Title :
Trustworthy computing in a multi-core system using distributed scheduling
Author :
McIntyre, D. ; Wolff, F. ; Papachristou, C. ; Bhunia, S.
Author_Institution :
Dept. of Comput. & Inf. Sci., Cleveland State Univ., Cleveland, OH, USA
Abstract :
Hardware Trust is an emerging problem in semiconductor integrated circuit (IC) security due to widespread outsourcing and the stealthy nature of hardware Trojans. Conventional post-manufacturing testing, test generation algorithms and test coverage metrics cannot be readily extended to hardware Trojan detection. As a result there is a need to develop approaches that will ensure trusted in-field operation of ICs, and more generally trust in computing. We present a distributed software scheduling prototype, TADS (Trojan Aware Distributed Scheduling), to achieve a Trojan-activation tolerant trustworthy computing system in a multi-core processor potentially containing hardware Trojans. TADS is designed to be transparent to applications and can run on general purpose multicore PEs without modifications to the operating system or underlying hardware. TADS can, with high confidence, continue to correctly execute its specified queue of job subtasks in the presence of hardware Trojans in the multi-core PEs while learning the individual trustworthiness of the individual PEs. Specially crafted self-checking subtasks called bounty hunters are introduced to accelerate PE trust learning. Also, by learning and maintaining individual PE trustworthiness, the scheduler is able to achieve Trojan containment by scheduling subsequent job subtasks to PEs with high learned trust.
Keywords :
integrated circuit design; invasive software; multiprocessing systems; operating systems (computers); processor scheduling; bounty hunter; distributed scheduling; distributed software scheduling prototype; hardware trojan detection; multicore processor; operating system; post manufacturing testing; semiconductor integrated circuit security; test coverage metrix; test generation algorithm; trojan activation tolerant trustworthy computing system; trojan aware distributed scheduling; Arrays; Hardware; Manufacturing; Multicore processing; Processor scheduling; Software; Trojan horses;
Conference_Titel :
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International
Conference_Location :
Corfu
Print_ISBN :
978-1-4244-7724-1
DOI :
10.1109/IOLTS.2010.5560200