DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN
نویسندگان
چکیده
Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs be inserted in modern complex microprocessors allowing attacker to run malicious software, acquire root privileges steal secret user information. In this paper we propose DETON, an automatic methodology software manipulation aimed at introducing obfuscation programs’ execution protect microprocessor-based systems against information stealing HTHs. The high-level goal DETON is produce obfuscated version program under protection order allow trusted over (possibly) untrusted CPU-based system. will then one actually executed on target hardware platform. fully integrated classical design flow since it takes output compiler, i.e., assembly code protected, produces modified which turn compatible with underlying HW aims (i) reducing amount sensitive exposed by spreading through microprocessor’s registers submerging among garbage information, (ii) time scrambling data registers. We present set guidelines, requirements metrics driving assessing always-on information-stealing framework. assessed Ariane 64 bit RISC-V microprocessor running real-world benchmark programs embedded systems.
منابع مشابه
Security Against Hardware Trojan Attacks Using Key-Based Design Obfuscation
Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...
متن کاملSoftware Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.
متن کاملDefeating Image Obfuscation with Deep Learning
We demonstrate that modern image recognition methods based on artificial neural networks can recover hidden information from images protected by various forms of obfuscation. The obfuscation techniques considered in this paper are mosaicing (also known as pixelation), blurring (as used by YouTube), and P3, a recently proposed system for privacy-preserving photo sharing that encrypts the signifi...
متن کاملSupporting FPGA microprocessors through retargetable software tools
Driving FPGA systems from ANSI C is possible using lcc (a retargetable ANSI C compiler) targeted at an FPGA system and dasm (a retargetable, exible assembler) tools. The compiler supports custom hardware capabilities of FPGA systems, as well as all constructs of C. The assembler reads instruction de nitions at assemble time, allowing the user to add new custom hardware functions which dasm can ...
متن کاملDefeating Buffer-Overflow Prevention Hardware
Buffer overflow attacks persist in spite of advances in software engineering. Numerous prevention schemes in software have been developed over the years, but so have techniques to circumvent them. Recently, improved schemes have appeared which are entirely in hardware or require hardware modifications to support them. In this paper we describe how to defeat or circumvent these improved mechanis...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Systems Architecture
سال: 2022
ISSN: ['1383-7621', '1873-6165']
DOI: https://doi.org/10.1016/j.sysarc.2022.102592