A Microprocessor Protection Architecture against Hardware Trojans in Memories

Alperen Bolat, Luca Cassano, Pedro Reviriego, Oguz Ergin, Marco Ottavi

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

12 Citations (Scopus)

Abstract

Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over the system. Therefore, HWTs are nowadays considered a serious threat both from academy and industry. This paper presents a protection architecture meant to shield the communication between the CPU and the memory in a microprocessor-based system. The architecture aims at detecting the activation on HWTs infesting the instruction and data memories of the system. Our proposal relies on the use of Bloom Filters (BFs) that are included in ad-hoc designed checkers and integrated in the protection architecture. BFs guarantee zero false alarms and a small (and configurable) percentage of undetected alarms. We applied the protection architecture to a case study system based on a RISC-V microprocessor implemented on an FPGA and running a set of software benchmarks. Our proposal demonstrated to be able to detect more than 99% of possible HWTs activations with zero false alarms. We measured a lookup table overhead ranging from 0.68% up to 10.52% and a flip-flop overhead between 0.68% and 0.99%, and with no working frequency reduction.

Original languageEnglish
Title of host publicationProceedings - 2020 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020
PublisherIEEE
ISBN (Electronic)9781728154268
DOIs
Publication statusPublished - Apr 2020
Externally publishedYes
Event15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020 - Marrakesh Virtual, Morocco
Duration: 1 Apr 20203 Apr 2020
Conference number: 15

Conference

Conference15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020
Abbreviated titleDTIS 2020
Country/TerritoryMorocco
CityMarrakesh Virtual
Period1/04/203/04/20

Keywords

  • Bloom Filter
  • Hardware Security
  • Hardware Trojan Horses
  • Microprocessor-based System
  • RISC-V

Fingerprint

Dive into the research topics of 'A Microprocessor Protection Architecture against Hardware Trojans in Memories'. Together they form a unique fingerprint.

Cite this