1,904 research outputs found
Persistent monitoring of digital ICs to verify hardware trust
The specialization of the semiconductor industry has resulted in a global Integrated Circuit (IC) supply chain that is susceptible to hardware Trojans - malicious circuitry that is embedded into the chip during the design cycle. This nefarious attack could compromise the missioncritical systems which implement these devices. While a trusted domestic IC supply chain exists with resources such as the Trusted Foundry Program, it\u27s highly desirable to utilize the high yield, fast turn-around time, low cost, and leading-edge technology of the global IC supply chain. Research into the verification of hardware trust has made significant progress in recent years but is still far from a single, comprehensive solution. Most proposed solutions are one-time implementable methods that attempt to detect hardware Trojans during the verification stage of the IC development process. While this is a desirable solution, it\u27s not realistic given the current limitations of hardware Trojan detection techniques. We propose a more comprehensive solution that involves the persistent verification of hardware trust in the field, in addition to several one-time methods implemented during IC verification. We define a persistent verification framework that involves the use of a few ICs from a secure process flow to persistently monitor and verify the operation of several untrusted ICs from the global supply chain. This allows the system integrator to realize the benefits of the global IC supply chain while maintaining the integrity of the system. We develop a system monitor which filters the IO of untrusted digital ICs for a set of patterns, which we refer to as digital signal signatures, to verify the operation of the devices
Golden Reference-Free Hardware Trojan Localization using Graph Convolutional Network
The globalization of the Integrated Circuit (IC) supply chain has moved most
of the design, fabrication, and testing process from a single trusted entity to
various untrusted third-party entities worldwide. The risk of using untrusted
third-Party Intellectual Property (3PIP) is the possibility for adversaries to
insert malicious modifications known as Hardware Trojans (HTs). These HTs can
compromise the integrity, deteriorate the performance, deny the service, and
alter the functionality of the design. While numerous HT detection methods have
been proposed in the literature, the crucial task of HT localization is
overlooked. Moreover, a few existing HT localization methods have several
weaknesses: reliance on a golden reference, inability to generalize for all
types of HT, lack of scalability, low localization resolution, and manual
feature engineering/property definition. To overcome their shortcomings, we
propose a novel, golden reference-free HT localization method at the
pre-silicon stage by leveraging Graph Convolutional Network (GCN). In this
work, we convert the circuit design to its intrinsic data structure, graph and
extract the node attributes. Afterward, the graph convolution performs
automatic feature extraction for nodes to classify the nodes as Trojan or
benign. Our automated approach does not burden the designer with manual code
review. It locates the Trojan signals with 99.6% accuracy, 93.1% F1-score, and
a false-positive rate below 0.009%.Comment: IEEE Transactions on Very Large Scale Integration Systems (TVLSI),
202
The Seeker's Dilemma: Realistic Formulation and Benchmarking for Hardware Trojan Detection
This work focuses on advancing security research in the hardware design space
by formally defining the realistic problem of Hardware Trojan (HT) detection.
The goal is to model HT detection more closely to the real world, i.e.,
describing the problem as "The Seeker's Dilemma" (an extension of Hide&Seek on
a graph), where a detecting agent is unaware of whether circuits are infected
by HTs or not. Using this theoretical problem formulation, we create a
benchmark that consists of a mixture of HT-free and HT-infected restructured
circuits while preserving their original functionalities. The restructured
circuits are randomly infected by HTs, causing a situation where the defender
is uncertain if a circuit is infected or not. We believe that our innovative
dataset will help the community better judge the detection quality of different
methods by comparing their success rates in circuit classification. We use our
developed benchmark to evaluate three state-of-the-art HT detection tools to
show baseline results for this approach. We use Principal Component Analysis to
assess the strength of our benchmark, where we observe that some restructured
HT-infected circuits are mapped closely to HT-free circuits, leading to
significant label misclassification by detectors
Quantum key distribution with hacking countermeasures and long term field trial
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
Design and Validation for FPGA Trust under Hardware Trojan Attacks
Field programmable gate arrays (FPGAs) are being increasingly used in a wide range of critical applications, including industrial, automotive, medical, and military systems. Since FPGA vendors are typically fabless, it is more economical to outsource device production to off-shore facilities. This introduces many opportunities for the insertion of malicious alterations of FPGA devices in the foundry, referred to as hardware Trojan attacks, that can cause logical and physical malfunctions during field operation. The vulnerability of these devices to hardware attacks raises serious security concerns regarding hardware and design assurance. In this paper, we present a taxonomy of FPGA-specific hardware Trojan attacks based on activation and payload characteristics along with Trojan models that can be inserted by an attacker. We also present an efficient Trojan detection method for FPGA based on a combined approach of logic-testing and side-channel analysis. Finally, we propose a novel design approach, referred to as Adapted Triple Modular Redundancy (ATMR), to reliably protect against Trojan circuits of varying forms in FPGA devices. We compare ATMR with the conventional TMR approach. The results demonstrate the advantages of ATMR over TMR with respect to power overhead, while maintaining the same or higher level of security and performances as TMR. Further improvement in overhead associated with ATMR is achieved by exploiting reconfiguration and time-sharing of resources
- …