Hardware Trojans in Wireless Cryptographic Integrated Circuits

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=hohjZjRci44



Duration: 1:10:47
354 views
7


I will be discussing our research activities in the area of hardware Trojans in wireless cryptographic integrated circuits. In this class of circuits, the likely objective of hardware Trojans is to leak secret data (i.e. the encryption key) through the wireless channel. Using a simple mixed-signal system-on-chip designed for this study and consisting of a DES encryption core and a UWB transmitter, I will demonstrate three key findings: i) Simple malicious modifications to the digital part of a wireless cryptographic chip suffice to leak information, without altering the far more sensitive analog part. I will demonstrate two hardware Trojan examples, which leak the encryption key by manipulating the transmission amplitude or frequency. ii) Such hardware Trojans do not change the functionality of the digital part or the performances of the analog part and their impact on the wireless transmission parameters can be hidden within the fabrication process variations. Hence, neither traditional manufacturing testing nor recently proposed hardware Trojan detection methods will expose them. iii) For the attacker to be able to discern the leaked information from the legitimate signal, effective hardware Trojans have to impose some structure to the transmission parameters. While this structure is not known to the defender, statistical analysis of these parameters (i.e. transmission power) could reveal its existence and, thereby, expose the hardware Trojan. Time permitting I will also discuss the effectiveness of similar statistical methods using power and delay measurements in detecting hardware Trojans in traditional digital logic.




Other Videos By Microsoft Research


2016-08-17Design Expo
2016-08-172010 Microsoft Research eScience Workshop - Session MA2 - Data Analysis Through Visualization
2016-08-172010 Microsoft Research eScience Workshop - Session MA4 - Health & Wellbeing I
2016-08-172010 Microsoft Research eScience Workshop - Session MA1 - Senses Across Scales
2016-08-172010 Microsoft Research eScience Workshop - Session MA6 - Complex Biological Systems in Action
2016-08-17Rank Bounds for Design Matrices
2016-08-17Price of Anarchy in Adword Auctions
2016-08-172010 Microsoft Research eScience Workshop - Jim Gray eScience Award Presentation
2016-08-17Hera-JVM: A Runtime System for Heterogeneous Multi-Core Architectures
2016-08-17UCSD Distributed Cognition and Human-Computer Interaction Lab Research
2016-08-17Hardware Trojans in Wireless Cryptographic Integrated Circuits
2016-08-17Stable, Fair Societies As The Natural Product of Local Exchange Networks
2016-08-17Not All Frames Are Created Equal: Temporal Sparsity for Robust and Efficient ASR
2016-08-17California Fault Lines: Understanding the Causes and Impact of Network Failures
2016-08-17e-Heritage Projects in Italy, Cambodia, and Japan: Lesson learned
2016-08-17Self-Stabilizing Autonomic Recoverers
2016-08-17Embedding spanning trees in random graphs
2016-08-17Real-time estimation of distributed parameters systems: application to traffic monitoring
2016-08-17A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
2016-08-17Spectral graph sparsification Part 2: [An O(mlog^2 n) algorithm for solving SDD systems]
2016-08-17MSR New England Social Media Research



Tags:
microsoft research