skip to main content
10.1145/2645791.2645818acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
research-article

Stealth Assessment of Hardware Trojans in simple Processors

Published: 02 October 2014 Publication History

Abstract

Many experimental hardware Trojans explore the potential threat vectors. However, if a Trojan largely affects area, power or operating speed, then it can be easy to detect. We explore the cost in area, power and operating speed of two small, focused attacks on the Parwan processor implemented with a standard cell library. The resulting cost in total area varied from a 0.05% to a 0.09% increase in the area of the design and similar results in the power consumption, while no delay overhead was imposed.

References

[1]
R. Karri, J. Rajendran, K. Rosenfeld, and M. Tehranipoor, "Trustworthy hardware: Identifying and classifying hardware trojans," Computer, vol. 43, no. 10, pp. 39--46, 2010.
[2]
M. Tehranipoor and F. Koushanfar, "A survey of hardware trojan taxonomy and detection," IEEE Design & Test of Computers, vol. 27, no. 1, pp. 10--25, 2010.
[3]
T. Reece, D. B. Limbrick, X. Wang, B. T. Kiddie, and W. H. Robinson, "Stealth Assessment of Hardware Trojans in a Microcontroller", proceeding of: 30th IEEE International Conference on Computer Design (ICCD 2012) 30th IEEE International Conference on Computer Design (ICCD 2012).
[4]
F. Koushanfar and A. Mirhoseini, "A unified framework for multimodal submodular integrated circuits trojan detection," IEEE Transactions on Information Forensics and Security, vol. 6, pp. 162--174, 2011.
[5]
H. Salmani and M. Tehranipoor, "Layout-aware switching activity localization to enhance hardware trojan detection," IEEE Transactions on Information Forensics and Security, vol. 7, pp. 76--87, 2012.
[6]
T. Reece, D. B. Limbrick, and W. H. Robinson, "Design comparison to identify malicious hardware in external intellectual property," in 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, China, 2011, pp. 639--646.
[7]
Virendra Singh, Michiko Inoue, Kewal K Saluja, and Hideo Fujiwara, "Software-Based Delay Fault Testing of Processor Cores", 12th Asian Test Symposium, 2003, 16-19 Nov. 2003, Page(s): 68--71.
[8]
Li Chen, Sujit Dey "Software-Based Self Testing Methodology for Processor Cores", IEEE Transactions on CAD of Integrated Circuits and Systems vol. 20, no 3, March 2001, pp. 369--380.
[9]
Ying Zhang, Huawei Li, Xiaowei Li, "Software-Based Self-Testing of Processors Using Expanded Instructions", 2010 19th IEEE Asian Test Symposium (ATS), 1-4 Dec. 2010, Page(s): 415--420.
[10]
Asghari, A.; Electr. Eng. Dept., AmirKabir Univ. of Technol., Tehran; Motamedi, S.A.; Attarchi, S. "Effective self-test routine for on-line testing of processors implemented in harsh environments", IEEE International Conference on Industrial Technology, 2008. ICIT 2008, 21-24 April 2008, Page(s): 1--5
[11]
Aeroflex-Gaisler, http://www.gaisler.com/cms/.
[12]
S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang, and Y. Zhou, "Designing and implementing malicious hardware," in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, 2008.
[13]
X. Wang, M. Tehranipoor, and J. Plusquellic, "Detecting malicious inclusions in secure hardware: Challenges and solutions," in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008)., 2008, pp. 15-- 19.
[14]
S. Adee, "The hunt for the kill switch," IEEE Spectrum, vol. 45, no. 5, pp. 34--39, 2008.
[15]
R. Rad, J. Plusquellic, and M. Tehranipoor, "Sensitivity analysis to hardware trojans using power supply transient signals," in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2008), 2008, pp. 3--7.
[16]
D. Rai and J. Lach, "Performance of delay-based trojan detection techniques under parameter variations," in IEEE International Workshop on Hardware-Oriented Security and Trust (HOST 2009), 2009, pp. 58--65.
[17]
S. Narendra, "Challenges and design choices in nanoscale cmos," Journal of Emerging Technology in Computer Systems, vol. 1, pp. 7--49, 2005.
[18]
J. Rajendran, V. Jyothi, O. Sinanoglu, and R. Karri, "Design and analysis of ring oscillator based Design-for-Trust technique," in IEEE 29th VLSI Test Symposium (VTS 2011), 2011, pp. 105--110.
[19]
D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi, and B. Sunar, "Trojan detection using IC fingerprinting," in IEEE Symposium on Security and Privacy (SP 2007), 2007, pp. 296--310.
[20]
Z. Navabi, "VHDL: Analysis and Modeling of Digital Systems", McGraw Hill Professional, 1998.
[21]
Synopsys University Program supplied libraries: www.synopsys.com/Community/UniversityProgram

Index Terms

  1. Stealth Assessment of Hardware Trojans in simple Processors

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      PCI '14: Proceedings of the 18th Panhellenic Conference on Informatics
      October 2014
      355 pages
      ISBN:9781450328975
      DOI:10.1145/2645791
      • General Chairs:
      • Katsikas Sokratis,
      • Hatzopoulos Michael,
      • Apostolopoulos Theodoros,
      • Anagnostopoulos Dimosthenis,
      • Program Chairs:
      • Carayiannis Elias,
      • Varvarigou Theodora,
      • Nikolaidou Mara
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • Greek Com Soc: Greek Computer Society
      • Univ. of Piraeus: University of Piraeus
      • National and Kapodistrian University of Athens: National and Kapodistrian University of Athens
      • Athens U of Econ & Business: Athens University of Economics and Business

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 October 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      PCI '14

      Acceptance Rates

      PCI '14 Paper Acceptance Rate 51 of 102 submissions, 50%;
      Overall Acceptance Rate 190 of 390 submissions, 49%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 73
        Total Downloads
      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 05 Mar 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media