DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN

被引:7
作者
Cassano, Luca [1 ]
Iamundo, Mattia [1 ]
Lopez, Tomas Antonio [1 ]
Nazzari, Alessandro [1 ]
Di Natale, Giorgio [2 ]
机构
[1] Politecn Milan, Dipartimento Elettron Informaz & Bioingn, Milan, Italy
[2] Univ Grenoble Alpes, Inst Polytech Grenoble, TIMA, Grenoble, France
关键词
Hardware security; Hardware Trojan detection; Hardware Trojan horses; Microprocessors; Software obfuscation; SECURITY;
D O I
10.1016/j.sysarc.2022.102592
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs can be inserted in modern and complex microprocessors allowing the attacker to run malicious software, to acquire root privileges and to steal secret user information. In this paper we propose DETON, an automatic methodology for software manipulation aimed at introducing obfuscation in programs' execution to protect microprocessor-based systems against information stealing HTHs. The high-level goal of DETON is to produce an obfuscated version of the program under protection in order to allow a trusted execution over a (possibly) untrusted CPU-based system. The obfuscated program will then be the one actually executed on the target hardware platform. DETON is fully integrated in the classical software design flow since it takes the output of the compiler, i.e., the assembly code of the program to be protected, and it produces a modified version of the assembly code which is in turn fully compatible with the underlying target HW platform. DETON aims at (i) reducing the amount of sensitive information exposed to the attacker by spreading it through microprocessor's registers and by submerging it among garbage information, and (ii) reducing the time for which sensitive information is exposed to the attacker by scrambling data among microprocessor's registers. We present a set of guidelines, requirements and metrics aimed at driving and assessing software obfuscation against always-on information-stealing HTHs and we then present the DETON framework. We assessed DETON on the Ariane version of the 64 bit RISC-V microprocessor running a set of real-world benchmark programs for embedded systems.
引用
收藏
页数:11
相关论文
共 46 条
[1]  
[Anonymous], 2022, PROJECTROSENBRIDGE
[2]  
[Anonymous], 2022, RISCV BENCHMARKS
[3]  
Becker GT, 2013, LECT NOTES COMPUT SC, V8086, P197, DOI 10.1007/978-3-642-40349-1_12
[4]   Defeating HaTCh: Building Malicious IP Cores [J].
Bhardwaj, Anshu ;
Roy, Subir Kumar .
VLSI DESIGN AND TEST, 2017, 711 :345-353
[5]  
Bhasin Shivam, 2015, 2015 IEEE International Symposium on Circuits and Systems (ISCAS). Proceedings, P2021, DOI 10.1109/ISCAS.2015.7169073
[6]   OS Support for Detecting Trojan Circuit Attacks [J].
Bloom, Gedare ;
Narahari, Bhagirath ;
Simha, Rahul .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :100-103
[7]   A Microprocessor Protection Architecture against Hardware Trojans in Memories [J].
Bolat, Alperen ;
Cassano, Luca ;
Reviriego, Pedro ;
Ergin, Oguz ;
Ottavi, Marco .
2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020), 2020,
[8]   Securing bitstream integrity, confidentiality and authenticity in reconfigurable mobile heterogeneous systems [J].
Carelli, Alberto ;
Cristofanini, Carlo Alberto ;
Vallero, Alessandro ;
Basile, Cataldo ;
Prinetto, Paolo ;
Di Carlo, Stefano .
2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR), 2018,
[9]   Quantifying the Information Leakage in Cache Attacks via Symbolic Execution [J].
Chattopadhyay, Sudipta ;
Beck, Moritz ;
Rezine, Ahmed ;
Zeller, Andreas .
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (01)
[10]  
Chuan X, 2017, 2017 2ND IEEE INTERNATIONAL CONFERENCE ON INTEGRATED CIRCUITS AND MICROSYSTEMS (ICICM), P91, DOI 10.1109/ICAM.2017.8242145