A2: Analog Malicious Hardware

被引:208
作者
Yang, Kaiyuan [1 ]
Hicks, Matthew [1 ]
Dong, Qing [1 ]
Austin, Todd [1 ]
Sylvester, Dennis [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
来源
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2016年
关键词
analog; attack; hardware; malicious; security; Trojan; TROJANS;
D O I
10.1109/SP.2016.10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While the move to smaller transistors has been a boon for performance it has dramatically increased the cost to fabricate chips using those smaller transistors. This forces the vast majority of chip design companies to trust a third party-often overseas-to fabricate their design. To guard against shipping chips with errors (intentional or otherwise) chip design companies rely on post-fabrication testing. Unfortunately, this type of testing leaves the door open to malicious modifications since attackers can craft attack triggers requiring a sequence of unlikely events, which will never be encountered by even the most diligent tester. In this paper, we show how a fabrication-time attacker can leverage analog circuits to create a hardware attack that is small (i.e., requires as little as one gate) and stealthy (i.e., requires an unlikely trigger sequence before effecting a chip's functionality). In the open spaces of an already placed and routed design, we construct a circuit that uses capacitors to siphon charge from nearby wires as they transition between digital values. When the capacitors fully charge, they deploy an attack that forces a victim flip-flop to a desired value. We weaponize this attack into a remotely-controllable privilege escalation by attaching the capacitor to a wire controllable and by selecting a victim flip-flop that holds the privilege bit for our processor. We implement this attack in an OR1200 processor and fabricate a chip. Experimental results show that our attacks work, show that our attacks elude activation by a diverse set of benchmarks, and suggest that our attacks evade known defenses.
引用
收藏
页码:18 / 37
页数:20
相关论文
共 30 条
[1]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[2]  
[Anonymous], 2013, 22 USENIX SEC S USEN
[3]  
Balasch J, 2015, IEEE INT SYMP ELEC, P246, DOI 10.1109/ISEMC.2015.7256167
[4]  
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[5]  
Ernst D, 2003, 36TH INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, PROCEEDINGS, P7
[6]  
Forte D, 2013, ICCAD-IEEE ACM INT, P532, DOI 10.1109/ICCAD.2013.6691167
[7]   MiBench: A free, commercially representative embedded benchmark suite [J].
Guthaus, MR ;
Ringenberg, JS ;
Ernst, D ;
Austin, TM ;
Mudge, T ;
Brown, RB .
WWC-4: IEEE INTERNATIONAL WORKSHOP ON WORKLOAD CHARACTERIZATION, 2001, :3-14
[8]  
Hicks M., 2010, USENIX LOGIN, V35, P31
[9]  
Hicks M, 2015, ACM SIGPLAN NOTICES, V50, P517, DOI [10.1145/2694344.2694366, 10.1145/2775054.2694366]
[10]  
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049