Blue team red team approach to hardware trust assessment

被引:0
|
作者
Rajendran, Jeyavijayan [1 ]
Jyothi, Vinayaka [1 ]
Karri, Ramesh [1 ]
机构
[1] NYU, Polytech Inst, ECE Dept, Brooklyn, NY USA
来源
2011 IEEE 29TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD) | 2011年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.
引用
收藏
页码:285 / 288
页数:4
相关论文
共 50 条
  • [1] A Red Team Blue Team approach Towards a Secure Processor Design With Hardware Shadow Stack
    Bresch, Cyril
    Michelet, Adrien
    Amato, Laurent
    Meyer, Thomas
    Hely, David
    2017 IEEE 2ND INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW), 2017, : 57 - 62
  • [2] A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification
    Waksman, Adam
    Rajendran, Jeyavijayan
    Suozzo, Matthew
    Sethumadhavan, Simha
    2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [3] A study on the effectiveness of trojan detection techniques using a red team blue team approach
    Zhang, X.
    Xiao, K.
    Tehranipoor, M.
    Rajendran, J.
    Karri, R.
    2013 IEEE 31ST VLSI TEST SYMPOSIUM (VTS), 2013,
  • [4] Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice
    Rahman, Md Moshiur
    Geist, Jim
    Xing, Daniel
    Liu, Yuntao
    Srivastava, Ankur
    Meade, Travis
    Jin, Yier
    Bhunia, Swarup
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2024, 29 (03)
  • [5] Testing a collaborative DDoS defense in a red team/blue team exercise
    Mirkovic, Jelena
    Reiher, Peter
    Papadopoulos, Christos
    Hussain, Alefiya
    Shepard, Marla
    Berg, Michael
    Jung, Robert
    IEEE TRANSACTIONS ON COMPUTERS, 2008, 57 (08) : 1098 - 1112
  • [6] A team to trust
    不详
    BRITISH DENTAL JOURNAL, 2023, 235 (07) : 541 - 541
  • [7] A team to trust
    British Dental Journal, 2023, 235 : 541 - 541
  • [8] Locating monitors in water distribution systems: Red team-blue team exercise
    Grayman, Walter M.
    Ostfeld, Avi
    Salomons, Elad
    JOURNAL OF WATER RESOURCES PLANNING AND MANAGEMENT, 2006, 132 (04) : 300 - 304
  • [9] SIGNAL-TRANSDUCTION - TEAM BLUE SEES RED
    BOURNE, HR
    NATURE, 1995, 376 (6543) : 727 - 729
  • [10] Red Team vs. Blue Team: A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations
    Puschner, Endres
    Moos, Thorben
    Becker, Steffen
    Kison, Christian
    Moradi, Amir
    Paar, Christof
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1 - 74