首页> 外文期刊>Microprocessors and microsystems >SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection
【24h】

SIMCom: Statistical sniffing of inter-module communications for runtime hardware trojan detection

机译:SIMCOM:运行时硬件木马检测模块间通信的统计嗅探

获取原文
获取原文并翻译 | 示例

摘要

Timely detection of Hardware Trojans (HTs) has become a major challenge for secure integrated circuits. We present a run-time methodology for HT detection that employs a multi-parameter statistical traffic modeling of the communication channel in a given System-on-Chip (SoC), named as SIMCom. The main idea is to model the communication using multiple side-channel information like the Hurst exponent, the standard deviation of the injection distribution, and the hop distribution jointly to accurately identify HT-based online anomalies (that affects the communication without affecting the protocols or control signals). At design time, our methodology employs a "property specification language" to define and embed assertions in the RTL, specifying the correct communication behavior of a given SoC. At run-time, it monitors the anomalies in the communication behavior by checking the execution patterns against these assertions. For illustration, we evaluate SIMCom for three SoCs, i.e., SoC1 (four single-core MC8051 and UART modules), SoC2 (four single-core MC8051, AES, ethernet, memctrl, BasicRSA, RS232 modules), and SoC3 (four single-core LEON3 connected with each other and AES, ethernet, memctrl, BasicRSA, RS23s modules microcontrollers). The experimental results show that with the combined analysis of multiple statistical parameters, SIMCom is able to detect all the benchmark Trojans (available on trust-hub) with less than 1% area and power overhead. (c) 2020 Elsevier B.V. All rights reserved.
机译:及时检测硬件特洛伊木马(HTS)已成为安全集成电路的主要挑战。我们为HT检测提供了一种运行时间方法,用于在给定系统的片上(SoC)中使用的通信信道的多参数统计流量建模,命名为SIMCOM。主要思想是使用多个侧通道信息模拟通信,如赫斯特指数,注射分布的标准偏差,以及跳跃分布,以便准确地识别基于HT的在线异常(这会影响通信而不影响协议或控制信号)。在设计时,我们的方法使用“属性规范语言”来定义和嵌入断言,在RTL中指定给定SoC的正确通信行为。在运行时,它通过检查这些断言的执行模式来监视通信行为中的异常。为了说明,我们评估三个SOC的SIMCOM,即SOC1(四个单核MC8051和UART模块),SOC2(四个单核MC8051,AES,以太网,MEMCTRL,BasicRSA,RS232模块)和SOC3(四个单一 - 核心leon3彼此连接,以太网,以太网,MEMCTRL,BasicRSA,RS23S模块微控制器)。实验结果表明,随着多种统计参数的综合分析,SIMCOM能够检测所有基准特洛伊木马(可在信任中心上提供),面积小于1%和电源开销。 (c)2020 Elsevier B.v.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号