scispace - formally typeset
Journal ArticleDOI

Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation

TLDR
A hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks and develops a hardware isolation-based security mechanism to trap the leaked data in the isolated secure environment.
Abstract
This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first implement the hardware Trojan threat model in commonly used third party IP cores, such as multiplier and RSA, which leak confidential information from the hardware under rarely triggered conditions. Then, we develop a hardware isolation-based security mechanism to trap the leaked data in the isolated secure environment, which prevents the attacker from unauthorized access to the data in the normal operation mode. We implement both the threat model and defense approach on an Xilinx Zynq SoC equipped with ARM processor. Based on the real hardware prototype, we conduct security and performance evaluations and prove the effectiveness of the proposed approach.

read more

Citations
More filters
Journal ArticleDOI

Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0

TL;DR: This paper will present the various trends and advances in the security of the supply chain and product lifecycle of the manufacturing system while highlighting the roles played by the major enabling components of Industry 4.0.
Journal ArticleDOI

Hardware Trojans in Chips: A Survey for Detection and Prevention.

TL;DR: A survey of HTs is presented, which shows the threatens of chips, the state-of-the-art preventing and detecting techniques, and the development trends in hardware security are highlighted.
Proceedings ArticleDOI

TZSlicer: Security-aware dynamic program slicing for hardware isolation

TL;DR: TZSlicer is introduced, a framework to automatically identify code that must be protected based on a sensitive variable list provided by developers that is effective in protecting sensitive data without incurring significant runtime and resource usage overheads.
Journal ArticleDOI

Using malware for the greater good: Mitigating data leakage

TL;DR: The results show that DocGuard is highly effective not only for stopping the initial leak but also in preventing the propagation of leaked files over the Internet and though social networks.
Proceedings ArticleDOI

Defeating hardware Trojan in microprocessor cores through software obfuscation

TL;DR: This paper proposes a software-based, cost-effective solution that minimizes the chance of activation of a multi-stage trigger Hardware Trojan, which relies on a pure-software obfuscation mechanism, which exploits an evolutionary algorithm to modify an executable program without affecting its functionalities.
References
More filters
Journal ArticleDOI

A Survey of Hardware Trojan Taxonomy and Detection

TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Proceedings ArticleDOI

Hardware Trojan detection using path delay fingerprint

TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Proceedings Article

Sanctum: Minimal Hardware Extensions for Strong Software Isolation

TL;DR: Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program's memory access patterns.
Proceedings ArticleDOI

Towards trojan-free trusted ICs: problem analysis and detection scheme

TL;DR: This work analyzes and formulates the trojan detection problem based on a frequency analysis under rare trigger values and provides procedures to generate input trigger vectors and trojan test vectors to detect trojan effects.
Book ChapterDOI

Stealthy dopant-level hardware trojans

TL;DR: An extremely stealthy approach for implementing hardware Trojans below the gate level is proposed, and their impact on the security of the target device is evaluated and their detectability and their effects on security are evaluated.
Related Papers (5)