Hardware trojans for inducing or amplifying side-channel leakage of cryptographic software

  • Authors:
  • Jean-François Gallais;Johann Großschädl;Neil Hanley;Markus Kasper;Marcel Medwed;Francesco Regazzoni;Jörn-Marc Schmidt;Stefan Tillich;Marcin Wójcik

  • Affiliations:
  • University of Luxembourg, Luxembourg;University of Luxembourg, Luxembourg;University College Cork, Ireland;Ruhr University Bochum, Germany;Université catholique de Louvain, Belgium;Université catholique de Louvain, Belgium;Graz University of Technology, Austria;University of Bristol, United Kingdom;University of Bristol, United Kingdom

  • Venue:
  • INTRUST'10 Proceedings of the Second international conference on Trusted Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardware Trojans can range from the disabling of all or part of the chip (i.e. “kill switch”), over the activation of a backdoor that allows an adversary to gain access to the system, to the covert transmission of sensitive information (e.g. cryptographic keys) off-chip. In the recent past, hardware Trojans which induce side-channel leakage to convey secret keys have received considerable attention. With the present paper we aim to broaden the scope of Trojan side-channels from dedicated cryptographic hardware to general-purpose processors on which cryptographic software is executed. In particular, we describe a number of simple micro-architectural modifications to induce or amplify information leakage via faulty computations or variations in the latency and power consumption of certain instructions. We also propose software-based mechanisms for Trojan activation and present two case studies to exemplify the induced side-channel leakage for software implementations of RSA and AES. Finally, we discuss a constructive use of micro-architectural Trojans for digital watermarking so as to facilitate the detection of illegally manufactured copies of processors.