectrum Analysis Based Hardware Trojan Detection Methodology

We first average the testing values of many traces, so as to make possible the detection of even small EM contribution from the Trojan circuit compared to the original circuit. Also the measurement noise can be reduced. After that, we denoise our data based on wavelet packet transform. However, when we compare these data under the same coordinate, which is shown in Fig. 1. We can’t find any obvious differences between these traces which may result from the extreme small footprint area. Thus we can’t tell the Trojan circuits from original circuit by directly comparison.

5 Read more

The Trojan Horse Method as a tool for investigating astrophysically relevant fusion reactions

The Trojan Horse Method as a tool for investigating astrophysically relevant fusion reactions

The Trojan Horse Method (THM) has been largely adopted for in- vestigating astrophysically relevant charged-particle induced reactions at Gamow energies. Indeed, THM allows one to by pass extrapola- tion procedures, thus overcoming this source of uncertainty. Here, the recent THM results and their impact in astrophysics are going to be discussed.

6 Read more

Tax Services  as a Trojan Horse in the Auditor Independence Provisions of Sarbanes-Oxley

Tax Services as a Trojan Horse in the Auditor Independence Provisions of Sarbanes-Oxley

SOx directed the Comptroller General to study the potential effects arising from requiring mandatory audit firm rotation. Even after SOx, an arguably inherent conflict of int[r]

43 Read more

“It’s just a Trojan horse for gentrification”:  austerity and stadium led regeneration

“It’s just a Trojan horse for gentrification”: austerity and stadium led regeneration

30 The walkway would involve the demolition of a social housing estate and large numbers of retail businesses with private homes above in order to provide a more direct route for fans to walk between the railway station and the new stadium. This latter quote also reflects the concern that previous critical research on regeneration has identified – that regeneration schemes are directed by a neoliberal drive for increasing the role and power of the private sector at the expense of both the local authority and local communities living within the area outlined for regeneration (Glynn, 2006; Pugalis, 2016). Whilst a variation on the following was heard on a number of occasions during this research, the quote from a local resident at a community meeting – “Spurs’ stadium is being used as a Trojan horse for gentrification” – summarised the views of many. It succinctly emphasises much of the distrust of the local community that grew out of a perceived lack of genuine consultation and transparency that has been noted in other regeneration projects (e.g. Jones, 2002). This lack of consultation is the third theme to which we now turn.
Show more

51 Read more

Are We Buying the Trojan Horse:  The Need for Police Respect of Constitutional Rights

Are We Buying the Trojan Horse: The Need for Police Respect of Constitutional Rights

In order to counteract these factors the police administrator must set up a system of education within his department that will indoctrinate thoroughly the individual police officer in t[r]

5 Read more

Reduction Of Hardware Trojan Effect Using Multipath Authentication

Reduction Of Hardware Trojan Effect Using Multipath Authentication

the analysis was done on the structural features of the combinational Hardware Trojans and sequential Hardware Trojans. The scoring discrimination algorithm used for effective detection of Trojans with less runtime and low failure rate. [16]. With increase of attacker’s ability, there is chance of sudden attacks at run-time. The machine learning techniques are used for detection of real-time attacks or dynamic attacks. The real time online machine learning algorithm is used for protecting many core designs. The algorithm updates the design data after every data transfer using feedback mechanism, different algorithms used for detection, those are Support Vector Machines (SVM), K-Nearest Neighbours (K-NN) and Modified Balanced Window algorithm (MBW) etc., Modified Balanced Window algorithm has higher accuracy for detection compared to SVM and K-NN algorithms. [19]. Hardware Trojans are also detected using Deep learning technique in the gate-level netlists. By observing the controllability and transition probability characteristics of the circuit nodes, which differentiate the healthy node and effected node. The Trojans effected nodes exhibits large inter cluster distance compared to ideal one, with help of this the group of effected nodes and unaffected nodes are identified using k-means clustering [20].
Show more

6 Read more

Nuclear Physics in Stellar Lifestyles with the Trojan Horse Method

Nuclear Physics in Stellar Lifestyles with the Trojan Horse Method

Several test studies have been performed in the past years to validate the THM [35], such as the invariance of the two-body reaction amplitude with changing the Trojan Horse nucleus hiding the participant cluster x [19–21], or the use of momentum distributions from Distorted Wave Born Approximation instead of the simple PWA shape, providing same results within experimental errors [42, 44]. The THM has been applied to many reactions of astro- physical interest connected to fundamental problems in different scenarios, from BBN nucleosynthesis [7, 23–40] to AGB and more explosive sites [41–50]. In the last years, reactions involving heavier systems, such as 12 C and 16 O
Show more

5 Read more

Show all 3087 documents...