Logic and Reduction Operation based Hardware Trojans in Digital Design

09/09/2022
by   Mayukhmali Das, et al.
0

In this paper, we will demonstrate Hardware Trojan Attacks on four different digital designs implemented on FPGA. The hardware trojan is activated based on special logical and reduction-based operations on vectors which makes the trojan-activity as silent and effective as possible. In this paper, we have introduced 5 novel trojan attack methodologies.

READ FULL TEXT

page 1

page 2

research
11/12/2016

Can Broken Multicore Hardware be Mended?

A suggestion is made for mending multicore hardware, which has been diag...
research
10/01/2019

Insights into the Mind of a Trojan Designer: The Challenge to Integrate a Trojan into the Bitstream

The threat of inserting hardware Trojans during the design, production, ...
research
11/20/2018

Design paradigms of intelligent control systems on a chip

This paper focuses on the Field Programmable Gate Array (FPGA) design an...
research
04/15/2020

Speeding-up Logic Design and Refining Hardware EDA Flow by Exploring Chinese Character based Graphical Representation

Electrical design automation (EDA) techniques have deeply influenced the...
research
11/08/2022

A study and comparison of COordinate Rotation DIgital Computer (CORDIC) architectures

Most of the digital signal processing applications performs operations l...
research
01/19/2023

System on Chip Rejuvenation in the Wake of Persistent Attacks

To cope with the ever increasing threats of dynamic and adaptive persist...
research
09/24/2022

Certified Hardware Requirements Undermine Digital Currency

Design approaches based on certified hardware have featured prominently ...

Please sign up or login with your details

Forgot password? Click here to reset