A Pre-Fabrication Malicious Hardware Implementation Method

2018 
Hardware trojan is becoming a big threat for its undetectable. The complexity of IC design flow also makes it easy to insert malicious hardware unnoticed, especially for the fabrication attack for fabless design house. In this paper, we design a pre-fabrication hardware trojan implemented only based on GDSII file. The result shows that the trojan can run at 564.9MHz that is faster than original chip with less than 0.02% additional power. The trojan could be triggered by malicious software and keep silence when running normal programs.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    1
    References
    0
    Citations
    NaN
    KQI
    []