On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator

被引:0
作者
Marcelli, Andrea [1 ]
Sanchez, Ernesto [1 ]
Sasselli, Luca [1 ]
Squillero, Giovanni [1 ]
机构
[1] Politecn Torino, DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; Hardware Trojan Horse; Hardware-based obfuscator; Embedded system; Pipelined processor core; ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time-to-market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
  • [21] Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications
    Razy, Ahmad Firdaus Mohamad
    Naziri, Siti Zarina Md
    Ismail, Rizalafande Che
    Idris, Norina
    2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 255 - 260
  • [22] A hardened network-on-chip design using runtime hardware Trojan mitigation methods
    Frey, Jonathan
    Yu, Qiaoyan
    INTEGRATION-THE VLSI JOURNAL, 2017, 56 : 15 - 31
  • [23] A Novel Hardware Trojan Detection Based on BP Neural Network
    Li, Jun
    Chen, Jihua
    Ni, Lin
    Zhou, Errui
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 2790 - 2794
  • [24] Property Based Formal Security Verification for Hardware Trojan Detection
    Qin, Maoyuan
    Hu, Wei
    Mu, Dejun
    Tai, Yu
    2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, : 62 - 67
  • [25] Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension
    Pimenta Rodrigues, Gabriel Arquelau
    De Oliveira Albuquerque, Robson
    De Oliveira Alves, Gabriel
    Lopes De Mendonca, Fabio Lucio
    Ferreira Giozza, William
    Timoteo De Sousa Jr, Rafael
    Sandoval Orozco, Ana Lucila
    IEEE ACCESS, 2020, 8 : 95137 - 95152
  • [26] Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach
    Ulz, Thomas
    Pieber, Thomas
    Steger, Christian
    Matischek, Rainer
    Bock, Holger
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [27] Monte Carlo based Test Pattern Generation for Hardware Trojan Detection
    Xue Mingfu
    Hu Aiqun
    Huang Yi
    Li Guyue
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 131 - 136
  • [28] HATE: a HArdware Trojan Emulation Environment for Microprocessor-based Systems
    Bolchini, Cristiana
    Cassano, Luca
    Montalbano, Ivan
    Repole, Giampiero
    Zanetti, Andrea
    Di Natale, Giorgio
    2019 IEEE 25TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS 2019), 2019, : 109 - 114
  • [29] Split and Eliminate: A Region-Based Segmentation for Hardware Trojan Detection
    Tiempo, Ann Jelyn
    Jeong, Yong-Jin
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (03) : 349 - 356
  • [30] An Efficient Hardware Trojan Detection Approach adopting Testability based Features
    Priyadharshini, M.
    Saravanan, P.
    2020 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2020, : 55 - 59