Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

10/01/2019
by   Maik Ender, et al.
0

The threat of inserting hardware Trojans during the design, production, or in-field poses a danger for integrated circuits in real-world applications. A particular critical case of hardware Trojans is the malicious manipulation of third-party FPGA configurations. In addition to attack vectors during the design process, FPGAs can be infiltrated in a non-invasive manner after shipment through alterations of the bitstream. First, we present an improved methodology for bitstream file format reversing. Second, we introduce a novel idea for Trojan insertion.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset