Abstract
Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over the system. Therefore, HWTs are nowadays considered a serious threat both from academy and industry. This paper presents a protection architecture meant to shield the communication between the CPU and the memory in a microprocessor-based system. The architecture aims at detecting the activation on HWTs infesting the instruction and data memories of the system. Our proposal relies on the use of Bloom Filters (BFs) that are included in ad-hoc designed checkers and integrated in the protection architecture. BFs guarantee zero false alarms and a small (and configurable) percentage of undetected alarms. We applied the protection architecture to a case study system based on a RISC-V microprocessor implemented on an FPGA and running a set of software benchmarks. Our proposal demonstrated to be able to detect more than 99% of possible HWTs activations with zero false alarms. We measured a lookup table overhead ranging from 0.68% up to 10.52% and a flip-flop overhead between 0.68% and 0.99%, and with no working frequency reduction.
Original language | English |
---|---|
Title of host publication | Proceedings - 2020 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020 |
Publisher | IEEE |
ISBN (Electronic) | 9781728154268 |
DOIs | |
Publication status | Published - Apr 2020 |
Externally published | Yes |
Event | 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020 - Marrakesh Virtual, Morocco Duration: 1 Apr 2020 → 3 Apr 2020 Conference number: 15 |
Conference
Conference | 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020 |
---|---|
Abbreviated title | DTIS 2020 |
Country/Territory | Morocco |
City | Marrakesh Virtual |
Period | 1/04/20 → 3/04/20 |
Keywords
- Bloom Filter
- Hardware Security
- Hardware Trojan Horses
- Microprocessor-based System
- RISC-V