Tamper Evident Microprocessors
- 1 January 2010
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 173-188
- https://doi.org/10.1109/sp.2010.19
Abstract
Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors are vulnerable to insider attacks that can catastrophically compromise security, integrity and privacy of computer systems. In this paper, we describe several methods to strengthen the fundamental assumption about trust in microprocessors. By employing practical, lightweight attack detectors within a microprocessor, we show that it is possible to protect against malicious logic embedded in microprocessor hardware. We propose and evaluate two area-efficient hardware methods - TrustNet and DataWatch - that detect attacks on microprocessor hardware by knowledgeable, malicious insiders. Our mechanisms leverage the fact that multiple components within a microprocessor (e.g., fetch, decode pipeline stage etc.) must necessarily coordinate and communicate to execute even simple instructions, and that any attack on a microprocessor must cause erroneous communications between micro architectural subcomponents used to build a processor. A key aspect of our solution is that TrustNet and DataWatch are themselves highly resilient to corruption. We demonstrate that under realistic assumptions, our solutions can protect pipelines and on-chip cache hierarchies at negligible area cost and with no performance impact. Combining TrustNet and DataWatch with prior work on fault detection has the potential to provide complete coverage against a large class of microprocessor attacks.Keywords
This publication has 34 references indexed in Scilit:
- Secure and robust error correction for physical unclonable functionsIEEE Design & Test of Computers, 2010
- Detecting malicious inclusions in secure hardware: Challenges and solutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Survey of Scan Chain DiagnosisIEEE Design & Test of Computers, 2008
- Hierarchical Verification for Increasing Performance in Reliable ProcessorsJournal of Electronic Testing, 2008
- An Analytical Model for Time-Driven Cache AttacksLecture Notes in Computer Science, 2007
- Magic boxes and boots: security in hardwareComputer, 2004
- Identification of design errors through functional testingIEEE Transactions on Reliability, 2003
- Silicon physical random functionsPublished by Association for Computing Machinery (ACM) ,2002
- Building the IBM 4758 secure coprocessorComputer, 2001
- A note on the confinement problemCommunications of the ACM, 1973