Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

被引:4
|
作者
Bobda, Christophe [1 ]
Mead, Joshua [1 ]
Whitaker, Taylor J. L. [1 ]
Kamhoua, Charles [2 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Arkansas, JBHT Bldg, Fayetteville, AR 72701 USA
[2] Air Force Res Lab, Cyber Assurance Branch, 525 Brooks Rd, Rome, NY 13441 USA
来源
关键词
Hardware sandbox; Hardware verification; Virtual resources; Hardware Trojan; ATTACKS;
D O I
10.1007/978-3-319-56258-2_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to prevent damage to the system. To reach this goal, non-trusted third-party IPs and components off the shelf (COTS) are executed in sandboxes with checkers and virtual resources. While checkers are used to detect run-time activation of Trojans and mitigate potential damage to the system, virtual resources are provided to IPs in the sandbox, thus preventing direct access to physical resources. Our approach was validated with benchmarks from trust-hub.com, a synthetic system on FPGA scenario using the same benchmark. All our results showed a 100% Trojan detection and mitigation, with only a minimal increase in resource overhead and no performance decrease.
引用
收藏
页码:47 / 59
页数:13
相关论文
共 50 条
  • [21] A Microprocessor Protection Architecture against Hardware Trojans in Memories
    Bolat, Alperen
    Cassano, Luca
    Reviriego, Pedro
    Ergin, Oguz
    Ottavi, Marco
    2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020), 2020,
  • [22] A Novel Tampering Attack on AES Cores with Hardware Trojans
    Jain, Ayush
    Guin, Ujjwal
    2020 IEEE INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA 2020), 2020, : 77 - 82
  • [23] A Novel Sustained Vector Technique for the Detection of Hardware Trojans
    Banga, Mainak
    Hsiao, Michael S.
    22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, : 327 - 332
  • [24] Red team: Design of intelligent hardware trojans with known defense schemes
    ECE Department, University of Connecticut, United States
    Proc IEEE Int Conf Comput Des VLSI Comput Process, 2011, (309-312):
  • [25] Red Team: Design of Intelligent Hardware Trojans with Known Defense Schemes
    Zhang, Xuehui
    Tuzzio, Nicholas
    Tehranipoor, Mohammad
    2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2011, : 309 - 312
  • [26] An On-Chip Technique to Detect Hardware Trojans and Assist Counterfeit Identification
    Lecomte, Maxime
    Fournier, Jacques
    Maurine, Philippe
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2017, 25 (12) : 3317 - 3330
  • [28] Detecting Hardware Trojans using On-chip Sensors in an ASIC Design
    Kelly, Shane
    Zhang, Xuehui
    Tehranipoor, Mohammed
    Ferraiuolo, Andrew
    JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2015, 31 (01): : 11 - 26
  • [29] Detecting Hardware Trojans using On-chip Sensors in an ASIC Design
    Shane Kelly
    Xuehui Zhang
    Mohammed Tehranipoor
    Andrew Ferraiuolo
    Journal of Electronic Testing, 2015, 31 : 11 - 26
  • [30] A Mutual Auditing Framework to Protect IoT against Hardware Trojans
    Liu, Chen
    Cronin, Patrick
    Yang, Chengmo
    2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 69 - 74