Run-time Hardware Trojan Detection and Recovery for Third-Party IPs in SoC FPGAs

被引:4
|
作者
Rivera, Luis Ramirez [1 ]
Wang, Xiaofang [1 ]
机构
[1] Villanova Univ, Dept Elect & Comp Engn, 800 Lancaster Ave, Villanova, PA 19085 USA
关键词
FPGA; Third-Party IP; Trojan detection; Design for Trust; Isolation; Access control policies; Monitoring;
D O I
10.1109/EUC50751.2020.00009
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging threats of untrustworthy third-party Intellectual Property (IP) cores (3PIPs) are increasingly raising crucial security concerns about field-programmable gate arrays (FPGAs), especially those used in military, medical, financial, and other critical systems. Detecting Trojans in blackbox 3PIPs is extremely challenging, especially for FPGAs due to their memory nature and dynamic partial or full reconfigurability. This paper presents a novel run-time methodology to prevent, detect, and manage the activation of hardware Trojans inside 3PIPs in FPGAs. Taking advantage of the native parallelism of FPGA designs, an isolated redundancy scheme is proposed to detect and protect a circuit from a Trojan payload. 3PIPs are placed in isolated regions in FPGAs and are controlled by an on-chip ARM processor system. The processor performs partial reconfiguration (PR) to temporarily remove an offending IP for a random amount of time that increases exponentially between each detection, or permanently if the IP has been positively detected as infected. Additionally, security policies are enacted by implementing reference monitors that control the communication between the IPs and various resources inside the FPGA. The design was implemented and verified on a Xilinx SoC FPGA development board using the Trust Hub benchmarks.
引用
收藏
页码:9 / 16
页数:8
相关论文
共 46 条
  • [41] GAE-LCT: A Run-Time GA-Based Classifier Evolution Method for Hardware LCT Controlled SoC Performance-Power Optimization
    Surhonne, Anmol
    Nguyen Anh Vu Doan
    Maurer, Florian
    Wild, Thomas
    Herkersdorf, Andreas
    [J]. ARCHITECTURE OF COMPUTING SYSTEMS, ARCS 2022, 2022, 13642 : 271 - 285
  • [42] Decentralized Run-Time Recovery Mechanism for Transient and Permanent Hardware Faults for Space-borne FPGA-based Computing Systems
    Dumitriu, Victor
    Kirischian, Lev
    Kirischian, Valeri
    [J]. 2014 NASA/ESA CONFERENCE ON ADAPTIVE HARDWARE AND SYSTEMS (AHS), 2014, : 47 - 54
  • [43] Run-Time Recovery Mechanism for Transient and Permanent Hardware Faults Based on Distributed, Self-Organized Dynamic Partially Reconfigurable Systems
    Dumitriu, Victor
    Kirischian, Lev
    Kirischian, Valeri
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (09) : 2835 - 2847
  • [44] Towards Accurate Run-Time Hardware-Assisted Stealthy Malware Detection: A Lightweight, yet Effective Time Series CNN-Based Approach
    Sayadi, Hossein
    Gao, Yifeng
    Mohammadi Makrani, Hosein
    Lin, Jessica
    Costa, Paulo Cesar
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. CRYPTOGRAPHY, 2021, 5 (04)
  • [45] Real-time monitoring system to detect third-party damage on natural gas pipeline using acoustic detection method
    Shin, SM
    Suh, JH
    Kim, SB
    [J]. ADVANCES IN DYNAMICS, INSTRUMENTATION AND CONTROL, 2004, : 148 - 157
  • [46] 2SMaRT: A Two-Stage Machine Learning-Based Approach for Run-Time Specialized Hardware-Assisted Malware Detection
    Sayadi, Hossein
    Makrani, Hosein Mohammadi
    Dinakarrao, Sai Manoj Pudukotai
    Mohsenin, Tinoosh
    Sasan, Avesta
    Rafatirad, Setareh
    Homayoun, Houman
    [J]. 2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 728 - 733