首页> 外文期刊>Journal of circuits, systems and computers >CA-Based Detection of Coherence Exploiting Hardware Trojans
【24h】

CA-Based Detection of Coherence Exploiting Hardware Trojans

机译:基于CA的连贯性剥削硬件特洛伊木马的检测

获取原文
获取原文并翻译 | 示例

摘要

Nowadays, Hardware Trojan threats have become inevitable due to the growing complexities of Integrated Circuits (ICs) as well as the current trend of Intellectual Property (IP)-based hardware designs. An adversary can insert a Hardware Trojan during any of its life cycle phases - the design, fabrication or even at manufacturing phase. Once a Trojan is inserted into a system, it can cause an unwanted modification to system functionality which may degrade system performance or sometimes Trojans are implanted with the target to leak secret information. Once Trojans are implanted, they are hard to detect and impossible to remove from the system as they are already fabricated into the chip. In this paper, we propose three stealthy Trojan models which affect the coherence mechanism of Chip Multiprocessors' (CMPs) cache system by arbitrarily modifying the cache block state which in turn may leave the cache line states as incoherent. We have evaluated the payload of such modeled Trojans and proposed a cellular automaton (CA)-based solution for detection of such Trojans.
机译:如今,由于集成电路(ICS)的复杂性越来越复杂,以及基于知识产权(IP)的硬件设计的当前趋势,硬件特洛伊木马威胁已经变得不可避免。对手可以在任何生命周期阶段插入硬件特洛伊木马 - 设计,制造,甚至在制造阶段。一旦将特洛伊木马插入系统,它可能导致对系统功能的不需要的修改,这可能会降低系统性能,或者有时会植入特洛伊木马的目标以泄漏秘密信息。一旦植入特洛伊木马,它们很难检测到从系统中已经制造成芯片时从系统中删除并且不可能。在本文中,我们提出了三种隐身的特洛伊木马模型,通过任意修改缓存块状态来提出芯片多处理器(CMPS)缓存系统的相干机制,从而可以将缓存行状态留成了不连贯的。我们已经评估了这种建模特洛伊木马的有效载荷,并提出了一种基于蜂窝自动机(CA)的解决方案,用于检测这种特洛伊木马。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号