{"title":"SoC fpga中第三方ip的运行时硬件木马检测与恢复","authors":"Luis Ramirez Rivera, Xiaofang Wang","doi":"10.1109/EUC50751.2020.00009","DOIUrl":null,"url":null,"abstract":"Emerging threats of untrustworthy third-party Intellectual Property (IP) cores (3PIPs) are increasingly raising crucial security concerns about field-programmable gate arrays (FPGAs), especially those used in military, medical, financial, and other critical systems. Detecting Trojans in blackbox 3PIPs is extremely challenging, especially for FPGAs due to their memory nature and dynamic partial or full reconfigurability. This paper presents a novel run-time methodology to prevent, detect, and manage the activation of hardware Trojans inside 3PIPs in FPGAs. Taking advantage of the native parallelism of FPGA designs, an isolated redundancy scheme is proposed to detect and protect a circuit from a Trojan payload. 3PIPs are placed in isolated regions in FPGAs and are controlled by an on-chip ARM processor system. The processor performs partial reconfiguration (PR) to temporarily remove an offending IP for a random amount of time that increases exponentially between each detection, or permanently if the IP has been positively detected as infected. Additionally, security policies are enacted by implementing reference monitors that control the communication between the IPs and various resources inside the FPGA. The design was implemented and verified on a Xilinx SoC FPGA development board using the Trust Hub benchmarks.","PeriodicalId":331605,"journal":{"name":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Run-time Hardware Trojan Detection and Recovery for Third-Party IPs in SoC FPGAs\",\"authors\":\"Luis Ramirez Rivera, Xiaofang Wang\",\"doi\":\"10.1109/EUC50751.2020.00009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Emerging threats of untrustworthy third-party Intellectual Property (IP) cores (3PIPs) are increasingly raising crucial security concerns about field-programmable gate arrays (FPGAs), especially those used in military, medical, financial, and other critical systems. Detecting Trojans in blackbox 3PIPs is extremely challenging, especially for FPGAs due to their memory nature and dynamic partial or full reconfigurability. This paper presents a novel run-time methodology to prevent, detect, and manage the activation of hardware Trojans inside 3PIPs in FPGAs. Taking advantage of the native parallelism of FPGA designs, an isolated redundancy scheme is proposed to detect and protect a circuit from a Trojan payload. 3PIPs are placed in isolated regions in FPGAs and are controlled by an on-chip ARM processor system. The processor performs partial reconfiguration (PR) to temporarily remove an offending IP for a random amount of time that increases exponentially between each detection, or permanently if the IP has been positively detected as infected. Additionally, security policies are enacted by implementing reference monitors that control the communication between the IPs and various resources inside the FPGA. The design was implemented and verified on a Xilinx SoC FPGA development board using the Trust Hub benchmarks.\",\"PeriodicalId\":331605,\"journal\":{\"name\":\"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EUC50751.2020.00009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 18th International Conference on Embedded and Ubiquitous Computing (EUC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUC50751.2020.00009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Run-time Hardware Trojan Detection and Recovery for Third-Party IPs in SoC FPGAs
Emerging threats of untrustworthy third-party Intellectual Property (IP) cores (3PIPs) are increasingly raising crucial security concerns about field-programmable gate arrays (FPGAs), especially those used in military, medical, financial, and other critical systems. Detecting Trojans in blackbox 3PIPs is extremely challenging, especially for FPGAs due to their memory nature and dynamic partial or full reconfigurability. This paper presents a novel run-time methodology to prevent, detect, and manage the activation of hardware Trojans inside 3PIPs in FPGAs. Taking advantage of the native parallelism of FPGA designs, an isolated redundancy scheme is proposed to detect and protect a circuit from a Trojan payload. 3PIPs are placed in isolated regions in FPGAs and are controlled by an on-chip ARM processor system. The processor performs partial reconfiguration (PR) to temporarily remove an offending IP for a random amount of time that increases exponentially between each detection, or permanently if the IP has been positively detected as infected. Additionally, security policies are enacted by implementing reference monitors that control the communication between the IPs and various resources inside the FPGA. The design was implemented and verified on a Xilinx SoC FPGA development board using the Trust Hub benchmarks.