Proceedings of the 2016 International Conference on Communications, Information Management and Network Security

Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels

Authors
Yancang Chen, Ying Zhou, Pei Wei, Sai Sui, Yaxin Zhao, Minlei Zhang, Lunguo Xie
Corresponding Author
Yancang Chen
Available Online September 2016.
DOI
10.2991/cimns-16.2016.28How to use a DOI?
Keywords
hardware trojan horse; covert channels; keys; encrpytion
Abstract

Hardware Trojan horses have become a troublesome challenge for security-sensitive integrated circuits. As one important categorization, the carrier of wireless-leakage hardware Trojan horse is radio wave, bypassed protective isolation equipment, such as traditional firewall. Even if no networking, it can also works, therefore more devilishness. This paper design a wireless-leakage hardware Trojan horse with Spartan-3E FPGA, which can pass system sensitive information to outside device with wireless radio signal by common pins, and the signals can be received by simple radios. Experimental results show that, a simple radio can receive the signal emitted by the hardware Trojan horse when their distance is more the 30 meters without any holdbacks. We also present a detection method and some defense suggestions.

Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2016 International Conference on Communications, Information Management and Network Security
Series
Advances in Computer Science Research
Publication Date
September 2016
ISBN
10.2991/cimns-16.2016.28
ISSN
2352-538X
DOI
10.2991/cimns-16.2016.28How to use a DOI?
Copyright
© 2016, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yancang Chen
AU  - Ying Zhou
AU  - Pei Wei
AU  - Sai Sui
AU  - Yaxin Zhao
AU  - Minlei Zhang
AU  - Lunguo Xie
PY  - 2016/09
DA  - 2016/09
TI  - Verification and Detection of a Wireless-Leakage Hardware Trojan Horse with Covert Channels
BT  - Proceedings of the 2016 International Conference on Communications, Information Management and Network Security
PB  - Atlantis Press
SP  - 111
EP  - 114
SN  - 2352-538X
UR  - https://doi.org/10.2991/cimns-16.2016.28
DO  - 10.2991/cimns-16.2016.28
ID  - Chen2016/09
ER  -