Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

نویسندگان

چکیده

In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if is compromised. This done a multitude ways, but threat hardware Trojan (HT) being injected into particularly prevalent due to increase third-party manufacturers for system-on-chip (SoC) designs. With local injection an HT SoC, adversary gain access information about applications running by revealing specific communications and network-on-chip (NoC) as whole. heavily compromises gives attacker, lead more tailored, compromising attacks. this paper, we demonstrate that exploits communication patterns inside SoC reveal are NoC with multi/many-core processors. performed leaking packet counts, after attacker then uses machine learning techniques identify processors, We also propose LUT-based obfuscation technique limit available Trojan. Our results indicate method reduce accuracy attack from 99% <8% systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip

A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to p...

متن کامل

TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation

Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even automated defenses may not be able to react in a timely fashion. Recent work has examined a proactive defense mechanism called Network Address Space Randomization (NASR) whose objective is to harden networks specifically against ...

متن کامل

Stealthy Dopant-Level Hardware Trojans

With the increase in outsourcing manufacturing of integrated circuits to di erent countries, the topic of trust and security becomes more and more important. The built circuits could contain some malicious modi cations introduced during production, known as hardware trojans. Common ways of detecting these modi cation include optical inspection with electron-microscopes, comparing side-channel i...

متن کامل

Stealthy Dopant-Level Hardware Trojans

In recent years, hardware Trojans have drawn the attention of governments and industry as well as the scientific community. One of the main concerns is that integrated circuits, e.g., for military or criticalinfrastructure applications, could be maliciously manipulated during the manufacturing process, which often takes place abroad. However, since there have been no reported hardware Trojans i...

متن کامل

Hardware Trojans - A Systemic Threat

Hardware trojans are a systemic threat that can impact the operations and infrastructure of corporations and government organisations. In this paper, we evaluate a credible and organisation-wide hardware trojan threat from compromised network cards. Our research examines the systemic threat of hardware trojans with an actual hardware trojan implementation to evaluate the impact. Our hardware tr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Low Power Electronics and Applications

سال: 2023

ISSN: ['2079-9268']

DOI: https://doi.org/10.3390/jlpea13030050