Digital-to-Analog Hardware Trojan Attacks

被引:9
|
作者
Elshamy, Mohamed [1 ,2 ]
Di Natale, Giorgio [3 ]
Sayed, Alhassan [1 ,4 ]
Pavlidis, Antonios [1 ]
Louerat, Marie-Minerve [1 ]
Aboushady, Hassan [1 ]
Stratigopoulos, Haralampos-G [1 ]
机构
[1] Sorbonne Univ, CNRS, LIP6, F-75005 Paris, France
[2] Elect Res Inst, Lab Nanotechnol Applicat Elect, Cairo 12622, Egypt
[3] Univ Grenoble Alpes, TIMA, Grenoble INP, CNRS, F-38000 Grenoble, France
[4] Minia Univ, Elect & Commun Dept, Al Minya 61519, Egypt
关键词
Integrated circuits; Payloads; Hardware; Optical transmitters; Built-in self-test; Weapons; Radio frequency; Hardware security and trust; hardware Trojans; test access and control mechanisms; analog and mixed-signal integrated circuits; IN SELF-TEST; DESIGN; ADC; CALIBRATION; GENERATION; DEFENSES; LOOP;
D O I
10.1109/TCSI.2021.3116806
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a Hardware Trojan (HT) attack for analog circuits with its key characteristic being that it cannot be prevented or detected in the analog domain. The HT attack works in the context of Systems-on-Chip (SoCs) comprising both digital and analog Intellectual Property (IP) blocks. The attacker could be either the SoC integrator or the foundry. More specifically, the HT trigger is placed inside a dense digital IP block where it can be effectively hidden, whereas the HT payload is in the form of a digital pattern transported via the test bus or generated within the test bus, reaching the Design-for-Test (DfT) or programmability interface of the victim analog IP with the test bus. The HT payload unexpectedly activates the DfT and sets the victim analog IP into some possibly partial and undocumented test mode or changes the nominal programmability. The HT payload can be designed to result in performance degradation or complete malfunction, i.e., denial of service. We demonstrate this HT attack scenario on two analog IPs, namely a low-dropout (LDO) regulator using simulation and an RF receiver using hardware measurements.
引用
收藏
页码:573 / 586
页数:14
相关论文
共 50 条
  • [1] Digital-to-Analog Hardware Trojan Attacks
    Elshamy, Mohamed
    Pavlidis, Antonios
    Elshamy, Mohamed
    Louerat, Marie-Minerve
    Natale, Giorgio Di
    Sayed, Alhassan
    Sayed, Alhassan
    Aboushady, Hassan
    Stratigopoulos, Haralampos-G.
    IEEE Transactions on Circuits and Systems I: Regular Papers, 2022, 69 (02): : 573 - 586
  • [2] DIGITAL-TO-ANALOG CONVERTER
    MITSUHASHI, Y
    JOURNAL OF THE AUDIO ENGINEERING SOCIETY, 1980, 28 (7-8): : 515 - 520
  • [4] DIGITAL-TO-ANALOG CONVERTER
    不详
    DESIGN NEWS, 1977, 33 (19) : 86 - 90
  • [5] DIGITAL-TO-ANALOG CONVERSION
    LORIFERNE, B
    MESURES REGULATION AUTOMATISME, 1975, 40 (12): : 29 - 36
  • [6] Hardware Trojan Attacks in Embedded Memory
    Hoque, Tamzidul
    Wang, Xinmu
    Basak, Abhishek
    Karam, Robert
    Bhunia, Swamp
    2018 IEEE 36TH VLSI TEST SYMPOSIUM (VTS 2018), 2018,
  • [7] ANALOG-TO-DIGITAL AND DIGITAL-TO-ANALOG FILTERING, QUANTIZATION
    BLESSER, B
    JOURNAL OF THE AUDIO ENGINEERING SOCIETY, 1982, 30 (7-8): : 540 - 540
  • [8] Time-Domain Digital-to-Analog Converter for Spiking Neural Network Hardware
    Seiji Uenohara
    Kazuyuki Aihara
    Circuits, Systems, and Signal Processing, 2021, 40 : 2763 - 2781
  • [9] Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures
    Taimour Wehbe
    Vincent J. Mooney
    Omer T. Inan
    David C. Keezer
    Journal of Hardware and Systems Security, 2018, 2 (3) : 251 - 265
  • [10] Time-Domain Digital-to-Analog Converter for Spiking Neural Network Hardware
    Uenohara, Seiji
    Aihara, Kazuyuki
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2021, 40 (06) : 2763 - 2781