Gelişmiş Arama

Basit öğe kaydını göster

dc.contributor.authorFern, Nicole
dc.contributor.authorSan, İsmail
dc.contributor.authorKoç, Çetin Kaya
dc.contributor.authorCheng, Kwang-Ting (Tim)
dc.date.accessioned2019-10-18T18:43:40Z
dc.date.available2019-10-18T18:43:40Z
dc.date.issued2017
dc.identifier.issn0278-0070
dc.identifier.issn1937-4151
dc.identifier.urihttps://dx.doi.org/10.1109/TCAD.2016.2638439
dc.identifier.urihttps://hdl.handle.net/11421/10376
dc.descriptionWOS: 000408149500002en_US
dc.description.abstractOn-chip bus implementations must be bug-free and secure to provide the functionality and performance required by modern system-on-a-chip (SoC) designs. Regardless of the specific topology and protocol, bus behavior is never fully specified, meaning there exist cycles/conditions where some bus signals are irrelevant, and ignored by the verification effort. We highlight the susceptibility of current bus implementations to Hardware Trojans hiding in this partially specified behavior, and present a model for creating a covert Trojan communication channel between SoC components for any bus topology and protocol. By only altering existing bus signals during the period where their behaviors are unspecified, the Trojan channel is very difficult to detect. We give Trojan channel circuitry specifics for AMBA AXI4 and advanced peripheral bus (APB), then create a simple system comprised of several master and slave units connected by an AXI4-Lite interconnect to quantify the overhead of the Trojan channel and illustrate the ability of our Trojans to evade a suite of protocol compliance checking assertions from ARM. We also create an SoC design running a multiuser Linux OS to demonstrate how a Trojan communication channel can allow an unprivileged user access to root-user data. We then outline several detection strategies for this class of Hardware Trojan.en_US
dc.description.sponsorshipNSF/SRC STARSS [1526695]en_US
dc.description.sponsorshipThis work was supported by NSF/SRC STARSS under Grant 1526695.en_US
dc.language.isoengen_US
dc.publisherIEEE-Inst Electrical Electronics Engineers Incen_US
dc.relation.isversionof10.1109/TCAD.2016.2638439en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectHardware Securityen_US
dc.subjectHardware Trojansen_US
dc.subjectOn-Chip Bus Networksen_US
dc.subjectUnspecified Functionalityen_US
dc.titleHiding Hardware Trojan Communication Channels in Partially Specified SoC Bus Functionalityen_US
dc.typearticleen_US
dc.relation.journalIEEE Transactions On Computer-Aided Design of Integrated Circuits and Systemsen_US
dc.contributor.departmentAnadolu Üniversitesien_US
dc.contributor.authorIDKoc, Cetin/0000-0002-2572-9565en_US
dc.identifier.volume36en_US
dc.identifier.issue9en_US
dc.identifier.startpage1435en_US
dc.identifier.endpage1444en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US


Bu öğenin dosyaları:

Thumbnail

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster