Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

被引:4
|
作者
Bobda, Christophe [1 ]
Mead, Joshua [1 ]
Whitaker, Taylor J. L. [1 ]
Kamhoua, Charles [2 ]
Kwiat, Kevin [2 ]
机构
[1] Univ Arkansas, JBHT Bldg, Fayetteville, AR 72701 USA
[2] Air Force Res Lab, Cyber Assurance Branch, 525 Brooks Rd, Rome, NY 13441 USA
来源
关键词
Hardware sandbox; Hardware verification; Virtual resources; Hardware Trojan; ATTACKS;
D O I
10.1007/978-3-319-56258-2_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to prevent damage to the system. To reach this goal, non-trusted third-party IPs and components off the shelf (COTS) are executed in sandboxes with checkers and virtual resources. While checkers are used to detect run-time activation of Trojans and mitigate potential damage to the system, virtual resources are provided to IPs in the sandbox, thus preventing direct access to physical resources. Our approach was validated with benchmarks from trust-hub.com, a synthetic system on FPGA scenario using the same benchmark. All our results showed a 100% Trojan detection and mitigation, with only a minimal increase in resource overhead and no performance decrease.
引用
收藏
页码:47 / 59
页数:13
相关论文
共 50 条
  • [41] DRMaSV: Enhanced Capability Against Hardware Trojans in Coarse Grained Reconfigurable Architectures
    Liu, Leibo
    Zhou, Zhuoquan
    Wei, Shaojun
    Zhu, Min
    Yin, Shouyi
    Mao, Shengyang
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (04) : 782 - 795
  • [42] Integration of Hardware Assertions in Systems-on-Chip
    Geuzebroek, Jeroen
    Vermeulen, Bart
    2008 IEEE INTERNATIONAL TEST CONFERENCE, VOLS 1 AND 2, PROCEEDINGS, 2008, : 412 - 421
  • [43] SCARF: Securing Chips with a Robust Framework against Fabrication-time Hardware Trojans
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    arXiv,
  • [44] On-chip Data Security against Untrustworthy Software and Hardware IPs in Embedded Systems
    Gundabolu, SreeCharan
    Wang, Xiaofang
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 644 - 649
  • [45] Hardware Trojans against virtual keyboards on e-banking platforms - A proof of concept
    Peris-Lopez, Pedro
    Martin, Honorio
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 76 : 146 - 151
  • [46] SCARF: Securing Chips With a Robust Framework Against Fabrication-Time Hardware Trojans
    Eslami, Mohammad
    Ghasempouri, Tara
    Pagliarini, Samuel
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (12) : 2761 - 2775
  • [47] Networks on chip as hardware components of an OS for reconfigurable systems
    Marescaux, T
    Mignolet, JY
    Bartic, A
    Moffat, W
    Verkest, D
    Vernalde, S
    Lauwereins, R
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2003, 2778 : 595 - 605
  • [48] Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
    Bobda, Christophe
    Whitaker, Taylor J. L.
    Kamhoua, Charles
    Kwiat, Kevin
    Njilla, Laurent
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 172 - 172
  • [49] Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
    Bobda, Christophe
    Whitaker, Taylor
    Mbongue, Joel Mandebi
    Saha, Sujan Kumar
    2019 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2019,
  • [50] A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans
    Xiao, Kan
    Forte, Domenic
    Tehranipoor, Mohammed
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (12) : 1778 - 1791