Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

被引:0
|
作者
Mountford, Thomas [1 ]
Dhavlle, Abhijitt [2 ]
Tevebaugh, Andrew [1 ]
Mansoor, Naseef [3 ]
Dinakarrao, Sai Manoj Pudukotai [2 ]
Ganguly, Amlan [1 ]
Yakovlev, Alex
机构
[1] Rochester Inst Technol, Comp Engn, Rochester, NY 14623 USA
[2] George Mason Univ, Elect & Comp Engn, Fairfax, VA 22030 USA
[3] Minnesota State Univ, Comp & Informat Sci, Mankato, MN 56001 USA
基金
美国国家科学基金会;
关键词
NoC; obfuscation; routing; security; hardware Trojan; neural network;
D O I
10.3390/jlpea13030050
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware Trojan (HT) being injected into a system is particularly prevalent due to the increase in third-party manufacturers for system-on-chip (SoC) designs. With a local injection of an HT in an SoC, an adversary can gain access to information about applications running on the system by revealing specific communications of the SoC, and the network-on-chip (NoC) as a whole. This heavily compromises the system and gives information to the attacker, which can lead to more tailored, compromising attacks. In this paper, we demonstrate an HT that exploits communication patterns inside an SoC to reveal applications that are running on an NoC with multi/many-core processors. This is performed by leaking packet counts, after which the attacker then uses machine learning techniques to identify applications running on processors, and the SoC as a whole. We also propose a LUT-based obfuscation technique to limit the information available to the hardware Trojan. Our results indicate that this obfuscation method can reduce the accuracy of this attack from 99% to <8% in multi/many-core systems.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] On the optimization of Software Obfuscation against Hardware Trojans in Microprocessors
    Cassano, Luca
    Lazzeri, Elia
    Litovchenko, Nikita
    Di Natale, Giorgio
    2022 25TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS AND SYSTEMS (DDECS), 2022, : 172 - 177
  • [2] Exploiting State Obfuscation to Detect Hardware Trojans in NoC Network Interfaces
    Frey, Jonathan
    Yu, Qiaoyan
    2015 IEEE 58TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2015,
  • [3] A Mutual Auditing Framework to Protect IoT against Hardware Trojans
    Liu, Chen
    Cronin, Patrick
    Yang, Chengmo
    2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 69 - 74
  • [4] Lightweight Hardware Synchronization for Avoiding Buffer Overflows in Network-on-Chips
    Frieb, Martin
    Stegmeier, Alexander
    Mische, Jeorg
    Ungerer, Theo
    ARCHITECTURE OF COMPUTING SYSTEMS, 2018, 10793 : 112 - 126
  • [5] Exploiting hardware obfuscation methods to prevent and detect hardware Trojans
    Yu, Qiaoyan
    Dofe, Jaya
    Zhang, Zhiming
    Midwest Symposium on Circuits and Systems, 2017, 2017-August : 819 - 822
  • [6] Hardware Trojans in Chips: A Survey for Detection and Prevention
    Dong, Chen
    Xu, Yi
    Liu, Ximeng
    Zhang, Fan
    He, Guorong
    Chen, Yuzhong
    SENSORS, 2020, 20 (18) : 1 - 37
  • [7] Exploiting Hardware Obfuscation Methods to Prevent and Detect Hardware Trojans (Invited Paper)
    Yu, Qiaoyan
    Dofe, Jaya
    Zhang, Zhiming
    2017 IEEE 60TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2017, : 819 - 822
  • [8] SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    arXiv,
  • [9] SCARF: Securing Chips With a Robust Framework Against Fabrication-Time Hardware Trojans
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (12) : 2761 - 2775
  • [10] A Trace-driven Hardware-level Simulator for Design and Verification of Network-on-Chips
    Chen, Yancang
    Xie, Lunguo
    Li, Jinwen
    Shi, Zhu
    Zhang, Minxuan
    Chen, Xiaowen
    Lu, Zhonghai
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 32 - 35