DeTrust: Defeating Hardware Trust Verification with Stealthy Implicitly-Triggered Hardware Trojans

被引:101
|
作者
Zhang, Jie [1 ]
Yuan, Feng [1 ]
Xu, Qiang [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, CUhk REliable Comp Lab CURE, Shatin, Hong Kong, Peoples R China
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
关键词
hardware Trojan; hardware security; hardware Trojan design; backdoors; implicit trigger;
D O I
10.1145/2660267.2660289
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Hardware Trojans (HTs) inserted at design time by malicious insiders on the design team or third-party intellectual property (IP) providers pose a serious threat to the security of computing systems. Researchers have proposed several hardware trust verification techniques to mitigate such threats, and some of them are shown to be able to effectively flag all suspicious HTs implemented in the Trust-Hub HT backdoor benchmark suite. No doubt to say, adversaries would adjust their tactics of attacks accordingly and it is hence essential to examine whether new types of HTs can be designed to defeat these hardware trust verification techniques. In this paper, we present a systematic HT design methodology to achieve the above objective, namely DeTrust. Given an HT design, DeTrust keeps its original malicious behavior while making the HT resistant to state-of-the-art hardware trust verification techniques by manipulating its trigger designs. To be specific, DeTrust implements stealthy implicit triggers for HTs by carefully spreading the trigger logic into multiple sequential levels and combinational logic blocks and combining the trigger logic with the normal logic, so that they are not easily differentiable from normal logic. As shown in our experimental results, adversaries can easily employ DeTrust to evade hardware trust verification. We close with a discussion on how to extend existing solutions to alleviate the threat posed by DeTrust. However, they generally suffer from high computational complexity, calling for more advanced techniques to ensure hardware trust.
引用
收藏
页码:153 / 166
页数:14
相关论文
共 31 条
  • [1] Advanced Techniques for Designing Stealthy Hardware Trojans
    Tsoutsos, Nektarios Georgios
    Konstantinou, Charalambos
    Maniatakos, Michail
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [2] Stealthy dopant-level hardware trojans
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 8086 LNCS : 197 - 214
  • [3] Defeating UCI: Building Stealthy and Malicious Hardware
    Sturton, Cynthia
    Hicks, Matthew
    Wagner, David
    King, Samuel T.
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 64 - 77
  • [4] Stealthy Dopant-Level Hardware Trojans
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2013, 2013, 8086 : 197 - 214
  • [5] DeMiST: Detection and Mitigation of Stealthy Analog Hardware Trojans
    Oriero, Enahoro
    Khalid, Faiq
    Hasan, Syed Rafay
    PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 47 - 55
  • [6] Stealthy dopant-level hardware Trojans: extended version
    Becker, Georg T.
    Regazzoni, Francesco
    Paar, Christof
    Burleson, Wayne P.
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2014, 4 (01) : 19 - 31
  • [7] Towards Trust Hardware Deployment of Edge Computing: Mitigation of Hardware Trojans Based on Evolvable Hardware
    Li, Zeyu
    Wang, Junjie
    Huang, Zhao
    Luo, Nan
    Wang, Quan
    APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [8] Constructing formal verification models for hardware Trojans
    Shen L.
    Mu D.
    Cao G.
    Xie G.
    Shu F.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 146 - 154
  • [9] An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size
    Sebt, S. M.
    Patooghy, A.
    Beitollahi, H.
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2019, 35 (06): : 839 - 852
  • [10] New Testing Procedure for Finding Insertion Sites of Stealthy Hardware Trojans
    Dupuis, Sophie
    Ba, Papa-Sidy
    Flottes, Marie-Lise
    Di Natale, Giorgio
    Rouzeyre, Bruno
    2015 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2015, : 776 - 781