Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

被引:4
|
作者
Bobda, Christophe [1 ]
Mead, Joshua [1 ]
Whitaker, Taylor J. L. [1 ]
Kamhoua, Charles [2 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Arkansas, JBHT Bldg, Fayetteville, AR 72701 USA
[2] Air Force Res Lab, Cyber Assurance Branch, 525 Brooks Rd, Rome, NY 13441 USA
来源
关键词
Hardware sandbox; Hardware verification; Virtual resources; Hardware Trojan; ATTACKS;
D O I
10.1007/978-3-319-56258-2_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to prevent damage to the system. To reach this goal, non-trusted third-party IPs and components off the shelf (COTS) are executed in sandboxes with checkers and virtual resources. While checkers are used to detect run-time activation of Trojans and mitigate potential damage to the system, virtual resources are provided to IPs in the sandbox, thus preventing direct access to physical resources. Our approach was validated with benchmarks from trust-hub.com, a synthetic system on FPGA scenario using the same benchmark. All our results showed a 100% Trojan detection and mitigation, with only a minimal increase in resource overhead and no performance decrease.
引用
收藏
页码:47 / 59
页数:13
相关论文
共 50 条
  • [1] A Novel Method Against Hardware Trojans in Approximate Circuits
    Dou, Yuqin
    Gu, Chongyan
    Wang, Chenghua
    Liu, Weiqing
    2023 24TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED, 2023, : 632 - 637
  • [2] Hardware Trojans and Other Threats against Embedded Systems
    Paar, Christof
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 1 - 1
  • [3] Hardware Trojans in Incompletely Specified On-chip Bus Systems
    Fern, Nicole
    San, Ismail
    Koc, Cetin Kaya
    Cheng, Kwang-Ting
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 527 - 530
  • [4] Hardware Trojans: The Defense and Attack of Integrated Circuits
    Reece, Trey
    Robinson, William H.
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 293 - 296
  • [5] Hardware Trojans in Quantum Circuits, Their Impacts, and Defense
    Roy, Rupshali
    Das, Subrata
    Ghosh, Swaroop
    2024 25TH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, ISQED 2024, 2024,
  • [6] Hardware Trojans: The defense and attack of integrated circuits
    Vanderbilt University, EECS Department, Nashville, TN, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (293-296):
  • [7] The Novel Design Method of Hardware Trojans
    Wei, Zhengyou
    Feng, Wenfeng
    Li, Lei
    2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2015, : 173 - 176
  • [8] The Problem of Hardware Trojans Detection in System-on-Chip
    Adamov, Alexander
    Saprykin, Alexander
    Melnik, Dmitriy
    Lukashenko, Olga
    EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS, 2009, : 178 - 179
  • [9] A Benchmark Suite of Hardware Trojans for On-Chip Networks
    Wang, Jian
    Guo, Shize
    Chen, Zhe
    Zhang, Tao
    IEEE ACCESS, 2019, 7 : 102002 - 102009
  • [10] The problem of hardware Trojans detection in system-on-chip
    DAD Department, Kharkov National University of Radio Electronics, 14, Lenin Ave., Kharkov, 61166, Ukraine
    Exp. Des. Appl. CAD Syst. Microelectron. - Proc. Int. Conf., CADSM, (178-179):