Hardware Trojans Flashcards
what is a hardware trojan?
A malicious addition or modification to the existing circuit elements
what are 3 effects of HT?
- Change functionality
- Drain resources
- Leak secret info
Specification phase
- Designers map out what requirements of chip (power, timing, etc)
- HTs can change functional specifications
Design phase
- Designers consider functional, logical, timing, and physical constraints
- HT can be in any component in the design
fabrication phase
- When the chip is physically made
- Subtle mask changes can have a serious effect
testing phase
- Great opportunity to test for HT
- Need to make sure that the test vectors are kept secret so that adversary cannot make test vectors that will hide HT
assembly phase
- Chip is combined with other circuitry on PCB
- Every interface where components interact is a place for HT
name the 2 components of HT
trigger and payload
can HT be removed?
not without replacing the hardware of a computer
no-trigger activation
HT is always on
trigger activation
needs either internal or external event in order to active
how long do triggered HTs remain active?
indefinitely, a specific amount of time, or until a specific condition
internal triggers
time-based or event-based events (counter or temperature threshold)
External triggers
based on input from outside the chip
combination trojan
“I need to see these two inputs to activate”