Ec3401-Networks and Security - 848492139-n&s Unit 5
Ec3401-Networks and Security - 848492139-n&s Unit 5
Introduction to hardware security, Hardware Trojans, Side – Channel Attacks – Physical Attacks and
Countermeasures – Design for Security. Introduction to Block chain Technology.
ELECTRONIC HARDWARE
The hardware in a computing system can, itself, be viewed as consisting of three layers
System-level hardware, that is, the integration of all physical components (such as PCBs,
peripheral devices, and enclosures)
At the next level, one or more PCBs used which provide mechanical support and electrical
connection to the electronic components that are required to meet the functional and
performance requirements of a system.
At the bottom-most layer, we have active components (such as ICs, transistors, and relays), and
passive electronic components.
Hardware Trust:
Hardware trust issues arise from involvement of untrusted entities in the life cycle of hardware,
including untrusted IP or computer-aided design (CAD) tool vendors, and untrusted design,
fabrication, test, or distribution facilities. These parties are capable of violating the
trustworthiness of a hardware component or system.
They can potentially cause deviations from intended functional behavior, performance, or
reliability.
Hardware Trojans:
Hardware Trojans are malicious modifications to original circuitry inserted by adversaries to
exploit hardware or to use hardware mechanisms to create backdoors in the design
Hardware Trojans have reportedly been used as ‘kill switches’ and backdoors in foreign military
weapon system
Detection of hardware Trojans is extremely difficult, for several reasons:
Given the large number of soft, firm, and hard IP cores used in SoCs, and the high complexity of
today’s IP blocks, detecting a small malicious alteration is extremely difficult.
Nanometer SoC feature sizes make detection by physical inspection and destructive reverse
engineering very difficult, time consuming, and costly.
Trojan circuits, by design, are typically activated under very specific conditions which makes
them unlikely to be activated and detected using random or functional stimuli.
Tests used to detect manufacturing faults, such as stuck-at and delay faults cannot guarantee
detection of Trojans. Even when 100% fault coverage for all types of manufacturing faults is
possible, there are no guarantees as far as Trojans are concerned.
As physical feature sizes decrease because of improvements in lithography, process and
environmental variations have an increasingly greater impact on the integrity of the circuit
parametric behavior.
HARDWARE TROJAN STRUCTURE
The basic structure of a Trojan in a 3PIP (Party Intellectual Property) can include two main parts,
trigger and payload
A Trojan trigger is an optional part that monitors various signals and/or a series of events in the
circuit.
The payload usually taps signals from the original circuit and the output of the trigger.
TROJAN MODELING
In this model, it is assumed that a Trojan will be activated by rare circuit node conditions and
will have its payload as a critical node in terms of functionality, but low observable node in
terms of testing, to evade detection during normal functional testing.
If the Trojan includes sequential elements, such as rare-event triggered counters, then the
Trojan may be even harder to detect. Figure shows generic models for combinational and
sequential Trojans.
The trigger condition is an n-bit value at internal nodes, which is assumed to be rare enough to
evade normal functional testing. The payload is defined as a node that is inverted when the
Trojan is activated.
To make it more difficult to detect, one might consider a sequential Trojan, which requires the
rare event to repeat 2m times before the Trojan gets activated and inverts the payload node.
The sequential state machine is considered in its simplest form to be a counter, and the effect of
the output on the payload is considered to be an XOR function to have maximal impact.
In more generic models, the counter can be replaced by any Finite State Machine (FSM) and the
circuit can be modified as a function of Trojan output and the payload node.
Side-channel attacks (SCA):
It is a noninvasive attack that is based on targeting the implementation of a cryptographic
algorithm rather than analyzing its statistical or mathematical weakness.
Figure illustrates how a device leaks side-channel information while operating. Common
sidechannel attacks, such as power attacks, monitor the device’s power consumption. Typically,
this is done by incorporating a current path at Vdd or GND pin of a chip, which is performing the
cryptographic operation, to record power dissipation for such an operation.
The device’s power consumption captures switching activity of the relevant transistors, which
depends on inputs to a cryptographic function, such as the plaintext and the key.
Simple power analysis (SPA) is a technique to directly interpret the collected traces of power
consumption for a set of inputs.
It requires relatively detailed knowledge about the implementation of a cryptographic algorithm
and a skilled adversary to interpret secret key information by visually examining the power
consumption.
Distributed Database:
There is no Central Server or System which keeps the data of the Block chain.
The data is distributed over Millions of Computers around the world which are connected to the Block
chain.
This system allows Notarization of Data as it is present on every node is publicly verifiable.
A network of nodes:
A node is a computer connected to the Block chain Network.
Node gets connected with Block chain using the client.
Client helps in validating and propagating transaction on to the Block chain.
When a computer connects to the Blockchain, a copy of the Block chain data gets downloaded
into the system and the node comes in sync with the latest block of data on Block chain.
CONNECT WITH US
WEBSITE: www.eduengineering.net
TELEGRAM: @eduengineering
-
INSTAGRAM: @eduengineering