On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator

被引:0
作者
Marcelli, Andrea [1 ]
Sanchez, Ernesto [1 ]
Sasselli, Luca [1 ]
Squillero, Giovanni [1 ]
机构
[1] Politecn Torino, DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; Hardware Trojan Horse; Hardware-based obfuscator; Embedded system; Pipelined processor core; ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time-to-market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 31 条
[1]  
[Anonymous], 2010, IEEE DESIGN TEST COM
[2]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[3]  
Barrantes E. G., 2005, ACM Transactions on Information and Systems Security, V8, P3, DOI 10.1145/1053283.1053286
[4]  
Bertholon Benoit, 2013, 2013 IEEE International Symposium on Parallel and Distributed Processing, Workshops and PhD Forum (IPDPSW), P435, DOI 10.1109/IPDPSW.2013.234
[5]  
Bhunia S., 2017, HARDWARE TROJAN WAR
[6]   OS Support for Detecting Trojan Circuit Attacks [J].
Bloom, Gedare ;
Narahari, Bhagirath ;
Simha, Rahul .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :100-103
[7]  
Chong F., 2009, NITRD PROGRAM
[8]  
Dubey JP, 2014, TOXOPLASMA GONDII: THE MODEL APICOMPLEXAN - PERSPECTIVES AND METHODS, 2ND EDITION, P1, DOI 10.1016/B978-0-12-396481-6.00001-5
[9]  
Dupuis S, 2014, IEEE INT ON LINE, P49, DOI 10.1109/IOLTS.2014.6873671
[10]  
Ferraiuolo A, 2012, ICCAD-IEEE ACM INT, P37