On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator

被引:0
作者
Marcelli, Andrea [1 ]
Sanchez, Ernesto [1 ]
Sasselli, Luca [1 ]
Squillero, Giovanni [1 ]
机构
[1] Politecn Torino, DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; Hardware Trojan Horse; Hardware-based obfuscator; Embedded system; Pipelined processor core; ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time-to-market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
[21]   A Co-Training based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models [J].
Xue, Mingfu ;
Bian, Rongzhen ;
Wang, Jian ;
Liu, Weiqiang .
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, :1452-1457
[22]   Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications [J].
Razy, Ahmad Firdaus Mohamad ;
Naziri, Siti Zarina Md ;
Ismail, Rizalafande Che ;
Idris, Norina .
2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, :255-260
[23]   A hardened network-on-chip design using runtime hardware Trojan mitigation methods [J].
Frey, Jonathan ;
Yu, Qiaoyan .
INTEGRATION-THE VLSI JOURNAL, 2017, 56 :15-31
[24]   A Novel Hardware Trojan Detection Based on BP Neural Network [J].
Li, Jun ;
Chen, Jihua ;
Ni, Lin ;
Zhou, Errui .
2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, :2790-2794
[25]   Property Based Formal Security Verification for Hardware Trojan Detection [J].
Qin, Maoyuan ;
Hu, Wei ;
Mu, Dejun ;
Tai, Yu .
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2018, :62-67
[26]   Efficient Node-wise Hardware Trojan Detection with Rapid Recovery for RISC-V Processors [J].
Luo, Aiwen ;
Yang, Qingkuan ;
Shi, Min ;
Yi, Qingming ;
Weng, Jian .
IEICE ELECTRONICS EXPRESS, 2025,
[27]   Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension [J].
Pimenta Rodrigues, Gabriel Arquelau ;
De Oliveira Albuquerque, Robson ;
De Oliveira Alves, Gabriel ;
Lopes De Mendonca, Fabio Lucio ;
Ferreira Giozza, William ;
Timoteo De Sousa Jr, Rafael ;
Sandoval Orozco, Ana Lucila .
IEEE ACCESS, 2020, 8 :95137-95152
[28]   Towards Trustworthy Data in Networked Control Systems: A Hardware-Based Approach [J].
Ulz, Thomas ;
Pieber, Thomas ;
Steger, Christian ;
Matischek, Rainer ;
Bock, Holger .
2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
[29]   Monte Carlo based Test Pattern Generation for Hardware Trojan Detection [J].
Xue Mingfu ;
Hu Aiqun ;
Huang Yi ;
Li Guyue .
2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, :131-136
[30]   An Efficient Hardware Trojan Detection Approach adopting Testability based Features [J].
Priyadharshini, M. ;
Saravanan, P. .
2020 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2020, :55-59