This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hardware Trojans in Wireless Cryptographic ICs
January/February 2010 (vol. 27 no. 1)
pp. 26-35
Yier Jin, Yale University
Yiorgos Makris, Yale University

Editor's note:

This article studies the problem of hardware Trojans in wireless cryptographic ICs. The objective is to design Trojans to leak secret information through the wireless channel. The authors investigate challenges related to detection for such Trojans and propose using statistical analysis of the side-channel signals to help detect them.

—Mohammad Tehranipoor, University of Connecticut

1. S. Adee, "The Hunt for the Kill Switch," IEEE Spectrum, vol. 45, no. 5, 2008, pp. 34-39.
2. R.M. Rad et al., "Power Supply Signal Calibration Techniques for Improving Detection Resolution to Hardware Trojans," Proc. IEEE/ACM Int'l Conf. Computer-Aided Design (ICCAD 08), IEEE CS Press, 2008, pp. 632-639.
3. F. Wolff et al., "Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme," Proc. IEEE Design Automation and Test in Europe (DATE 08), IEEE CS Press, 2008, pp. 1362-1365.
4. D. Agrawal et al., "Trojan Detection Using IC Fingerprinting," Proc. IEEE Symp. Security and Privacy, IEEE CS Press, 2007, pp. 296-310.
5. Y. Jin and Y. Makris, "Hardware Trojan Detection Using Path Delay Fingerprint," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2008, pp. 51-57.
6. R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity Analysis to Hardware Trojans Using Power Supply Transient Signals," Proc. IEEE Int'l Workshop Hardware- Oriented Security and Trust, IEEE CS Press, 2008, pp. 3-7.
7. Y. Jin, N. Kupp, and Y. Makris, "Experiences in Hardware Trojan Design and Implementation," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2009, pp. 50-57.
8. L. Lin et al., "Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering," Proc. Cryptographic Hardware and Embedded Systems, LNCS 5747, Springer-Verlag, 2009, pp. 382-395.
9. T. Yuan et al., "A Fully Integrated CMOS Transmitter for Ultra-wideband Applications," Proc. IEEE Radio Frequency Integrated Circuits Symp., IEEE Press, 2007, pp. 39-42.
10. I.T. Joliffe, Principal Component Analysis, Springer- Verlag, 1986.
11. H.G. Stratigopoulos and Y. Makris, "Error Moderation in Low-Cost Machine-Learning-Based Analog/RF Testing," IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 27, no. 2, 2008, pp. 339-351.
12. A. Candore, O. Kocabas, and F. Koushanfar, "Robust Stable Radiometric Fingerprinting for Frequency Reconfigurable Devices," Proc. IEEE Int'l Workshop Hardware-Oriented Security and Trust, IEEE CS Press, 2009, pp. 43-49.

Index Terms:
design and test, hardware Trojan, statistical analysis, wireless cryptographic IC
Citation:
Yier Jin, Yiorgos Makris, "Hardware Trojans in Wireless Cryptographic ICs," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 26-35, Jan.-Feb. 2010, doi:10.1109/MDT.2010.21
Usage of this product signifies your acceptance of the Terms of Use.