Journal ArticleDOI
Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation
Nianhang Hu,Mengmei Ye,Sheng Wei +2 more
TLDR
A hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks and develops a hardware isolation-based security mechanism to trap the leaked data in the isolated secure environment.Abstract:
This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first implement the hardware Trojan threat model in commonly used third party IP cores, such as multiplier and RSA, which leak confidential information from the hardware under rarely triggered conditions. Then, we develop a hardware isolation-based security mechanism to trap the leaked data in the isolated secure environment, which prevents the attacker from unauthorized access to the data in the normal operation mode. We implement both the threat model and defense approach on an Xilinx Zynq SoC equipped with ARM processor. Based on the real hardware prototype, we conduct security and performance evaluations and prove the effectiveness of the proposed approach.read more
Citations
More filters
Journal ArticleDOI
Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0
TL;DR: This paper will present the various trends and advances in the security of the supply chain and product lifecycle of the manufacturing system while highlighting the roles played by the major enabling components of Industry 4.0.
Journal ArticleDOI
Hardware Trojans in Chips: A Survey for Detection and Prevention.
TL;DR: A survey of HTs is presented, which shows the threatens of chips, the state-of-the-art preventing and detecting techniques, and the development trends in hardware security are highlighted.
Proceedings ArticleDOI
TZSlicer: Security-aware dynamic program slicing for hardware isolation
TL;DR: TZSlicer is introduced, a framework to automatically identify code that must be protected based on a sensitive variable list provided by developers that is effective in protecting sensitive data without incurring significant runtime and resource usage overheads.
Journal ArticleDOI
Using malware for the greater good: Mitigating data leakage
Mordechai Guri,Rami Puzis,Kim-Kwang Raymond Choo,Sergey Rubinshtein,Gabi Kedma,Yuval Elovici +5 more
TL;DR: The results show that DocGuard is highly effective not only for stopping the initial leak but also in preventing the propagation of leaked files over the Internet and though social networks.
Proceedings ArticleDOI
Defeating hardware Trojan in microprocessor cores through software obfuscation
Andrea Marcelli,Ernesto Sanchez,Giovanni Squillero,Muhammad Usman Jamal,Afnan Imtiaz,Simone Machetti,Filippo Mangani,Paolo Monti,Davide Pola,Alessandro Salvato,Michele Simili +10 more
TL;DR: This paper proposes a software-based, cost-effective solution that minimizes the chance of activation of a multi-stage trigger Hardware Trojan, which relies on a pure-software obfuscation mechanism, which exploits an evolutionary algorithm to modify an executable program without affecting its functionalities.
References
More filters
Journal ArticleDOI
A Survey of Hardware Trojan Taxonomy and Detection
TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Proceedings ArticleDOI
Hardware Trojan detection using path delay fingerprint
Yier Jin,Yiorgos Makris +1 more
TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Proceedings Article
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
TL;DR: Sanctum offers the same promise as Intel’s Software Guard Extensions (SGX), namely strong provable isolation of software modules running concurrently and sharing resources, but protects against an important class of additional software attacks that infer private information from a program's memory access patterns.
Proceedings ArticleDOI
Towards trojan-free trusted ICs: problem analysis and detection scheme
TL;DR: This work analyzes and formulates the trojan detection problem based on a frequency analysis under rare trigger values and provides procedures to generate input trigger vectors and trojan test vectors to detect trojan effects.
Book ChapterDOI
Stealthy dopant-level hardware trojans
TL;DR: An extremely stealthy approach for implementing hardware Trojans below the gate level is proposed, and their impact on the security of the target device is evaluated and their detectability and their effects on security are evaluated.