Exposing vulnerabilities of untrusted computing platforms
- 1 September 2012
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE) in 2012 IEEE 30th International Conference on Computer Design (ICCD)
Abstract
This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.Keywords
This publication has 11 references indexed in Scilit:
- Trustworthy Hardware: Identifying and Classifying Hardware TrojansComputer, 2010
- Hardware Trojans in Wireless Cryptographic ICsIEEE Design & Test of Computers, 2010
- Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware AutomaticallyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- Proof-Carrying Hardware: Towards Runtime Verification of Reconfigurable ModulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Experiences in Hardware Trojan design and implementationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Power supply signal calibration techniques for improving detection resolution to hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection SchemePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- The geometry of innocent flesh on the bonePublished by Association for Computing Machinery (ACM) ,2007
- Trojan Detection using IC FingerprintingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- URISC: The Ultimate Reduced Instruction Set ComputerThe International Journal of Electrical Engineering & Education, 1988