DocumentCode :
2344012
Title :
Blue team red team approach to hardware trust assessment
Author :
Rajendran, Jeyavijayan ; Jyothi, Vinayaka ; Karri, Ramesh
Author_Institution :
ECE Dept., Polytech. Inst. of NYU, Brooklyn, NY, USA
fYear :
2011
fDate :
9-12 Oct. 2011
Firstpage :
285
Lastpage :
288
Abstract :
Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.
Keywords :
embedded systems; invasive software; Embedded Systems Challenge 2010; blue team red team approach; defense effectiveness; dynamic attack scenario; hardware security technique; hardware trust assessment; path delay measurement; ring oscillator frequency monitoring; trojan detection technique; vulnerability identification; Design automation; Fabrication; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Design (ICCD), 2011 IEEE 29th International Conference on
Conference_Location :
Amherst, MA
ISSN :
1063-6404
Print_ISBN :
978-1-4577-1953-0
Type :
conf
DOI :
10.1109/ICCD.2011.6081410
Filename :
6081410
Link To Document :
بازگشت