Hardware Trojan Attack in Embedded Memory

被引:7
|
作者
Wang, Xinmu [1 ]
Hoque, Tamzidul [2 ]
Basak, Abhishek [3 ]
Karam, Robert [4 ]
Hu, Wei [1 ]
Qin, Maoyuan [1 ]
Mu, Dejun [1 ]
Bhunia, Swarup [5 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
[2] Univ Kansas, 2038 Eaton Hall, Lawrence, KS 66045 USA
[3] Intel Corp, Hillsboro, OR USA
[4] Univ S Florida, Tampa, FL 33620 USA
[5] Univ Florida, 968 Ctr Dr, Gainesville, FL 32611 USA
关键词
Hardware Trojan; SRAM array; SRAM fault; system-level attack; DIFFERENTIAL FAULT ATTACK; AES; VOLTAGE; DESIGN; TRUST; CACHE;
D O I
10.1145/3422353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Static Random Access Memory (SRAM) is a core technology for building computing hardware, including cache memory, register files and field programmable gate array devices. Hence, SRAM reliability is essential to guarantee dependable computing. While significant research has been conducted to develop automated test algorithms for detecting manufacture-induced SRAM faults, they cannot ensure detection of faults deliberately implemented in the SRAM array by untrusted parties in the integrated circuit development flow. Indeed, such hardware Trojan attacks represent an emerging security threat. While a growing body of research addresses Trojan designs in logic circuits, little research has explored hardware Trojan attacks in embedded memory arrays [20]. In this article, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing tests while enabling attacks targeting various system hardware components during deployment. Transistor-level simulation results demonstrate minimal impact on SRAM power, performance, and stability while Trojans are not activated. We also prove the feasibility of Trojan insertion in foundries by showing the proposed layouts that preserve the SRAM cell footprint and incur zero silicon area overhead. Finally, we elaborate on several system-level attacks that can leverage these Trojans to compromise security and privacy.
引用
收藏
页数:28
相关论文
共 50 条
  • [31] Hardware Trojan Detection
    Alluhaib, Ghalia
    Aldissi, Hanan
    Alqarni, Rasha
    Banafee, Shoroq
    Nagro, Wafaa
    Aljandali, Asia
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (03): : 141 - 147
  • [32] Novel Hardware Trojan Attack on Activation Parameters of FPGA-Based DNN Accelerators
    Mukherjee, Rijoy
    Chakraborty, Rajat Subhra
    IEEE EMBEDDED SYSTEMS LETTERS, 2022, 14 (03) : 131 - 134
  • [33] SRAM Hardware Trojan
    Saeidi, Roghayeh
    Garakani, Hossein Gharaee
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 719 - 722
  • [34] Non-invasive I2C Hardware Trojan Attack Vector
    Khelif, Mohamed Amine
    Lorandel, Jordane
    Romain, Olivier
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [35] A Machine Learning Based Automatic Hardware Trojan Attack Space Exploration and Benchmarking Framework
    Cruz, Jonathan
    Gaikwad, Pravin
    Nair, Abhishek
    Chakraborty, Prabuddha
    Bhunia, Swarup
    2022 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2022,
  • [36] AI Trojan Attack for Evading Machine Learning-Based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhat
    IEEE TRANSACTIONS ON COMPUTERS, 2025, 74 (03) : 860 - 874
  • [37] Adversarial Attack Against Golden Reference-Free Hardware Trojan Detection Approach
    Ghimire, Ashutosh
    Alkurdi, Mohammed
    Gurung, Karma
    Amsaad, Fathi
    2024 IEEE Physical Assurance and Inspection of Electronics, PAINE 2024, 2024,
  • [38] Hardware trojan detection
    Case Western Reserve University, Cleveland, United States
    Introduction to Hardw. Secty. and Trust, (339-364):
  • [39] Packet Header Attack by Hardware Trojan in NoC based TCMP and its Impact Analysis
    Kulkarni, Vedika J.
    Manju, R.
    Gupta, Ruchika
    Jose, John
    Nandi, Sukumar
    2021 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS 2021), 2021, : 21 - 28
  • [40] A Hardware Trojan Attack on FPGA-Based Cryptographic Key Generation: Impact and Detection
    Vidya Govindan
    Rajat Subhra Chakraborty
    Pranesh Santikellur
    Aditya Kumar Chaudhary
    Journal of Hardware and Systems Security, 2018, 2 (3) : 225 - 239