首页> 外文期刊>Computers & Security >Towards bidirectional LUT-level detection of hardware Trojans
【24h】

Towards bidirectional LUT-level detection of hardware Trojans

机译:走向硬件特洛伊木马的双向LUT级别检测

获取原文
获取原文并翻译 | 示例

摘要

FPGAs are field-programmable and reconfigurable integrated circuits; consequently, they entail numerous security concerns. For example, malicious functions such as hardware Trojans (HTs), can be inserted into the circuits in both development and deployment stages, as malicious fabrication and modification are possible even after deployment. Therefore, to detect HTs in FPGAs effectively, it is necessary to exploit both netlists available at the development stage and bitstreams available at deployment stage; this is in contrast with existing approaches, which require source code or gate-level netlists. In achieving this, we encounter two major challenges: effectively exploiting FPGA netlists closer to bitstreams for HTs detection and reverse-engineering bitstreams to netlists at an acceptable level. To address these problems, we develop a bidirectional mechanism for detecting HTs in FPGAs at any stage. To the best of our knowledge, this is the first study on bidirectional HT detection in FPGAs. To address the first challenge, we focus on LUT-level netlists; regarding the second challenge, we directly reverse-engineer bitstreams to LUT-level netlists. For HTs detection, we employ features extracted from LUT-level netlists, which can also be derived from reversed bitstreams and used to identify HTs. We design and implement our system for experimental studies. The experiments achieve a TPR of more than 99.3% and an FPR of less than 0.15% for 15 TrustHub benchmarks in forward and backward (reverse) directions for FPGA Virtex-5 devices.
机译:FPGA是现场可编程和可重新配置的集成电路;因此,他们需要许多安全问题。例如,诸如硬件特洛伊木马(HTS)之类的恶意功能可以插入开发和部署阶段的电路中,因为即使在部署之后也可能是恶意的制作和修改。因此,有效地检测到FPGA中的HTS,有必要利用在部署阶段可用的开发阶段和比特流中获得的两个网册;这与现有方法相比,需要源代码或门级网表。在实现这一点时,我们遇到了两个主要挑战:有效利用FPGA网手在可接受的水平处对HTS检测和逆向工程比特流的比特流。为了解决这些问题,我们开发了一种用于在任何阶段检测FPGA中HTS的双向机制。据我们所知,这是FPGA中对双向HT检测的第一次研究。为了解决第一个挑战,我们专注于LUT级别的网博师;关于第二个挑战,我们直接将工程师比特流直接逆转到LUT级别的网手册。对于HTS检测,我们使用从LUT级别网表中提取的功能,该功能也可以从反向比特流中派生并用于识别HTS。我们设计并实施我们的实验研究系统。对于FPGA Virtex-5设备的前向和向后(反向)方向的15个TRUSTHUB基准,实验达到了超过99.3%的TPR,FPR小于0.15%。

著录项

  • 来源
    《Computers & Security》 |2021年第5期|102223.1-102223.17|共17页
  • 作者单位

    Graduate School of Information Yonsei University Seoul 03722 Korea;

    Graduate School of Information Yonsei University Seoul 03722 Korea;

    Graduate School of Information Yonsei University Seoul 03722 Korea;

    Graduate School of Information Yonsei University Seoul 03722 Korea;

    Graduate School of Information Yonsei University Seoul 03722 Korea;

    Graduate School of Information Yonsei University Seoul 03722 Korea;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    FPGA; Hardware Trojan; Hardware security; Bitstream; Reverse engineering;

    机译:FPGA;五金木马;硬件安全;比特流;逆向工程;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号