DocumentCode :
2474990
Title :
Software exploitable hardware Trojans in embedded processor
Author :
Wang, Xinmu ; Mal-Sarkar, Tatini ; Krishna, Aswin ; Narasimhan, Seetharam ; Bhunia, Swarup
Author_Institution :
Case Western Reserve Univ., Cleveland, OH, USA
fYear :
2012
fDate :
3-5 Oct. 2012
Firstpage :
55
Lastpage :
58
Abstract :
Growing threat of hardware Trojan attacks in untrusted foundry or design house has motivated researchers around the world to analyze the threat and develop effective countermeasures. In this paper, we focus on analyzing a specific class of hardware Trojans in embedded processor that can be enabled by software or data to leak critical information. These Trojans pose a serious threat in pervasively deployed embedded systems. An attacker can trigger these Trojans to extract valuable information from a system during field deployment. We show that an adversary can design a low-overhead hard-to-detect Trojan that can leak either secret keys stored in a processor, the code running in it, or the data being processed.
Keywords :
embedded systems; invasive software; microprocessor chips; critical information leakage; embedded processor; embedded systems; information extraction; secret keys; software exploitable hardware Trojans; Decision support systems; Discrete Fourier transforms; Fault tolerance; Fault tolerant systems; Nanotechnology; Very large scale integration; embedded processor; hardware Trojan; information leakage; software-exploitable Trojan;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT), 2012 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4673-3043-5
Type :
conf
DOI :
10.1109/DFT.2012.6378199
Filename :
6378199
Link To Document :
بازگشت