• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Countermeasures and Detection Techniques for Hardware Trojans on Security Modules

Research Project

Project/Area Number 25330162
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Information security
Research InstitutionMeijo University

Principal Investigator

Yoshikawa Masaya  名城大学, 理工学部, 教授 (50373098)

Project Period (FY) 2013-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥5,070,000 (Direct Cost: ¥3,900,000、Indirect Cost: ¥1,170,000)
Fiscal Year 2016: ¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
Fiscal Year 2015: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2014: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywordsハードウェアトロイ / 検出技術 / セキュリティ / 暗号回路
Outline of Final Research Achievements

With advancements of reverse engineering technologies, Hardware Trojans are a new threat that is emerging in many countries. In Hardware Trojans, a hidden function is activated and extensive damage occurs when predetermined conditions specified by an attacker are satisfied.Confidential information is protected using the encryption standard used which is theoretically secured. However, although an encryption algorithm is theoretically secured, a secret key for an encryption device can be revealed by analyzing side-channel information such as power consumption. Therefore, several countermeasures are proposed. This study developed detection techniques for Hardware Trojans which are incorporated into cryptographic circuits including countermeasures.

Report

(5 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • 2013 Research-status Report
  • Research Products

    (27 results)

All 2017 2016 2015 2014 2013

All Journal Article (2 results) (of which Peer Reviewed: 2 results,  Acknowledgement Compliant: 2 results) Presentation (25 results) (of which Int'l Joint Research: 9 results)

  • [Journal Article] Frequency Domain aware Power Analysis in Multiple Rounds for a Lightweight Block Cipher TWINE and Its Evaluation2016

    • Author(s)
      野崎佑典,藤野毅,吉川雅弥
    • Journal Title

      電子情報通信学会論文誌B 通信

      Volume: J99-B Issue: 10 Pages: 881-892

    • DOI

      10.14923/transcomj.2016IAP0003

    • ISSN
      1881-0209
    • Year and Date
      2016-10-01
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Double Rounds driven Electromagnetic Analysis Attack for a Lightweight Block Cipher Simeck and its Evaluation2016

    • Author(s)
      野崎佑典,池崎良哉,吉川雅弥
    • Journal Title

      IEEJ Transactions on Electronics, Information and Systems

      Volume: 136 Issue: 12 Pages: 1613-1620

    • DOI

      10.1541/ieejeiss.136.1613

    • NAID

      130005171416

    • ISSN
      0385-4221, 1348-8155
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Presentation] Hardware Trojan Detection Method based on Deep Learning2017

    • Author(s)
      H. Nagata, Y. Ikezaki, Y. Nozaki, M. Yoshikawa
    • Organizer
      International Workshop on Nonlinear Circuits, Communications and Signal Processing
    • Place of Presentation
      Guam, USA
    • Year and Date
      2017-02-28
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Hierarchical power analysis attack for falsification detection cipher2017

    • Author(s)
      M.Yoshikawa, Y.Nozaki
    • Organizer
      IEEE 7th Annual Computing and Communication Workshop and Conference
    • Place of Presentation
      Las Vegas, USA
    • Year and Date
      2017-01-09
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Tamper resistance evaluation of PUF in environmental variations2016

    • Author(s)
      M.Yoshikawa, Y.Nozaki
    • Organizer
      IEEE Electrical Design of Advanced Packaging and System
    • Place of Presentation
      Hawaii, USA
    • Year and Date
      2016-12-14
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] センサトリガを用いたハードウェアトロイの実装と評価2016

    • Author(s)
      岩瀬貴都,野崎佑典,吉川雅弥
    • Organizer
      電子情報通信学会CAS研究会
    • Place of Presentation
      神戸,日本
    • Year and Date
      2016-11-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] Two Stage Fault Analysis against a Falsification Detection Cipher Minalpher2016

    • Author(s)
      M.Yoshikawa, Y.Nozaki
    • Organizer
      IEEE SmartCloud
    • Place of Presentation
      New York, USA
    • Year and Date
      2016-11-18
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Hardware Trojan for an Authenticated Encryption Minalphe2016

    • Author(s)
      Y. Nozaki, Y. Ikezaki, M. Yoshikawa
    • Organizer
      IEEE 5th Global Conference on Consumer Electronics
    • Place of Presentation
      京都,日本
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] モデルの差異によるハードウェアトロイ検出率への影響評価2016

    • Author(s)
      岩瀬貴都,吉川雅弥
    • Organizer
      東海ファジィ研究会
    • Place of Presentation
      愛知,日本
    • Year and Date
      2016-08-01
    • Related Report
      2016 Annual Research Report
  • [Presentation] スタンバイ状態に着目したハードウェアトロイの検出手法2015

    • Author(s)
      岩瀬貴都, 吉川雅弥
    • Organizer
      情報学ワークショップ
    • Place of Presentation
      愛知
    • Year and Date
      2015-12-05
    • Related Report
      2015 Research-status Report
  • [Presentation] Detection Technique for Hardware Trojans Using Machine Learning in Frequency Domain2015

    • Author(s)
      T.Iwase, Y.Nozaki, T.kumaki, M.Yoshikawa
    • Organizer
      IEEE Global Conference on Consumer Electronics
    • Place of Presentation
      大阪
    • Year and Date
      2015-10-27
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] モデル化を必要としないハードウェアトロイの検出手法とその評価2015

    • Author(s)
      岩瀬貴都, 吉川雅弥
    • Organizer
      電気・電子・情報関係学会東海支部連合大会
    • Place of Presentation
      愛知
    • Year and Date
      2015-09-28
    • Related Report
      2015 Research-status Report
  • [Presentation] ハードウェアトロイのトリガ条件と実装面積の考察2015

    • Author(s)
      池崎良哉, 吉川雅弥
    • Organizer
      電気・電子・情報関係学会東海支部連合大会
    • Place of Presentation
      愛知
    • Year and Date
      2015-09-28
    • Related Report
      2015 Research-status Report
  • [Presentation] 小面積を指向したハードウェアトロイとその実装評価2015

    • Author(s)
      池崎良哉, 吉川雅弥
    • Organizer
      電気関係学会北陸支部
    • Place of Presentation
      石川
    • Year and Date
      2015-09-12
    • Related Report
      2015 Research-status Report
  • [Presentation] 異なるFPGAボードにおけるハードウェアトロイの検出評価2015

    • Author(s)
      岩瀬貴都, 吉川雅弥
    • Organizer
      日本知能情報ファジィ学会東海支部
    • Place of Presentation
      愛知
    • Year and Date
      2015-08-09
    • Related Report
      2015 Research-status Report
  • [Presentation] Secure automotive embedded system using a lightweight block cipher against malicious Trojan attack2015

    • Author(s)
      M.Yoshikawa, Y.Hayashi, Y.Nozaki, K.Asahi
    • Organizer
      ISSAT International Conference on Reliability & Quality in Design
    • Place of Presentation
      U.S.A
    • Year and Date
      2015-08-06
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] A Hardware Trojan Architecture for Elliptic Curve Cryptography2015

    • Author(s)
      R.Matsuhisa, Y.Nozaki, K.Nohara, K.Asahi, M.Yoshikawa
    • Organizer
      International Conference on Electrical Engineering
    • Place of Presentation
      Hong Kong
    • Year and Date
      2015-07-05
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Secure in-vehicle systems against Trojan attacks2015

    • Author(s)
      M.Yoshikawa, K.Sugioka, Y.Nozaki, K.Asahi
    • Organizer
      International Conference on Computer and Information Science
    • Place of Presentation
      U.S.A
    • Year and Date
      2015-06-28
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] ハードウェアトロイの検出方法の検討2015

    • Author(s)
      岩瀬貴都, 吉川雅弥
    • Organizer
      システム制御情報学会
    • Place of Presentation
      大阪
    • Year and Date
      2015-05-20
    • Related Report
      2015 Research-status Report
  • [Presentation] PRESENTに対するハードウェアトロイの考察2015

    • Author(s)
      松久僚真,吉川雅弥
    • Organizer
      電気学会
    • Place of Presentation
      東京
    • Year and Date
      2015-03-24 – 2015-03-26
    • Related Report
      2014 Research-status Report
  • [Presentation] 楕円曲線暗号に対するハードウェアトロイの考察2015

    • Author(s)
      松久僚真,吉川雅弥
    • Organizer
      日本知能情報ファジィ学会東海支部
    • Place of Presentation
      愛知
    • Year and Date
      2015-02-14 – 2015-02-15
    • Related Report
      2014 Research-status Report
  • [Presentation] Study of threat for automotive embedded system by Trojan virus2014

    • Author(s)
      K.Nohara, K.Asahi, M.Yoshikawa
    • Organizer
      IEEE Global Conference on Consumer Electronics
    • Place of Presentation
      千葉
    • Year and Date
      2014-10-07 – 2014-10-10
    • Related Report
      2014 Research-status Report
  • [Presentation] ECUのトロイ混入による危険性についての一考察2014

    • Author(s)
      野原康平,吉川雅弥
    • Organizer
      電子情報通信学会
    • Place of Presentation
      北海道
    • Year and Date
      2014-07-09 – 2014-07-11
    • Related Report
      2014 Research-status Report
  • [Presentation] Implementation aware Hardware Trojan Trigger2014

    • Author(s)
      M.Yoshikawa, Y.Mori, T.Kumaki
    • Organizer
      International Conference on Industrial Electronics and Applications
    • Place of Presentation
      Hong Kong
    • Related Report
      2013 Research-status Report
  • [Presentation] Implementation and detection tests for countermeasure-annulled hardware trojan on FPGA2014

    • Author(s)
      M.Yoshikawa, T.Tsukadaira
    • Organizer
      International Conference on Micro Nano Devices, Structure Computing Systems
    • Place of Presentation
      Singapore
    • Related Report
      2013 Research-status Report
  • [Presentation] Cipher-destroying and se-cret-key-emitting hardware2013

    • Author(s)
      T. Kumaki, M. Yoshikawa, T. Fujino
    • Organizer
      IEEE International MidWest Symposium on Circuits And Systems
    • Place of Presentation
      U.S.A
    • Related Report
      2013 Research-status Report
  • [Presentation] 組込みプロセッサに仕掛けられたハードウェアトロイに関する研究2013

    • Author(s)
      塚田靖史, 板屋修平, 熊木武志, 吉川雅弥, 藤野毅
    • Organizer
      電子情報通信学会
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Research-status Report

URL: 

Published: 2014-07-25   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi