首页> 外文会议>IEEE International Verification and Security Workshop >On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator
【24h】

On the Mitigation of Hardware Trojan Attacks in Embedded Processors by Exploiting a Hardware-Based Obfuscator

机译:基于硬件的混淆器利用基于硬件的混淆器来缓解嵌入式处理器的硬件特洛伊木马攻击

获取原文

摘要

Due to the complexity of digital circuits manufacturing, nowadays most semi-conductor companies outsource part of the fabrication process, reducing both the production costs and the time- to- market. However, as untrusted parties are involved in the production-chain, new security risks arise, and the threat of Hardware Trojans is a serious concern for the producers of embedded devices. In this paper, we propose an on-chip software obfuscator aiming to reduce the activation probability of malicious components through software. Using a completely transparent hardware based solution, with a limited hardware and time overhead, the sequence of instructions is modified, eventually defusing Trojan activation sequences, yet guaranteeing the original functionalities. The methodology was implemented in a modified version of the OR1200 processor core, using a set of programs from the MiBench test suit, to demonstrate the method suitability.
机译:由于数字电路制造的复杂性,现在大多数半导体公司外包了一部分制造过程,减少了生产成本和上市时间。然而,由于不受信任的各方参与生产链,出现了新的安全风险,硬件特洛伊木马的威胁是对嵌入式设备的生产者的严重关注。在本文中,我们提出了一种片上软件混淆器,旨在通过软件降低恶意组件的激活概率。使用完全透明的基于硬件的解决方案,具有有限的硬件和时间开销,修改了指令序列,最终解散了木马激活序列,但保证了原始功能。该方法是在OR1200处理器核心的修改版本中实现的,使用来自Mibench Test Suit的一组程序,以演示方法适用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号