Consistency - based Hardware Security Techniques
نویسنده
چکیده
Integrated circuits (ICs) are the fundamental building blocks of essentially all computer or electronic systems. While outsourcing has become a trend in the IC industry to reduce the manufacturing cost, an untrusted foundry that has full access to the hardware may easily compromise the security of the manufactured ICs, such as embedding hardware Trojans. Due to the presence of process variation during manufacturing and the huge numbers of transistors in the ICs, the traditional system or software security mechanisms cannot address the hardware security challenges. In this talk, I will introduce a consistency-based IC characterization approach to detect and diagnose hardware Trojans. My key observation is that the behavior of the malicious hardware components exhibit inconsistent patterns in the observable side channels of the target IC, such as power and timing properties. Therefore, my approach is to characterize the gate-level IC properties and conduct consistency analysis to identify the hardware Trojans. While introducing the technical approach, I will mainly focus on how the consistency-based technique can successfully address two major challenges, namely the scalability issue and the lack of Trojan-free golden chips. In addition, I will demonstrate how a similar IC side channel characterization approach, if not controlled properly, can be leveraged by an attacker to conduct reverse engineering attacks on physical unclonable functions (PUFs), as well as the countermeasure that I have developed to prevent such attacks.
منابع مشابه
A 3D-Stacked Architecture for Secure Memory Acquisition
Many security and forensic analyses rely on the ability to fetch memory snapshots from a target machine. To date, the security community has relied on virtualization, external hardware or trusted hardware to obtain such snapshots. We show that these prior techniques either sacrifice snapshot consistency or impose a performance penalty on applications executing atop the target. We present a new ...
متن کاملFPGA Implementation of JPEG and JPEG2000-Based Dynamic Partial Reconfiguration on SOC for Remote Sensing Satellite On-Board Processing
This paper presents the design procedure and implementation results of a proposed hardware which performs different satellite Image compressions using FPGA Xilinx board. First, the method is described and then VHDL code is written and synthesized by ISE software of Xilinx Company. The results show that it is easy and useful to design, develop and implement the hardware image compressor using ne...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملNew System Security Mechanisms for the Cloud Computing Infrastructure
AZAB, AHMED MONEEB. New System Security Mechanisms for the Cloud Computing Infrastructure. (Under the direction of Dr. Peng Ning.) Cloud computing is a new computing paradigm, where computing resources are provided as a service to end users. To cut operating costs, hardware virtualization is used so that a single hardware platform is shared among multiple end users. This new paradigm introduces...
متن کاملHardwar Trojan classification and implementation and offer a new detection approach
A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015