首页> 外文会议>International Symposium on Quality Electronic Design >Trusted Electronic Systems with Untrusted COTS
【24h】

Trusted Electronic Systems with Untrusted COTS

机译:可信电子系统,带不受信任的婴儿床

获取原文

摘要

The challenges of custom integrated circuits (IC) design have made it prevalent to integrate commercial-off-the-shelf (COTS) components (micro-controllers, FPGAs, etc.) in today’s designs. While this approach eases the design challenges and improves productivity, it also gives rise to diverse security concerns. One such concern is the possibility of malicious hardware modifications, also called hardware Trojan attacks, by untrusted parties involved in the manufacturing or distribution of COTS devices. While Hardware Trojan detection is an active research topic in the field of microelectronics security, most methods assume the availability of a golden design/chip, which is impractical in the case of a COTS device. In this paper, we discuss challenges with detecting Trojan in COTS components, and introduce a Trojan detection method that applies unsupervised learning. We utilize side-channel power signatures to cluster and isolate chips with Trojans. The proposed method is suitable for trust verification of COTS components by an original equipment manufacturer (OEM) before system integration. In our method, the design house creates a set of security validation test vectors available to the tester (e.g., OEM). The OEM can also generate the test vectors using the block-level diagrams provided by the design house. Power signatures are generated for all the chips under test using these test vectors. We use the generated power signatures to apply feature extraction followed by clustering to group the chips into bins. Through this process, we divide the chips into distinct bins and distinguish the Trojan-inserted chips from the Trojan-free ones. The bin with golden chips can be identified by extensive testing and reverse engineering of one chip sampled from each bin. We utilize two clustering techniques K-Means, and Expectation-Maximization (EM) to perform a comparative analysis. Additionally, we perform extensive experiments to assert our method’s effectiveness and obtain over 98% accuracy on the clustering of FPGA chips with both combinational and sequential Trojans.
机译:定制集成电路(IC)设计的挑战使其普遍存在当今设计中的商业现货(COTS)组件(微控制器,FPGA等)集成。虽然这种方法可以缓解设计挑战并提高生产率,但它也会产生不同的安全问题。一个这一疑虑是恶意硬件修改的可能性,也称为硬件特洛伊木马攻击,不受信任的各方涉及制造或分配的婴儿床设备。虽然硬件特洛伊木马检测是微电子安全领域的活跃研究主题,但大多数方法都假设金色设计/芯片的可用性,在婴儿床设备的情况下是不切实际的。在本文中,我们讨论了检测CoTJAN在COTS组件中的挑战,并介绍了一种施加无监督学习的特洛伊木马检测方法。我们利用侧通道功率签名来纳入群集和分离木偶。该方法适用于在系统集成之前由原始设备制造商(OEM)的COTS组件的信任验证。在我们的方法中,设计房屋创建了一组可用的安全验证测试向量(例如,OEM)。 OEM还可以使用设计房屋提供的块级图来生成测试向量。使用这些测试向量的所有芯片生成功率签名。我们使用生成的电源签名应用要应用功能提取,然后群集将芯片分组成箱。通过这一过程,我们将芯片分成了不同的垃圾箱,并将木马插入的芯片与特洛伊木马的芯片分开。通过从每个箱中采样的一芯片的广泛测试和逆向工程,可以识别带金芯片的垃圾箱。我们利用两种聚类技术K-means和期望 - 最大化(EM)来执行比较分析。此外,我们表现出广泛的实验,以断言我们的方法的有效性,并在组合和连续的木马中获得FPGA芯片聚类超过98%的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号