TY - JOUR
T1 - Evaluation of EM information leakage caused by IEMI with hardware Trojan
AU - Kinugawa, Masahiro
AU - Hayashi, Yu Ichi
AU - Mori, Tatsuya
N1 - Publisher Copyright:
© 2017 The Institute of Electrical Engineers of Japan.
PY - 2017
Y1 - 2017
N2 - Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.
AB - Hardware Trojans (HT) that are implemented at the time of manufacturing ICs are being reported as a new threat that could destroy the IC or degrade its security under specific circumstances, and is becoming a key security challenge that must be addressed. On the other hand, since it is also common to use components manufactured or bought via third parties in portions outside of the substrate on which the IC is mounted or communication lines connecting the IC and the substrate, there is a possibility that HTs may also be set in the peripheral circuits of the IC in the same manner as in the IC. In this paper, we developed an HT that could be implemented in the peripheral circuits and wiring of an IC, investigated the possibility of being able to acquire information processed inside a device by measuring the electromagnetic waves generated and leaked by Intentional Electromagnetic Interference (IEMI) with HT outside the device, and investigated detection methods for cases where such HTs are implemented.
KW - Electromagnetic information leakage
KW - Hardware Trojans
KW - Intentional electromagnetic interference
UR - http://www.scopus.com/inward/record.url?scp=85015719986&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015719986&partnerID=8YFLogxK
U2 - 10.1541/ieejfms.137.153
DO - 10.1541/ieejfms.137.153
M3 - Article
AN - SCOPUS:85015719986
SN - 0385-4205
VL - 137
SP - 153
EP - 157
JO - IEEJ Transactions on Fundamentals and Materials
JF - IEEJ Transactions on Fundamentals and Materials
IS - 3
ER -