Hardware Trojans in asynchronous FIFO-buffers: From clock domain crossing perspective

System on chip (SoC) contains multiple intellectual properties (IPs) that work in different clock domains. Several of those IPs may even have multiple clock domains within itself and provided to SoC designers as hard IPs. Different clock domain crossing (CDC) techniques are used to communicate among different clock domains. First In First Out (FIFO) buffers are part of several CDC circuits. This research explores the possible security vulnerabilities of such SoCs in the event of compromised security in FIFO buffers. We investigated few catastrophic possibilities of hardware Trojans in FIFO buffers and discussed its potential consequences. Testing the design using random bit generation showed that the triggering probabilities of such Trojans are less than 8/1000. Our synthesis results show that majority of these Trojans require minimal area and frequency overhead, in the range of .8% and 1%, respectively, if FIFO occupies 10% space of the IP.

[1]  Jie Zhang,et al.  VeriTrust: Verification for hardware trust , 2013, 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC).

[2]  Pong P. Chu RTL Hardware Design Using VHDL: Coding for Efficiency, Portability, and Scalability , 2006 .

[3]  Guy Lemieux,et al.  A Survey and Taxonomy of GALS Design Styles , 2007, IEEE Design & Test of Computers.

[4]  Mark Mohammad Tehranipoor,et al.  Hardware Trojan Horses , 2010, Towards Hardware-Intrinsic Security.

[5]  Erik Jan Marinissen,et al.  Design and DfT of a High-Speed Area-Efficient Embedded Asynchronous FIFO , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.

[6]  Mark Mohammad Tehranipoor,et al.  A Clock Sweeping Technique for Detecting Hardware Trojans Impacting Circuits Delay , 2013, IEEE Design & Test.

[7]  Farinaz Koushanfar,et al.  ClockPUF: Physical Unclonable Functions based on clock networks , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[8]  Syed Rafay Hasan,et al.  Inter-module Interfacing techniques for SoCs with multiple clock domains to address challenges in modern deep sub-micron technologies , 2009 .

[9]  Mark Mohammad Tehranipoor,et al.  A Novel Technique for Improving Hardware Trojan Detection and Reducing Trojan Activation Time , 2012, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[10]  Christof Paar,et al.  Stealthy dopant-level hardware Trojans: extended version , 2014, Journal of Cryptographic Engineering.