Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

被引:4
作者
Bobda, Christophe [1 ]
Mead, Joshua [1 ]
Whitaker, Taylor J. L. [1 ]
Kamhoua, Charles [2 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Arkansas, JBHT Bldg, Fayetteville, AR 72701 USA
[2] Air Force Res Lab, Cyber Assurance Branch, 525 Brooks Rd, Rome, NY 13441 USA
来源
APPLIED RECONFIGURABLE COMPUTING | 2017年 / 10216卷
关键词
Hardware sandbox; Hardware verification; Virtual resources; Hardware Trojan; ATTACKS;
D O I
10.1007/978-3-319-56258-2_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to prevent damage to the system. To reach this goal, non-trusted third-party IPs and components off the shelf (COTS) are executed in sandboxes with checkers and virtual resources. While checkers are used to detect run-time activation of Trojans and mitigate potential damage to the system, virtual resources are provided to IPs in the sandbox, thus preventing direct access to physical resources. Our approach was validated with benchmarks from trust-hub.com, a synthetic system on FPGA scenario using the same benchmark. All our results showed a 100% Trojan detection and mitigation, with only a minimal increase in resource overhead and no performance decrease.
引用
收藏
页码:47 / 59
页数:13
相关论文
共 18 条
[1]  
[Anonymous], 2010, 14592010 IEEE, P1, DOI [DOI 10.1109/IEEESTD.2010.5439063, 10.1109/IEEESTD.2010.5399061, DOI 10.1109/IEEESTD.2010.5553440, 10.1109/IEEESTD.2010.5594972Cited, DOI 10.1109/IEEESTD.2010.5399061]
[2]  
[Anonymous], 2015, PROC GREAT LAKES S V
[3]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[4]   Hardware Trojan Attacks: Threat Analysis and Countermeasures [J].
Bhunia, Swarup ;
Hsiao, Michael S. ;
Banga, Mainak ;
Narasimhan, Seetharam .
PROCEEDINGS OF THE IEEE, 2014, 102 (08) :1229-1247
[5]   Protection Against Hardware Trojan Attacks: Towards a Comprehensive Solution [J].
Bhunia, Swarup ;
Abramovici, Miron ;
Agrawal, Dakshi ;
Bradley, Paul ;
Hsiao, Michael S. ;
Plusquellic, Jim ;
Tehranipoor, Mohammad .
IEEE DESIGN & TEST, 2013, 30 (03) :6-17
[6]  
CAKIR B, 2015, AUT TEST EUROPE, P471
[7]   Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation [J].
Chakraborty, Rajat Subhra ;
Bhunia, Swarup .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2011, 27 (06) :767-785
[8]  
Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
[9]   PSL: Beyond hardware verification [J].
Glazberg, Ziv ;
Moulin, Mark ;
Orni, Avigail ;
Ruah, Sitvanit ;
Zarpas, Emmanuel .
NEXT GENERATION DESIGN AND VERIFICATION METHODOLOGIES FOR DISTRIBUTED EMBEDDED CONTROL SYSTEMS, 2007, :245-+
[10]  
Hategekimana Festus, 2015, 2015 International Conference on Reconfigurable Computing and FPGAs (ReConFig), P1, DOI 10.1109/ReConFig.2015.7393319