Trusted Systems

Volume 6802 of the series Lecture Notes in Computer Science pp 253-270

Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software

  • Jean-François GallaisAffiliated withUniversity of Luxembourg
  • , Johann GroßschädlAffiliated withUniversity of Luxembourg
  • , Neil HanleyAffiliated withUniversity College Cork
  • , Markus KasperAffiliated withRuhr University Bochum
  • , Marcel MedwedAffiliated withUniversité catholique de Louvain
  • , Francesco RegazzoniAffiliated withUniversité catholique de Louvain
  • , Jörn-Marc SchmidtAffiliated withGraz University of Technology
  • , Stefan TillichAffiliated withUniversity of Bristol
  • , Marcin WójcikAffiliated withUniversity of Bristol

* Final gross prices may vary according to local VAT.

Get Access


Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly perceived as a serious concern by the global semiconductor industry. Such rogue alterations often take the form of a “hardware Trojan,” which may be activated from remote after the compromised chip or system has been deployed in the field. The devious actions of hardware Trojans can range from the disabling of all or part of the chip (i.e. “kill switch”), over the activation of a backdoor that allows an adversary to gain access to the system, to the covert transmission of sensitive information (e.g. cryptographic keys) off-chip. In the recent past, hardware Trojans which induce side-channel leakage to convey secret keys have received considerable attention. With the present paper we aim to broaden the scope of Trojan side-channels from dedicated cryptographic hardware to general-purpose processors on which cryptographic software is executed. In particular, we describe a number of simple micro-architectural modifications to induce or amplify information leakage via faulty computations or variations in the latency and power consumption of certain instructions. We also propose software-based mechanisms for Trojan activation and present two case studies to exemplify the induced side-channel leakage for software implementations of RSA and AES. Finally, we discuss a constructive use of micro-architectural Trojans for digital watermarking so as to facilitate the detection of illegally manufactured copies of processors.