Paper 2021/1224
Trojan-Resilience without Cryptography
Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, and Michelle Yeo
Abstract
Digital hardware Trojans are integrated circuits whose implementation differ from the specification in an arbitrary and malicious way. For example, the circuit can differ from its specified input/output behavior after some fixed number of queries (known as ``time bombs'') or on some particular input (known as ``cheat codes'').
To detect such Trojans, countermeasures using multiparty computation (MPC) or verifiable computation (VC), have been proposed. On a high level, to realize a circuit with specification
Note: Added back the full proofs and appendix.
Metadata
- Available format(s)
-
PDF
- Publication info
- A minor revision of an IACR publication in TCC 2021
- Keywords
- hardware trojansphysical attacks
- Contact author(s)
-
stefan dziembowski @ gmail com
malgorzata bladoszewska @ gmail com
krzpie @ gmail com
tomaszlizurej @ outlook com
suvradip chakraborty @ ist ac at
michelle yeo @ ist ac at - History
- 2021-10-24: revised
- 2021-09-20: received
- See all versions
- Short URL
- https://ia.cr/2021/1224
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1224, author = {Suvradip Chakraborty and Stefan Dziembowski and Malgorzata Galazka and Tomasz Lizurej and Krzysztof Pietrzak and Michelle Yeo}, title = {Trojan-Resilience without Cryptography}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1224}, year = {2021}, url = {https://eprint.iacr.org/2021/1224} }