Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips

IF 1.6 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Thomas Mountford, Abhijitt Dhavlle, Andrew Tevebaugh, N. Mansoor, Sai Manoj Pudukotai Dinakarrao, A. Ganguly
{"title":"Address Obfuscation to Protect against Hardware Trojans in Network-on-Chips","authors":"Thomas Mountford, Abhijitt Dhavlle, Andrew Tevebaugh, N. Mansoor, Sai Manoj Pudukotai Dinakarrao, A. Ganguly","doi":"10.3390/jlpea13030050","DOIUrl":null,"url":null,"abstract":"In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware Trojan (HT) being injected into a system is particularly prevalent due to the increase in third-party manufacturers for system-on-chip (SoC) designs. With a local injection of an HT in an SoC, an adversary can gain access to information about applications running on the system by revealing specific communications of the SoC, and the network-on-chip (NoC) as a whole. This heavily compromises the system and gives information to the attacker, which can lead to more tailored, compromising attacks. In this paper, we demonstrate an HT that exploits communication patterns inside an SoC to reveal applications that are running on an NoC with multi/many-core processors. This is performed by leaking packet counts, after which the attacker then uses machine learning techniques to identify applications running on processors, and the SoC as a whole. We also propose a LUT-based obfuscation technique to limit the information available to the hardware Trojan. Our results indicate that this obfuscation method can reduce the accuracy of this attack from 99% to <8% in multi/many-core systems.","PeriodicalId":38100,"journal":{"name":"Journal of Low Power Electronics and Applications","volume":" ","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Low Power Electronics and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/jlpea13030050","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

In modern computing, which relies on the interconnection of networks used in many/multi-core systems, any system can be critically subverted if the interconnection is compromised. This can be done in a multitude of ways, but the threat of a hardware Trojan (HT) being injected into a system is particularly prevalent due to the increase in third-party manufacturers for system-on-chip (SoC) designs. With a local injection of an HT in an SoC, an adversary can gain access to information about applications running on the system by revealing specific communications of the SoC, and the network-on-chip (NoC) as a whole. This heavily compromises the system and gives information to the attacker, which can lead to more tailored, compromising attacks. In this paper, we demonstrate an HT that exploits communication patterns inside an SoC to reveal applications that are running on an NoC with multi/many-core processors. This is performed by leaking packet counts, after which the attacker then uses machine learning techniques to identify applications running on processors, and the SoC as a whole. We also propose a LUT-based obfuscation technique to limit the information available to the hardware Trojan. Our results indicate that this obfuscation method can reduce the accuracy of this attack from 99% to <8% in multi/many-core systems.
防止芯片上网络中硬件木马的地址混淆
在依赖于多核/多核系统中使用的网络互连的现代计算中,如果互连受到损害,任何系统都可能被严重破坏。这可以通过多种方式实现,但由于芯片上系统(SoC)设计的第三方制造商的增加,将硬件特洛伊木马(HT)注入系统的威胁尤其普遍。通过在SoC中本地注入HT,对手可以通过揭示SoC和整个片上网络(NoC)的特定通信来访问有关系统上运行的应用程序的信息。这会严重危害系统并将信息提供给攻击者,从而导致更具针对性的、有危害性的攻击。在本文中,我们展示了一种HT,它利用SoC内部的通信模式来揭示在具有多核/多核处理器的NoC上运行的应用程序。这是通过泄露数据包计数来实现的,之后攻击者使用机器学习技术来识别在处理器上运行的应用程序以及整个SoC。我们还提出了一种基于LUT的模糊处理技术,以限制硬件特洛伊木马可用的信息。我们的结果表明,在多/多核心系统中,这种模糊方法可以将该攻击的准确率从99%降低到<8%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Low Power Electronics and Applications
Journal of Low Power Electronics and Applications Engineering-Electrical and Electronic Engineering
CiteScore
3.60
自引率
14.30%
发文量
57
审稿时长
11 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信