A2: Analog Malicious Hardware

被引:197
作者
Yang, Kaiyuan [1 ]
Hicks, Matthew [1 ]
Dong, Qing [1 ]
Austin, Todd [1 ]
Sylvester, Dennis [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2016年
关键词
analog; attack; hardware; malicious; security; Trojan; TROJANS;
D O I
10.1109/SP.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party-often overseas-to fabricate their design. To guard against shipping chips with errors (intentional or otherwise) chip design companies rely on post-fabrication testing. Unfortunately, this type of testing leaves the door open to malicious modifications since attackers can craft attack triggers requiring a sequence of unlikely events, which will never be encountered by even the most diligent tester. In this paper, we show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting a chip's functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. When the capacitors fully charge, they deploy an attack that forces a victim flip-flop to a desired value. We weaponize this attack into a remotely-controllable privilege escalation by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor. We implement this attack in an OR1200 processor and fabricate a chip. Experimental results show that our attacks work, show that our attacks elude activation by a diverse set of benchmarks, and suggest that our attacks evade known defenses.
引用
收藏
页码:18 / 37
页数:20
相关论文
共 30 条
  • [1] Trojan detection using IC fingerprinting
    Agrawal, Dakshi
    Baktir, Selcuk
    Karakoyunlu, Deniz
    Rohatgi, Pankaj
    Sunar, Berk
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 296 - +
  • [2] [Anonymous], 2013, 22 USENIX SEC S USEN
  • [3] Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
  • [4] Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
  • [5] Ernst D, 2003, 36TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, P7
  • [6] Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
  • [7] MiBench: A free, commercially representative embedded benchmark suite
    Guthaus, MR
    Ringenberg, JS
    Ernst, D
    Austin, TM
    Mudge, T
    Brown, RB
    [J]. WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2001, : 3 - 14
  • [8] Hicks M., 2010, USENIX LOGIN, V35, P31
  • [9] Hicks M, 2015, ACM SIGPLAN NOTICES, V50, P517, DOI [10.1145/2694344.2694366, 10.1145/2775054.2694366]
  • [10] Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049