Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over the system. Therefore, HWTs are nowadays considered a serious threat both from academy and industry. This paper presents a protection architecture meant to shield the communication between the CPU and the memory in a microprocessor-based system. The architecture aims at detecting the activation on HWTs infesting the instruction and data memories of the system. Our proposal relies on the use of Bloom Filters (BFs) that are included in ad-hoc designed checkers and integrated in the protection architecture. BFs guarantee zero false alarms and a small (and configurable) percentage of undetected alarms. We applied the protection architecture to a case study system based on a RISC-V microprocessor implemented on an FPGA and running a set of software benchmarks. Our proposal demonstrated to be able to detect more than 99% of possible HWTs activations with zero false alarms. We measured a lookup table overhead ranging from 0.68% up to 10.52% and a Hip-Hop overhead between 0.68% and 0.99%, and with no working frequency reduction.

Bolat, A., Cassano, L., Reviriego, P., Ergin, O., Ottavi, M. (2020). A Microprocessor Protection Architecture against Hardware Trojans in Memories. In 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). 345 E 47TH ST, NEW YORK, NY 10017 USA : IEEE [10.1109/DTIS48698.2020.9080961].

A Microprocessor Protection Architecture against Hardware Trojans in Memories

Ottavi, M
2020-01-01

Abstract

Software exploitable Hardware Trojan Horses (HWTs) have been currently inserted in commercial CPUs and, very recently, in memories. Such attacks may allow malicious users to run their own software or to gain unauthorized privileges over the system. Therefore, HWTs are nowadays considered a serious threat both from academy and industry. This paper presents a protection architecture meant to shield the communication between the CPU and the memory in a microprocessor-based system. The architecture aims at detecting the activation on HWTs infesting the instruction and data memories of the system. Our proposal relies on the use of Bloom Filters (BFs) that are included in ad-hoc designed checkers and integrated in the protection architecture. BFs guarantee zero false alarms and a small (and configurable) percentage of undetected alarms. We applied the protection architecture to a case study system based on a RISC-V microprocessor implemented on an FPGA and running a set of software benchmarks. Our proposal demonstrated to be able to detect more than 99% of possible HWTs activations with zero false alarms. We measured a lookup table overhead ranging from 0.68% up to 10.52% and a Hip-Hop overhead between 0.68% and 0.99%, and with no working frequency reduction.
2020 15th IEEE International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2020
Rilevanza internazionale
2020
Settore ING-INF/01 - ELETTRONICA
English
Bloom Filter
Hardware Security
Hardware Trojan Horses
Microprocessor-based System
RISC-V
Intervento a convegno
Bolat, A., Cassano, L., Reviriego, P., Ergin, O., Ottavi, M. (2020). A Microprocessor Protection Architecture against Hardware Trojans in Memories. In 2020 15th Design & Technology of Integrated Systems in Nanoscale Era (DTIS). 345 E 47TH ST, NEW YORK, NY 10017 USA : IEEE [10.1109/DTIS48698.2020.9080961].
Bolat, A; Cassano, L; Reviriego, P; Ergin, O; Ottavi, M
File in questo prodotto:
File Dimensione Formato  
09080961.pdf

solo utenti autorizzati

Tipologia: Documento in Post-print
Licenza: Copyright dell'editore
Dimensione 115.81 kB
Formato Adobe PDF
115.81 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/259779
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 12
  • ???jsp.display-item.citation.isi??? 9
social impact