Research Article
Remote Activation of Hardware Trojans via a Covert Temperature Channel
@INPROCEEDINGS{10.1007/978-3-319-28865-9_16, author={Priyabrat Dash and Chris Perkins and Ryan Gerdes}, title={Remote Activation of Hardware Trojans via a Covert Temperature Channel}, proceedings={Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers}, proceedings_a={SECURECOMM}, year={2016}, month={2}, keywords={Hardware Trojan Remote activation Covert channel Detection}, doi={10.1007/978-3-319-28865-9_16} }
- Priyabrat Dash
Chris Perkins
Ryan Gerdes
Year: 2016
Remote Activation of Hardware Trojans via a Covert Temperature Channel
SECURECOMM
Springer
DOI: 10.1007/978-3-319-28865-9_16
Abstract
A hardware trojan (HT) is produced through the malicious tampering of an integrated circuit design. Depending on its placement and purpose, an HT may cause data leakage or corruption, computational errors, reduced system performance, and temporary or permanent denial-of-service through the disabling or destruction of the chip. The varied geographic locales involved in designing, fabricating, and testing a design allow an attacker ample opportunity to insert an HT. In this paper we propose a method to enable the remote activation of HT, via a covert temperature channel, across a network. Through experimentation, our activation method is shown to be feasible on modern computers. In addition, its design is tolerant of process variation to ensure that it can be reliably fabricated. The design was validated using industry standard STMicroelectronics 65 nm technology and shown to be undetectable against present detection techniques. We discuss the major challenges associated with such HT and future research needs to address them.