Skip to main content

Code-Controlled Hardware Trojan Horse

  • Conference paper
  • 1918 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 308))

Abstract

Hardware Trojan horse, a new threat to information security, has gained significant attention in the past few years. In this paper hardware Trojans are divided to two categories, labeled Code-Controlled ones and non Code-Controlled ones respectively. Code-Controlled hardware Trojan horses are researched primarily. Characteristics of Code-Controlled hardware Trojan horses are analyzed. They are categorized further more according to code types, including FPGA ones and embedded processor ones. Based on the study of Code-Controlled hardware Trojan horses, two instances of Code-Controlled hardware Trojan horses are designed and implemented. One exists in a FPGA and the other is implanted in an embedded processor. The concrete design process and working mechanism of the two Code-Controlled hardware Trojan horses are present. In contrast to malicious software, hardware Trojan horses are more dangerous and more difficult to discover. Experiments show the destructive functions and dormant characteristics of Code-Controlled hardware Trojan horses.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Tehranipoor, M., Koushanfar, F.: A Survey of Hardware Trojan Taxonomy and Detection. IEEE Design &Test of Computers 27, 10–25 (2010)

    Article  Google Scholar 

  2. Jin, Y., Kupp, N., Makris, Y.: Experiences in hardware trojan design and implementation. In: 2nd IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), pp. 50–57. IEEE Press, San Francisco (2009)

    Chapter  Google Scholar 

  3. King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., Zhou, Y.: Designing and implementing malicious hardware. In: The First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 2008), San Francisco, pp. 1–8 (2008)

    Google Scholar 

  4. Fink, R.A., Sherman, A.T., Carback, R.: TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules. IEEE Transactions on Information Forensics and Security 4, 628–637 (2009)

    Article  Google Scholar 

  5. Wolff, F., et al.: Towards Trojan Free Trusted ICs: Problem Analysis and Detection Scheme. In: Design, Automation and Test in Europe, DATE 2008, pp. 1362–1365. IEEE Press, Munich (2008)

    Chapter  Google Scholar 

  6. Wang, X., Tehranipoor, M., Plusquellic, J.: Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. In: IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), pp. 15–19. IEEE Press, Anaheim (2008)

    Chapter  Google Scholar 

  7. Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., Sunar, B.: Trojan detection using IC fingerprinting. In: 28th IEEE Symposium on Security and Privacy (S&P 2007), pp. 296–310. IEEE Press, Oakland (2007)

    Chapter  Google Scholar 

  8. Hicks, M., Finnicum, M., King, S.T.: Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 159–172. IEEE Press, Claremont Resort (2010)

    Chapter  Google Scholar 

  9. Karri, R., Rajendran, J., Rosenfeld, K., Tehranipoor, M.: Trustworthy hardware: identifying and classifying hardware Trojans. Computer 43, 39–46 (2010)

    Article  Google Scholar 

  10. Tehranipoor, M., Cliff, W.: Introduction to Hardware Security and Trust. Springer (2011)

    Google Scholar 

  11. Waksman, A., Sethumadhavan, S.: Tamper Evident Microprocessors. In: 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 354–368. IEEE Press, Claremont Resort (2010)

    Google Scholar 

  12. PLX technology, Inc., PCI 9054 Data Book Rev.2, http://www.plxte-ch.com/products/io/pci9054

  13. Spartan-3 FPGA Family Data Sheet, http://www.xilinx.com/support/documentation/data_sheets/ds099.pdf

  14. AT89C52—8-bit Microcontroller with 8K Bytes Flash, http://www.atmel.com/dyn/resources/prod_documents/doc0313.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gao, H., Li, Q., Zhu, Y., Liu, Y. (2012). Code-Controlled Hardware Trojan Horse. In: Liu, C., Wang, L., Yang, A. (eds) Information Computing and Applications. ICICA 2012. Communications in Computer and Information Science, vol 308. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34041-3_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34041-3_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34040-6

  • Online ISBN: 978-3-642-34041-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics