Hardware Trojan Attack in Embedded Memory

被引:7
|
作者
Wang, Xinmu [1 ]
Hoque, Tamzidul [2 ]
Basak, Abhishek [3 ]
Karam, Robert [4 ]
Hu, Wei [1 ]
Qin, Maoyuan [1 ]
Mu, Dejun [1 ]
Bhunia, Swarup [5 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
[2] Univ Kansas, 2038 Eaton Hall, Lawrence, KS 66045 USA
[3] Intel Corp, Hillsboro, OR USA
[4] Univ S Florida, Tampa, FL 33620 USA
[5] Univ Florida, 968 Ctr Dr, Gainesville, FL 32611 USA
关键词
Hardware Trojan; SRAM array; SRAM fault; system-level attack; DIFFERENTIAL FAULT ATTACK; AES; VOLTAGE; DESIGN; TRUST; CACHE;
D O I
10.1145/3422353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Static Random Access Memory (SRAM) is a core technology for building computing hardware, including cache memory, register files and field programmable gate array devices. Hence, SRAM reliability is essential to guarantee dependable computing. While significant research has been conducted to develop automated test algorithms for detecting manufacture-induced SRAM faults, they cannot ensure detection of faults deliberately implemented in the SRAM array by untrusted parties in the integrated circuit development flow. Indeed, such hardware Trojan attacks represent an emerging security threat. While a growing body of research addresses Trojan designs in logic circuits, little research has explored hardware Trojan attacks in embedded memory arrays [20]. In this article, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing tests while enabling attacks targeting various system hardware components during deployment. Transistor-level simulation results demonstrate minimal impact on SRAM power, performance, and stability while Trojans are not activated. We also prove the feasibility of Trojan insertion in foundries by showing the proposed layouts that preserve the SRAM cell footprint and incur zero silicon area overhead. Finally, we elaborate on several system-level attacks that can leverage these Trojans to compromise security and privacy.
引用
收藏
页数:28
相关论文
共 50 条
  • [41] AI Trojan Attack for Evading Machine Learning-based Detection of Hardware Trojans
    Pan, Zhixin
    Mishra, Prabhat
    IEEE Transactions on Computers, 2023, : 1 - 14
  • [42] Strategic hardware trojan testing with hierarchical trojan types
    2021, Institute of Electrical and Electronics Engineers Inc.
  • [43] Strategic Hardware Trojan Testing with Hierarchical Trojan Types
    Brahma, Swastik
    Nan, Satyaki
    Njilla, Laurent
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [44] INFECT: INiconspicuous FEC-based Trojan: a Hardware Attack on an 802.11 a/g Wireless Network
    Subramani, Kiruba Sankaran
    Antonopoulos, Angelos
    Abotabl, Ahmed Attia
    Nosratinia, Aria
    Makris, Yiorgos
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 90 - 94
  • [45] DARK-Adders: Digital Hardware Trojan Attack on Block-based Approximate Adders
    Mishra, Vishesh
    Hassan, Neelofar
    Mehta, Akshay
    Chatterjee, Urbi
    2023 36TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2023 22ND INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, VLSID, 2023, : 371 - 376
  • [46] Towards hardware Trojan: Problem analysis and Trojan simulation
    Department of Computer Science and Technology, Zhengzhou Institute of Information Science and Technology, Zhengzhou, China
    Int. Conf. Inf. Eng. Comput. Sci. - Proc., ICIECS,
  • [47] On hardware-trojan-assisted power budgeting system attack targeting many core systems
    Zhao, Yiming
    Wang, Xiaohang
    Jiang, Yingtao
    Wang, Liang
    Yang, Mei
    Singh, Amit Kumar
    Mak, Terrence
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 109
  • [48] Data Injection Attack Against Electronic Devices With Locally Weakened Immunity Using a Hardware Trojan
    Kaji, Shugo
    Kinugawa, Masahiro
    Fujimoto, Daisuke
    Hayashi, Yu-ichi
    IEEE TRANSACTIONS ON ELECTROMAGNETIC COMPATIBILITY, 2019, 61 (04) : 1115 - 1121
  • [49] A CatBoost Based Approach to Detect Label Flipping Poisoning Attack in Hardware Trojan Detection Systems
    Richa Sharma
    G. K. Sharma
    Manisha Pattanaik
    Journal of Electronic Testing, 2022, 38 : 667 - 682
  • [50] Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure
    Yu, Weize
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (03) : 321 - 326