Trojan Resilient Computing in COTS Processors Under Zero Trust

被引:4
|
作者
Hasan, Mahmudul [1 ]
Cruz, Jonathan [2 ]
Chakraborty, Prabuddha [2 ]
Bhunia, Swarup [2 ]
Hoque, Tamzidul [1 ]
机构
[1] Univ Kansas, Dept Elect Engn & Comp Sci, Lawrence, KS 66045 USA
[2] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
关键词
Trojan horses; Integrated circuits; Program processors; Software; Hardware; Codes; Resilience; Commercial off-the-shelf (COTS); hardware Trojans; Trojan resilience; HARDWARE; CIRCUIT; POWER;
D O I
10.1109/TVLSI.2022.3197389
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The commercial off-the-shelf (COTS) component-based ecosystem provides an attractive system design paradigm due to the drastic reduction in development time and cost compared to custom solutions. However, it brings in a growing concern of trustworthiness arising from the possibility of malicious embedded logic or hardware Trojans in COTS components. Existing hardware Trojan countermeasures are typically not applicable to COTS hardware due to the need for zero trust consideration for all supply chain entities, absence of golden models, and lack of observability of internal signals within the component. In this work, we propose a novel approach for runtime Trojan detection and resilience in untrusted COTS processors through judicious modifications in the software. The proposed approach does not rely on any hardware redundancy or architectural modification and hence seamlessly integrates with the COTS-based system design process. Trojan resilience is achieved through the execution of multiple functionally equivalent software variants. We have developed and implemented a solution for compiler-based automatic generation of program variants, metric-guided selection of variants, and their integration in a single executable. To evaluate the proposed approach, we first analyzed the effectiveness of program variants in avoiding the activation of a random pool of Trojans. Then, by implementing several Trojans in an OpenRISC 1000 processor, we analyzed the detectability and resilience under Trojan activation in both single and multiple variants. We also present delay and code size overhead for the automatically generated variants for several programs and discuss future research directions.
引用
收藏
页码:1412 / 1424
页数:13
相关论文
共 2 条
  • [1] ZeRO: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks
    Ibn Ziad, Mohamed Tarek
    Arroyo, Miguel A.
    Manzhosov, Evgeny
    Sethumadhavan, Simha
    2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), 2021, : 999 - 1012
  • [2] Overview of Cooperative Fault-Tolerant Control Driven by the Full Information Chain of Intelligent Connected Vehicle Platoons Under the Zero-Trust Framework: Opportunities and Challenges
    Huang, Darong
    Na, Yuhong
    Liu, Yang
    Zhang, Zhenyuan
    Mi, Bo
    IEEE INTELLIGENT TRANSPORTATION SYSTEMS MAGAZINE, 2024, 16 (01) : 22 - 39