10.1145/2966986.2967054acmconferencesArticle/Chapter ViewAbstractPublication PagesiccadConference Proceedings
research-article

Malicious LUT: a stealthy FPGA trojan injected and triggered by the design flow

ABSTRACT

We present a novel type of Trojan trigger targeted at the field-programmable gate array (FPGA) design flow. Traditional triggers base on rare events, such as rare values or sequences. While in most cases these trigger circuits are able to hide a Trojan attack, exhaustive functional simulation and testing will reveal the Trojan due to violation of the specification. Our trigger behaves functionally and formally equivalent to the hardware description language (HDL) specification throughout the entire FPGA design flow, until the design is written by the place-and-route tool as bitstream configuration file . From then, Trojan payload is always on. We implement the trigger signal using a 4-input lookup table (LUT), each of the inputs connecting to the same signal. This lets us directly address the least significant bit (LSB) and most significant bit (MSB) of the LUT. With the remaining 14 bits, we realize a "magic" unary operation. This way, we are able to implement 16 different Triggers. We demonstrate the attack with a simple example and discuss the effectiveness of the recent detection techniques unused circuit identification (UCI), functional analysis for nearly-unused circuit identification (FANCI) and VeriTrust in order to reveal our trigger.

References

  1. M. S. Anderson, C. J. G. North, and K. K. Yiu. Towards Countering the Rise of the Silicon Trojan. Tech. rep. Dec. 2008.Google ScholarGoogle Scholar
  2. R. S. Chakraborty et al. "Hardware Trojan Insertion by Direct Modification of FPGA Configuration Bitstream". In: IEEE Design Test 30.2 (2013), pp. 45--54.Google ScholarGoogle ScholarCross RefCross Ref
  3. R. Chakraborty, S. Narasimhan, and S. Bhunia. "Hardware Trojan: Threats and emerging solutions". In: High Level Design Validation and Test Workshop, 2009. HLDVT 2009. IEEE International. 2009, pp. 166--171.Google ScholarGoogle ScholarCross RefCross Ref
  4. S. Drimer. Security for volatile FPGAs. Tech. rep. University of Cambridge, 2009.Google ScholarGoogle Scholar
  5. M. Hicks et al. "Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically". In: Security and Privacy (SP), 2010 IEEE Symposium on. May 2010, pp. 159 --172. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Joyce. Talk: Disrupting Nation State Hackers. Talk given at USENIX Enigma Security Conference. Jan. 27, 2016.Google ScholarGoogle Scholar
  7. B. Khaleghi et al. "FPGA-Based Protection Scheme against Hardware Trojan Horse Insertion Using Dummy Logic". In: IEEE Embedded Systems Letters 7.2 (2015), pp. 46--50.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. T. King et al. "Designing and implementing malicious hardware". In: LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. San Francisco, California: USENIX Association, 2008, pp. 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Krieg, M. Rathmair, and F. Schupfer. "A Process for the Detection of Design-Level Hardware Trojans Using Verification Methods". In: Proceedings of the 11th IEEE International Conference on Embedded Software and Systems (ICESS 2014). Aug. 2014, pp. 741--746. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Peikari and A. Chuvakin. Security Warrior. Ed. by M. Loukides. O'Reilly Media, Inc., 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Rathmair, F. Schupfer, and C. Krieg. "Applied formal methods for hardware Trojan detection". In: Circuits and Systems (ISCAS), 2014 IEEE International Symposium on. 2014, pp. 169--172.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Roy, F Koushanfar, and I. Markov. "Extended abstract: Circuit CAD tools as a security threat". In: Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International Workshop on. 2008, pp. 65--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. C. Seed. Arachne-pnr. url: https://github.com/cseed/arachne-pnr.Google ScholarGoogle Scholar
  14. C. Sturton et al. "Defeating UCI: Building Stealthy and Malicious Hardware". In: Proc. IEEE Symp. Security and Privacy (SP). 2011, pp. 64--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M Tehranipoor and F Koushanfar. "A Survey of Hardware Trojan Taxonomy and Detection". In: Design Test of Computers, IEEE 27.1 (2010), pp. 10--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. K. Thompson. "Reflections on Trusting Trust". In: Commun. ACM 27.8 (Aug. 1984), pp. 761--763. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Trimberger. "Trusted Design in FPGAs". In: Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE. 2007, pp. 5--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Waksman, M. Suozzo, and S. Sethumadhavan. "FANCI: Identification of Stealthy Malicious Logic Using Boolean Functional Analysis". In: Proceedings of CCS 2013. Authors version. To be published in the Proceedings of the CCS 2013. 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C. Wolf. Project IceStorm. url: http://www.clifford.at/icestorm/.Google ScholarGoogle Scholar
  20. C. Wolf. Yosys Open SYnthesis Suite. http://www.clifford.at/yosys/. url: http://www.clifford.at/yosys/ (visited on 03/10/2016).Google ScholarGoogle Scholar
  21. C. Wolf and J. Glaser. "Yosys - A Free Verilog Synthesis Suite". In: Proceedings of the 21st Austrian Workshop on Microelectronics (Austrochip). 2013.Google ScholarGoogle Scholar
  22. J. Zhang et al. "VeriTrust: Verification for Hardware Trust". In: Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on 34.7 (2015), pp. 1148--1161.Google ScholarGoogle ScholarCross RefCross Ref
  23. J. Zhang, F. Yuan, and Q. Xu. "DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans". In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. CCS '14. Scottsdale, Arizona, USA: ACM, 2014, pp. 153--166. Google ScholarGoogle ScholarDigital LibraryDigital Library

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    ACM Conferences cover image
    ICCAD '16: Proceedings of the 35th International Conference on Computer-Aided Design
    November 2016
    984 pages
    ISBN:9781450344661
    DOI:10.1145/2966986
    • General Chair:
    • Frank Liu

    Copyright © 2016 ACM

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 7 November 2016

    Permissions

    Request permissions about this article.

    Request Permissions

    Qualifiers

    • research-article

    Acceptance Rates

    ICCAD '16 Paper Acceptance Rate 97 of 408 submissions, 24%
    Overall Acceptance Rate 1,011 of 3,897 submissions, 26%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!