Hardware Trojan Attack in Embedded Memory

被引:7
|
作者
Wang, Xinmu [1 ]
Hoque, Tamzidul [2 ]
Basak, Abhishek [3 ]
Karam, Robert [4 ]
Hu, Wei [1 ]
Qin, Maoyuan [1 ]
Mu, Dejun [1 ]
Bhunia, Swarup [5 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
[2] Univ Kansas, 2038 Eaton Hall, Lawrence, KS 66045 USA
[3] Intel Corp, Hillsboro, OR USA
[4] Univ S Florida, Tampa, FL 33620 USA
[5] Univ Florida, 968 Ctr Dr, Gainesville, FL 32611 USA
关键词
Hardware Trojan; SRAM array; SRAM fault; system-level attack; DIFFERENTIAL FAULT ATTACK; AES; VOLTAGE; DESIGN; TRUST; CACHE;
D O I
10.1145/3422353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Static Random Access Memory (SRAM) is a core technology for building computing hardware, including cache memory, register files and field programmable gate array devices. Hence, SRAM reliability is essential to guarantee dependable computing. While significant research has been conducted to develop automated test algorithms for detecting manufacture-induced SRAM faults, they cannot ensure detection of faults deliberately implemented in the SRAM array by untrusted parties in the integrated circuit development flow. Indeed, such hardware Trojan attacks represent an emerging security threat. While a growing body of research addresses Trojan designs in logic circuits, little research has explored hardware Trojan attacks in embedded memory arrays [20]. In this article, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing tests while enabling attacks targeting various system hardware components during deployment. Transistor-level simulation results demonstrate minimal impact on SRAM power, performance, and stability while Trojans are not activated. We also prove the feasibility of Trojan insertion in foundries by showing the proposed layouts that preserve the SRAM cell footprint and incur zero silicon area overhead. Finally, we elaborate on several system-level attacks that can leverage these Trojans to compromise security and privacy.
引用
收藏
页数:28
相关论文
共 50 条
  • [21] An embedded flash memory vault for software Trojan protection
    Wolff, Francis
    Papachristou, Chris
    McIntyre, David
    Weyer, Daniel
    Clay, William
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 97 - +
  • [22] Hardware ip protection during evaluation using embedded sequential trojan
    Dept. of Electrical Engineering and Computer Science, Case Western Reserve University, Cleveland, OH, United States
    不详
    IEEE Des Test Comput, 3 (70-79):
  • [23] Granularity and detection capability of an adaptive embedded Hardware Trojan detection system
    Lecomte, Maxime
    Fournier, Jacques J. A.
    Maurine, Philippe
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 135 - 138
  • [24] Hardware IP Protection During Evaluation Using Embedded Sequential Trojan
    Narasimhan, Seetharam
    Bhunia, Swarup
    Chakraborty, Rajat Subhra
    IEEE DESIGN & TEST OF COMPUTERS, 2012, 29 (03): : 70 - 79
  • [25] Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique
    Alkurdi, Mohammed
    Ghimire, Ashutosh
    Amsaad, Fathi
    2024 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI, ISVLSI, 2024, : 313 - 318
  • [26] Adversarial Attack Resilient ML-Assisted Hardware Trojan Detection Technique
    Alkurdi, Mohammed
    Ghimire, Ashutosh
    Amsaad, Fathi
    Proceedings of IEEE Computer Society Annual Symposium on VLSI, ISVLSI, 2024, : 313 - 318
  • [27] DSE-Based Hardware Trojan Attack for Neural Network Accelerators on FPGAs
    Guo, Chao
    Yanagisawa, Masao
    Shi, Youhua
    IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024,
  • [28] Mitigation of Hardware Trojan based Denial-of-Service attack for secure NoCs
    Boraten, Travis
    Kodi, Avinash
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 24 - 38
  • [29] Cache-Out: Leaking Cache Memory Using Hardware Trojan
    Khan, Mohammad Nasim Imtaiz
    De, Asmit
    Ghosh, Swaroop
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (06) : 1461 - 1470
  • [30] Hardware Trojan Horses
    Tehranipoor, Mohammad
    Sunar, Berk
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 167 - 187