Real-time detection of hardware trojan attacks on General-Purpose Registers in a RISC-V processor

نویسندگان

چکیده

Hardware trojans(HT) is one of the main threats for hardware security, especially attacks on General-Purpose Registers(GPRs) processors. This paper presented a novel method to detect HT induced by comparing states GPRs with an embedded reference model in real time. Firstly, instruction sequence was realigned four principles. Secondly, based stream, built. Finally, can be detected expected GPRs’ state from sampled We integrated this into RISC-V core PULpino and investigated feasibility different programs. The experimental results showed that all randomly inserted time latency two clock cycles.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Static Fault Attacks on Hardware DES Registers

In the late nineties, Eli Biham and Adi Shamir published the first paper on Differential Fault Analysis on symmetric key algorithms. More specifically they introduced a fault model where a key bit located in non-volatile memory is forced to 0/1 with a fault injection. In their scenario the fault was permanent, and could lead the attacker to full key recovery with low complexity. In this paper, ...

متن کامل

Real Time Behaviour of a RISC processor : Speci cation

This paper gives an overview of: two levels of formal speciication of the real-time behaviour of a commercial RISC chip; an approach to verifying the higher-level speciication relative to the lower-level one; and the proof tool and environment used for the proofs. The speciications are written in functional logic, which provides an adaptable modal facility. The proof tool and environment suppor...

متن کامل

A Hardware Trojan Detection Framework

In the recent years, hardware trojans have become a serious issue in the field of integrated circuits. Our work presents a framework for hardware trojan detection in wireless cryptographic integrated circuits. It deals with the leaking of secret information through a wireless communication, using a mixed-signal integrated circuit technique. A trojan is inserted in the introduced system, which d...

متن کامل

Design of a General Purpose 8-bit RISC Processor for Computer Architecture Learning

Computers are becoming indispensable for manipulating most everyday consumer products, ranging from communications and domestic electronics to industrial processes monitoring and control. High performance computer design is not only subject to the technology used for its implementation, it is also a matter of efficient training. The skills that must prevail in a good computer designer come from...

متن کامل

On-Chip Sensor Circle Distribution Technique for Real-Time Hardware Trojan Detection

Real-time hardware Trojan detection by monitoring voltage and current consumption using on-chip sensors is shown to be a feasible way to secure critical integrated circuit (IC) applications. This paper investigates the distribution and optimization of on-chip sensors for real-time hardware Trojan detection and localization based on the characteristics of on-chip power distribution network. On-c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEICE Electronics Express

سال: 2021

ISSN: ['1349-2543', '1349-9467']

DOI: https://doi.org/10.1587/elex.18.20210098