首页> 外文会议>IEEE International Conference on Computer Design >Blue team red team approach to hardware trust assessment
【24h】

Blue team red team approach to hardware trust assessment

机译:蓝色团队红色团队方法探讨硬件信任评估

获取原文

摘要

Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.
机译:使用固定内部方法验证硬件安全技术。然而,这种技术在该领域的有效性不能与攻击动态相同。红色团队蓝色团队方法模仿动态攻击场景,因此可用于通过确定防御的有效性和识别它的漏洞来验证这些技术。通过遵循红色的Team Blue Team方法,我们验证了两个特洛伊木马检测技术即,路径延迟测量和环形振荡器频率监测,在嵌入式系统挑战(ESC)2010中。在ESC,一个团队进行了蓝色团队活动和其他八个团队执行了红色团队活动。路径延迟测量技术检测到所有特洛伊木马。 ESC暴露了基于RO的技术漏洞,该技术被红色团队利用,导致某些特洛伊木马未被发现。发布ESC,我们开发了一种解决此漏洞的技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号