On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator

被引:0
作者
Marcelli, Andrea [1 ]
Sanchez, Ernesto [1 ]
Sasselli, Luca [1 ]
Squillero, Giovanni [1 ]
机构
[1] Politecn Torino, DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; Hardware Trojan Horse; Hardware-based obfuscator; Embedded system; Pipelined processor core; ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time-to-market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
[31]   An Efficient Hardware Trojan Detection Approach adopting Testability based Features [J].
Priyadharshini, M. ;
Saravanan, P. .
2020 IEEE INTERNATIONAL TEST CONFERENCE INDIA (ITC INDIA), 2020, :55-59
[32]   Split and Eliminate: A Region-Based Segmentation for Hardware Trojan Detection [J].
Tiempo, Ann Jelyn ;
Jeong, Yong-Jin .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2023, E106D (03) :349-356
[33]   Securing Medical Devices Against Hardware Trojan Attacks Through Analog-, Digital-, and Physiological-Based Signatures [J].
Taimour Wehbe ;
Vincent J. Mooney ;
Omer T. Inan ;
David C. Keezer .
Journal of Hardware and Systems Security, 2018, 2 (3) :251-265
[34]   Remotizing and Virtualizing Chips and Circuits for Hardware-based Capture-the-Flag Challenges [J].
Roascio, Gianluca ;
Cerini, Samuele Yves ;
Prinetto, Paolo .
7TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2022), 2022, :477-485
[35]   Hardware-Based Randomized Encoding for Sensor Authentication in Power Grid SCADA Systems [J].
Hutto, Kevin ;
Grijalva, Santiago ;
Mooney, Vincent .
2022 IEEE TEXAS POWER AND ENERGY CONFERENCE (TPEC), 2021, :121-126
[36]   HAPMAD: Hardware-Based Authentication Platform for Malicious Activity Detection in Digital Circuits [J].
Koneru, Venkata Raja Ramchandar ;
Teja, Bikki Krishna ;
Reddy, Kallam Dinesh Babu ;
GnanaSwaroop, Makam V. ;
Ramanidharan, Bharath ;
Mohankumar, N. .
INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, INDIA 2017, 2018, 672 :608-617
[37]   Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance [J].
An, Zhenliang ;
Wang, Weike ;
Li, Wenxin ;
Li, Senyang ;
Zhang, Dexue .
MICROMACHINES, 2023, 14 (08)
[38]   Hardware Trojan Based Security Issues in Home Area Network: A Testbed Setup [J].
Mohammed, Hawzhin ;
Howell, Jimmy ;
Hasan, Syed Rafay ;
Guo, Nan ;
Khalid, Faiq ;
Elkeelany, Omar .
2018 IEEE 61ST INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2018, :972-975
[39]   An Efficient ML -based Hardware Trojan Localization Framework for RTL Security Analysis [J].
Fan, Ruchao ;
Tang, Yongming ;
Sun, Hao ;
Liu, Jiyuan ;
Li, He .
2024 ACM/IEEE 6TH SYMPOSIUM ON MACHINE LEARNING FOR CAD, MLCAD 2024, 2024,
[40]   Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection [J].
Hassan, Rakibul ;
Meng, Xingyu ;
Basu, Kanad ;
Dinakarrao, Sai Manoj Pudukotai .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (09) :2852-2862