首页> 外文会议>IEEE VLSI Test Symposium >Hardware Trojan attacks in embedded memory
【24h】

Hardware Trojan attacks in embedded memory

机译:嵌入式内存中的硬件Trojan攻击

获取原文

摘要

Embedded memory, typically implemented with Static Random Access Memory (SRAM) technology, is an integral part of modern processors and System-on-Chips (SoCs). The reliability and integrity of embedded SRAM arrays are essential to ensure dependable and trustworthy computing. In the past, significant research has been conducted to develop automated test algorithms aimed at comprehensively detecting SRAM faults. While such tests have advanced our ability to detect manufacturing imperfection induced faults, they cannot ensure detection of deliberately implemented design modifications, also known as hardware Trojans, in an SRAM array by untrusted entities in the design and fabrication flow. Indeed, these attacks constitute an emerging concern, since they can affect the integrity of fabricated ICs and cause severe consequences in the field. While a growing body of research addresses Trojan attacks in logic circuits, little to no research has explored these attacks in embedded memory arrays. In this paper, for the first time to our knowledge, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing memory tests (e.g. March test) while enabling targeted data tampering after deployment. We demonstrate various forms of Trojan circuits in SRAM that cause diverse malicious effects and have diverse activation conditions while incurring minimal overhead in power, performance, and stability. Further, the proposed layouts preserve the SRAM cell footprint and incur negligible silicon area overhead.
机译:通常用静态随机存取存储器(SRAM)技术实现的嵌入式存储器是现代处理器和片上系统(SoC)的组成部分。嵌入式SRAM阵列的可靠性和完整性对​​于确保可靠和可信赖的计算至关重要。过去,已经进行了大量研究来开发旨在全面检测SRAM故障的自动测试算法。尽管此类测试已提高了我们检测制造缺陷导致的故障的能力,但它们不能确保检测到的不正确实体在设计和制造流程中检测到的SRAM阵列中故意实施的设计修改(也称为硬件特洛伊木马)。确实,这些攻击构成了一个新的关注点,因为它们会影响已制成的IC的完整性并在现场造成严重后果。尽管越来越多的研究针对逻辑电路中的Trojan攻击,但几乎没有研究探索嵌入式存储器阵列中的这些攻击。在本文中,据我们所知,我们首次提出了针对嵌入式SRAM阵列的新型硬件木马。特洛伊木马程序旨在逃避行业标准的制造后内存测试(例如3月测试),同时在部署后能够进行有针对性的数据篡改。我们演示了SRAM中各种形式的特洛伊木马电路,这些木马电路会导致各种恶意影响并具有多种激活条件,同时在功耗,性能和稳定性方面的开销最少。此外,提出的布局保留了SRAM单元的占位面积,并导致可忽略的硅面积开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号