OS Support for Detecting Trojan Circuit Attacks

被引:34
作者
Bloom, Gedare [1 ]
Narahari, Bhagirath [1 ]
Simha, Rahul [1 ]
机构
[1] George Washington Univ, Dept Comp Sci, Washington, DC 20052 USA
来源
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST | 2009年
关键词
D O I
10.1109/HST.2009.5224959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid advances in integrated circuit (IC) development predicted by Moore's Law lead to increasingly complex, hard to verify IC designs. Design insiders or adversaries employed at untrusted locations can insert malicious Trojan circuits capable of launching attacks in hardware or supporting software-based attacks. In this paper, we provide a method for detecting Trojan circuit denial-of-service attacks using a simple, verifiable hardware guard external to the complex CPU. The operating system produces liveness checks, embedded in the software clock, to which the guard can respond. We also present a novel method for the OS to detect a hardware-software (HW/SW) Trojan privilege escalation attack by using OS-generated checks to test if the CPU hardware is enforcing memory protection (MP). Our implementation of fine-grained periodic checking of MP enforcement incurs only 2.2% overhead using SPECint 2006.
引用
收藏
页码:100 / 103
页数:4
相关论文
共 15 条
[1]   The hunt for the kill switch [J].
Adee, Sally .
IEEE SPECTRUM, 2008, 45 (05) :34-39
[2]   Trojan detection using IC fingerprinting [J].
Agrawal, Dakshi ;
Baktir, Selcuk ;
Karakoyunlu, Deniz ;
Rohatgi, Pankaj ;
Sunar, Berk .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :296-+
[3]  
[Anonymous], SPEC CPU2006
[4]   A region based approach for the identification of hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :40-47
[5]  
BLOOM G, 2009, COMPUTERS SECURITY
[6]   On-demand transparency for improving hardware Trojan detectability [J].
Chakraborty, Rajat Subhra ;
Paul, Somnath ;
Bhunia, Swarup .
2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, :48-50
[7]   Trust-Based Design and Check of FPGA Circuits Using Two-Level Randomized ECC Structures [J].
Dutt, Shantanu ;
Li, Li .
ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2009, 2 (01)
[8]  
Gerum P., 2004, Xenomai - Implementing a RTOS emulation framework on GNU/Linux
[9]  
Jin Y, 2008, 2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, P51, DOI 10.1109/HST.2008.4559049
[10]  
King S., 2008, Pink Ribbons, P1