• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

A study of countermeasure for Hardware Trojan

Research Project

Project/Area Number 24710190
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Social systems engineering/Safety system
Research InstitutionRitsumeikan University

Principal Investigator

KUMAKI Takeshi  立命館大学, 理工学部, 任期制講師 (60452596)

Project Period (FY) 2012-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2014: ¥1,040,000 (Direct Cost: ¥800,000、Indirect Cost: ¥240,000)
Fiscal Year 2013: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2012: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Keywordsハードウェアトロイ / セキュリティ / 組込み機器 / LSI / 暗号 / AES / DES / FPGA / ARM / モバイル機器 / 暗号処理 / TDES / LSIテロリスト / ロボット / 監視回路
Outline of Final Research Achievements

In recent years, several researches for hardware Trojan and its detecting method are becoming to active rapidly.The hardware Trojan is implanted as hardware modification to conventional LSIs. After a trigger, which is an activate signal to satisfy event condition occurs, hardware Trojan-implanted chips are modified the original function to enable an adversary to control, monitor, communication and so on. Thus, an adversary can disable or destroy a system, or the Trojan can leak confidential information and secret keys convertly to the adversary.
In this research, a verification board, which can execute the ARM-based SOC processing, is developed with a CPU and a FPGA. Especially, a hardware Trojan, which is implanted the cryptographic triple DES and AES circuits, is implemented in a Xilinx FPGA and is able to leak plain text and a secret-key after encrypting processing.

Report

(4 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • Research Products

    (20 results)

All 2015 2014 2013 2012 Other

All Journal Article (6 results) (of which Peer Reviewed: 6 results) Presentation (14 results)

  • [Journal Article] ハードウェアトロイ検証環境の開発と暗号回路を用いた実装及び評価2015

    • Author(s)
      熊木武志,塚田靖史,吉川雅弥,小倉 武,藤野 毅
    • Journal Title

      電子情報通信学会論文誌 (A)

      Volume: J98-A Pages: 313-326

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Development of compression tolerable and highly implementable watermarking method for mobile devices2014

    • Author(s)
      T. Kumaki, K. Nakao, K. Hozumi, T. Ogura and T. Fujino
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: vol. E97-D, no. 3 Pages: 593-596

    • NAID

      130003394875

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Morphological pattern spectrum-based objects detection for protecting privacy2013

    • Author(s)
      Y. Murakami, T. Honda, Y. Yanagihara, T. Kumaki, T. Ogura and T. Fujino
    • Journal Title

      Journal of Signal Processing

      Volume: vol. 17, no. 4 Pages: 155-158

    • NAID

      130004849297

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Morphological pattern spectrum and block cipher processing based image-manipulation detection2013

    • Author(s)
      T. Kumaki, T. Fujita, M. Nakanishi and T. Ogura
    • Journal Title

      IEICE Trans. Nonlinear Theory and Its Applications

      Volume: vol. E4-N, no. 4 Pages: 1742-1754

    • NAID

      130004960148

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Max-plus algebra-based morphological wavelet transform watermarking for highly-parallel processing with mobile embedded processor2012

    • Author(s)
      T. Kumaki, Y. Murakami, S. Itaya, K. Nakao, T. Ogura, and T. Fujino
    • Journal Title

      Journal of Signal Processing

      Volume: Vol. 16, No. 6 Pages: 547-556

    • NAID

      130004457047

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] ストリーム暗号CryptMTのデータ並列処理による高速化手法及びSIMD型組み込みプロセッサによる実装と評価2012

    • Author(s)
      本多隼也, 望月陽平, 熊木武志, 藤野 毅
    • Journal Title

      電子情報通信学会論文誌 (D)

      Volume: Vol. J96-D, No. 3 Pages: 495-505

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Presentation] Morphological Pattern Spectrum-based Image Manipulation Detection2015

    • Author(s)
      K. Kageyama, T. Kumaki and T. Fujino
    • Organizer
      RISP International workshop on Nonlinear Circuit, communications and Signal Processing (NCSP)
    • Place of Presentation
      クアラルンプール(マレーシア)
    • Year and Date
      2015-03-02
    • Related Report
      2014 Annual Research Report
  • [Presentation] Attack alert circuit for hardware Trojan in the embedded system2015

    • Author(s)
      Y. Tsukada, T. Kumaki, M. Yoshikawa and T. Fujino
    • Organizer
      RISP International workshop on Nonlinear Circuit, communications and Signal Processing (NCSP)
    • Place of Presentation
      クアラルンプール(マレーシア)
    • Year and Date
      2015-03-01
    • Related Report
      2014 Annual Research Report
  • [Presentation] Interleaved-bitslice AES encryption and decryption with massive-parallel mobile embedded processor2014

    • Author(s)
      T. Kumaki, T. Fujino and T. Koide
    • Organizer
      Proceedings of IEEE Asia pacific Conference on Circuits and Systems (APCCAS)
    • Place of Presentation
      ANAインターコンチネンタル石垣リゾート(沖縄・石垣市)
    • Year and Date
      2014-11-19
    • Related Report
      2014 Annual Research Report
  • [Presentation] Live demonstration: Hierarchical masked image filtering technology on security-camera privacy protection2014

    • Author(s)
      Y. Yanagihara, T. Honda, T. Kumaki and T. Fujino
    • Organizer
      International Symposium on Circuits And Systems (ISCAS)
    • Place of Presentation
      メルボルン(オーストラリア)
    • Year and Date
      2014-06-02
    • Related Report
      2014 Annual Research Report
  • [Presentation] 組込みプロセッサに仕掛けられたハードウェアトロイに関する研究

    • Author(s)
      塚田靖史, 板屋修平, 熊木武志, 吉川雅弥, 藤野 毅
    • Organizer
      信学技報
    • Place of Presentation
      鹿児島県文化センター(鹿児島県)
    • Related Report
      2013 Research-status Report
  • [Presentation] Cipher-destroying and se-cret-key-emitting hardware

    • Author(s)
      T. Kumaki, M. Yoshikawa and T. Fujino
    • Organizer
      Proceedings of IEEE International MidWest Symposium on Circuits And Systems (MWSCAS)
    • Place of Presentation
      コロンバス,アメリカ
    • Related Report
      2013 Research-status Report
  • [Presentation] Implementation aware Hardware Trojan Trigger

    • Author(s)
      M.Yoshikawa, Y.Mori and T.Kumaki
    • Organizer
      Proc. of International Conference on Industrial Electronics and Applications
    • Place of Presentation
      杭州市,中国
    • Related Report
      2013 Research-status Report
  • [Presentation] Reset Signal Aware Hardware Trojan Trigger

    • Author(s)
      M.Yoshikawa, D.Takeuchi, T.Kumaki
    • Organizer
      Proc. of International Conference on Advances in Engineering and Technology
    • Place of Presentation
      Puhana,India
    • Related Report
      2013 Research-status Report
  • [Presentation] Highly-Parallel triple DES processing with massive-parallel SIMD matrix evaluation board

    • Author(s)
      T. takeda, T. Kumaki and T. Fujino
    • Organizer
      International Technical Conference on Circuits/Systems, Computers and Communications
    • Place of Presentation
      札幌コンベンションセンター,北海道
    • Related Report
      2012 Research-status Report
  • [Presentation] 連想メモリを用いたハードウェアトロイ監視回路についての検討

    • Author(s)
      夕川諒平,熊木武志,吉川雅弥,藤野 毅,小倉 武
    • Organizer
      電子情報通信学会エレクトロニクスソサイエティ大会
    • Place of Presentation
      富山大学,富山県
    • Related Report
      2012 Research-status Report
  • [Presentation] 対策回路に対するハードウェアトロイの検討

    • Author(s)
      吉田将之, 佐藤隆亮, 熊木武志, 吉川雅弥
    • Organizer
      第11回情報科学技術フォーラム
    • Place of Presentation
      法政大学小金井キャンパス,東京都
    • Related Report
      2012 Research-status Report
  • [Presentation] 電力解析攻撃対策を無効にするハードウェアトロイの考察

    • Author(s)
      吉田将之, 佐藤隆亮, 熊木武志, 吉川雅弥
    • Organizer
      電気関係学会東海支部連合大会
    • Place of Presentation
      豊橋技術科学大学,愛知県
    • Related Report
      2012 Research-status Report
  • [Presentation] トリプルDES回路に組み込まれたハードウェアトロイの試作とその検知手法の検討

    • Author(s)
      望月陽平,熊木武志,吉川雅弥,藤野 毅
    • Organizer
      デザインガイア2012
    • Place of Presentation
      九州大学医学部百年講堂,福岡県
    • Related Report
      2012 Research-status Report
  • [Presentation] Hardware Trojan for Security LSI

    • Author(s)
      M. Yoshikawa, R. Satoh and T. Kumaki
    • Organizer
      IEEE The International Conference on Consumer Electronics
    • Place of Presentation
      Las Vegas, USA
    • Related Report
      2012 Research-status Report

URL: 

Published: 2013-05-31   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi