Title :
Exposing vulnerabilities of untrusted computing platforms
Author :
Jin, Yier ; Maniatakos, Michail ; Makris, Yiorgos
fDate :
Sept. 30 2012-Oct. 3 2012
Abstract :
This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.
Keywords :
computer viruses; microcomputers; CSAW; NYU-Poly; Trojan detection development; combined hardware-software attacks; critical systems; cyber security awareness week; embedded system; processor-level hardware Trojans; untrusted computing platforms; Computers; Conferences; Cryptography; Hardware; Software; Trojan horses;
Conference_Titel :
Computer Design (ICCD), 2012 IEEE 30th International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4673-3051-0
DOI :
10.1109/ICCD.2012.6378629