16.05.2017 1
How to Attack the IoT with Hardware Trojans
Janet Lackey under CC license
CROSSING Conference Darmstadt, May 16, 2017
Christof Paar Ruhr Universität Bochum
- Georg Becker
- Pawel Swierczynski
- Marc Fyrbiak
How to Attack the IoT with Hardware Trojans Janet Lackey under CC - - PDF document
16.05.2017 How to Attack the IoT with Hardware Trojans Janet Lackey under CC license CROSSING Conference Darmstadt, May 16, 2017 Christof Paar Ruhr Universitt Bochum Acknowledgement Georg Becker Pawel Swierczynski Marc Fyrbiak 1
Janet Lackey under CC license
15 17 18 32 34 15 47 68 133 167 199 50 100 150 200 250 2007 2008 2009 2010 2011 2012
(Google Scholar, Aug 2013)
in paper
Malicious factory, esp. off‐shore (foreign Government)
DoD scenario 2005 not‐so‐unlikely 2013
PMOS transistor permanent closed NMOS transistor permanent open
011001011110 …
testing all keys: lifetime of the universe
+1
Testing all keys: few seconds
256 bit state
(Based on AES)
CRC Checksum Reference Checksum
256 bit state
(Based on AES)
CRC Checksum Reference Checksum
TROJAN
Manipulate Bits configure
Source Graphics: SimpleIcon, Xilinx
103 … 106 logic cells bitstream is complex and proprietary