首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality
【24h】

Hiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionality

机译:隐藏部分指定的SoC总线功能中的硬件Trojan通信通道

获取原文
获取原文并翻译 | 示例

摘要

On-chip bus implementations must be bug-free and secure to provide the functionality and performance required by modern system-on-a-chip (SoC) designs. Regardless of the specific topology and protocol, bus behavior is never fully specified, meaning there exist cycles/conditions where some bus signals are irrelevant, and ignored by the verification effort. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in this partially specified behavior, and present a model for creating a covert Trojan communication channel between SoC components for any bus topology and protocol. By only altering existing bus signals during the period where their behaviors are unspecified, the Trojan channel is very difficult to detect. We give Trojan channel circuitry specifics for AMBA AXI4 and advanced peripheral bus (APB), then create a simple system comprised of several master and slave units connected by an AXI4-Lite interconnect to quantify the overhead of the Trojan channel and illustrate the ability of our Trojans to evade a suite of protocol compliance checking assertions from ARM. We also create an SoC design running a multiuser Linux OS to demonstrate how a Trojan communication channel can allow an unprivileged user access to root-user data. We then outline several detection strategies for this class of Hardware Trojan.
机译:片上总线实现必须是无缺陷且安全的,以提供现代片上系统(SoC)设计所需的功能和性能。不管具体的拓扑和协议如何,都不会完全指定总线行为,这意味着存在某些总线信号无关紧要的循环/条件,并且被验证工作所忽略。我们突出显示了隐藏在这种部分指定的行为中的硬件特洛伊木马对当前总线实现的敏感性,并提出了一个模型,用于为任何总线拓扑和协议在SoC组件之间创建隐蔽的特洛伊木马通信通道。通过仅在未指定其行为期间更改现有总线信号,特洛伊木马通道很难检测到。我们提供了针对AMBA AXI4和高级外围总线(APB)的Trojan通道电路的详细信息,然后创建了一个简单的系统,该系统由通过AXI4-Lite互连连接的多个主从设备组成,以量化Trojan通道的开销并说明我们的能力。木马规避ARM的一套协议一致性检查声明。我们还创建了一个运行多用户Linux OS的SoC设计,以演示特洛伊木马通信通道如何允许非特权用户访问root用户数据。然后,我们概述了此类硬件木马的几种检测策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号