Abstract
Hardware Trojan horse, a new threat to information security, has gained significant attention in the past few years. In this paper hardware Trojans are divided to two categories, labeled Code-Controlled ones and non Code-Controlled ones respectively. Code-Controlled hardware Trojan horses are researched primarily. Characteristics of Code-Controlled hardware Trojan horses are analyzed. They are categorized further more according to code types, including FPGA ones and embedded processor ones. Based on the study of Code-Controlled hardware Trojan horses, two instances of Code-Controlled hardware Trojan horses are designed and implemented. One exists in a FPGA and the other is implanted in an embedded processor. The concrete design process and working mechanism of the two Code-Controlled hardware Trojan horses are present. In contrast to malicious software, hardware Trojan horses are more dangerous and more difficult to discover. Experiments show the destructive functions and dormant characteristics of Code-Controlled hardware Trojan horses.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Tehranipoor, M., Koushanfar, F.: A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design &Test of Computers 27, 10–25 (2010)
Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), pp. 50–57. IEEE Press, San Francisco (2009)
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, pp. 1–8 (2008)
Fink, R.A., Sherman, A.T., Carback, R.: TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules. IEEE Transactions on Information Forensics and Security 4, 628–637 (2009)
Wolff, F., et al.: Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme. In: Design, Automation and Test in Europe, DATE 2008, pp. 1362–1365. IEEE Press, Munich (2008)
Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 15–19. IEEE Press, Anaheim (2008)
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 28th IEEE Symposium on Security and Privacy (S&P 2007), pp. 296–310. IEEE Press, Oakland (2007)
Hicks, M., Finnicum, M., King, S.T.: Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 159–172. IEEE Press, Claremont Resort (2010)
Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware Trojans. Computer 43, 39–46 (2010)
Tehranipoor, M., Cliff, W.: Introduction to Hardware Security and Trust. Springer (2011)
Waksman, A., Sethumadhavan, S.: Tamper Evident Microprocessors. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 354–368. IEEE Press, Claremont Resort (2010)
PLX technology, Inc., PCI 9054 Data Book Rev.2, http://www.plxte-ch.com/products/io/pci9054
Spartan-3 FPGA Family Data Sheet, http://www.xilinx.com/support/documentation/data_sheets/ds099.pdf
AT89C52—8-bit Microcontroller with 8K Bytes Flash, http://www.atmel.com/dyn/resources/prod_documents/doc0313.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gao, H., Li, Q., Zhu, Y., Liu, Y. (2012). Code-Controlled Hardware Trojan Horse. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-34041-3_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34040-6
Online ISBN: 978-3-642-34041-3
eBook Packages: Computer ScienceComputer Science (R0)