On the mitigation of Hardware Trojan attacks in embedded processors by exploiting a Hardware-based obfuscator

被引:0
作者
Marcelli, Andrea [1 ]
Sanchez, Ernesto [1 ]
Sasselli, Luca [1 ]
Squillero, Giovanni [1 ]
机构
[1] Politecn Torino, DAUIN, Corso Duca Abruzzi 24, I-10129 Turin, Italy
来源
2018 IEEE 3RD INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW) | 2018年
关键词
Hardware security; Hardware Trojan Horse; Hardware-based obfuscator; Embedded system; Pipelined processor core; ENCRYPTION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time-to-market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
引用
收藏
页码:31 / 37
页数:7
相关论文
共 50 条
[41]   Circuit Topology-Aware Vaccination-Based Hardware Trojan Detection [J].
Hassan, Rakibul ;
Meng, Xingyu ;
Basu, Kanad ;
Dinakarrao, Sai Manoj Pudukotai .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 42 (09) :2852-2862
[42]   A Hardware Security Solution against Scan-based Attacks [J].
Mehta, Ankit ;
Saif, Darius ;
Rashidzadeh, Rashid .
2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, :1698-1701
[43]   A Hardware Trojan Trigger Localization Method in RTL based on Control Flow Features [J].
Huang, Hao ;
Shen, Haihua ;
Li, Shan ;
Li, Huawei .
2022 IEEE 31ST ASIAN TEST SYMPOSIUM (ATS 2022), 2022, :138-143
[44]   A PCA and Mahalanobis distance-based detection method for logical hardware Trojan [J].
Huang, Jiaoying ;
Yang, Daming ;
Gao, Cheng ;
Fu, Chengcheng .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (12)
[45]   Hardware Trojan Detection Using Changepoint-Based Anomaly Detection Techniques [J].
Elnaggar, Rana ;
Chakrabarty, Krishnendu ;
Tahoori, Mehdi B. .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2019, 27 (12) :2706-2719
[46]   Hierarchical hardware trojan for LUT-based AI devices and its evaluation [J].
Nozaki, Yusuke ;
Takemoto, Shu ;
Ikezaki, Yoshiya ;
Yoshikawa, Masaya .
ELECTRONICS AND COMMUNICATIONS IN JAPAN, 2022, 105 (01)
[47]   A study on the efficiency of hardware Trojan detection based on path-delay fingerprinting [J].
Nejat, Arash ;
Shekarian, Seyed Mohammd Hossein ;
Zamani, Morteza Saheb .
MICROPROCESSORS AND MICROSYSTEMS, 2014, 38 (03) :246-252
[48]   Hierarchical Hardware Trojan for LUT-based AI Devices and its Evaluation [J].
Nozaki Y. ;
Takemoto S. ;
Ikezaki Y. ;
Yoshikawa M. .
IEEJ Transactions on Electronics, Information and Systems, 2021, 141 (12) :1234-1240
[49]   BIST-PUF: Online, Hardware-based Evaluation of Physically Unclonable Circuit Identifiers [J].
Hussain, Siam U. ;
Yellapantula, Sudha ;
Majzoobi, Mehrdad ;
Koushanfar, Farinaz .
2014 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2014, :162-169
[50]   Hardware-Trojan Classification based on the Structure of Trigger Circuits Utilizing Random Forests [J].
Kurihara, Tatsuki ;
Togawa, Nozomu .
2021 IEEE 27TH INTERNATIONAL SYMPOSIUM ON ON-LINE TESTING AND ROBUST SYSTEM DESIGN (IOLTS), 2021,