Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits

Jungwoo Joh, Yezee Seo, Hoon Kyu Kim, Taekyoung Kwon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As the IoT era comes to the full-fledged, hardware Trojans that involve malicious modifications of circuitry are becoming a growing security concern. To avoid a detection mechanism, hardware Trojans may need a stealthy nature in their existence for being dormant, and even when triggered. In this paper, we devise a new hardware Trojan concept that exploits natural glitches and their control mechanisms for information leakage in a stealthy manner. We indeed reversely exploit the glitch control mechanisms to be bypassed when triggered, and try to recall the natural glitches for the purpose. An adversary who triggered the hardware Trojan may infer multiple input values from a single output of the target logic, thereby obtaining multiple outputs of the preceding logics, by monitoring the existence of the natural glitches. We perform experiments and discuss the results and threats, not to be neglected, along with a possible mitigation.

Original languageEnglish
Title of host publicationInformation Security Applications - 18th International Conference, WISA 2017, Revised Selected Papers
EditorsBrent ByungHoon Kang, Taesoo Kim
PublisherSpringer Verlag
Pages150-161
Number of pages12
ISBN (Print)9783319935621
DOIs
Publication statusPublished - 2018
Event18th World International Conference on Information Security and Application, WISA 2017 - Jeju Island, Korea, Republic of
Duration: 2017 Aug 242017 Aug 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10763 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other18th World International Conference on Information Security and Application, WISA 2017
Country/TerritoryKorea, Republic of
CityJeju Island
Period17/8/2417/8/26

Bibliographical note

Funding Information:
This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract (UD160066BD).

Publisher Copyright:
© 2018, Springer International Publishing AG, part of Springer Nature.

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits'. Together they form a unique fingerprint.

Cite this