Isolating the Register-bank Trojans in General-purpose Microprocessors using Secure Programming

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 567

فایل این مقاله در 6 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CBCONF01_0488

تاریخ نمایه سازی: 16 شهریور 1395

چکیده مقاله:

The design process of the embedded electronic devices involves various teams which might allow a malicious user (e.g. designer, manufacturer, etc.) to insert hardware Trojans into the design. This significantly complicates activation and detection of hardware Trojans. Considering possible presence of hardware Trojans their effects can be detrimental to the normal operation of critical systems such as safety, health, transportation and etc. Programming on systems vulnerable to hardware Trojans demands precautions to minimize the risk of the malicious hardware interfering with the normal operation of the system. In this paper, isolation of untrusted components of an embedded system using compiler-based techniques is evaluated. In other words, reported vulnerable functional blocks are excluded in compilation stage so that they are not used at all during the run-time. Simulation results show that the proposed quarantine technique can be efficiently used with reasonable time overhead.

کلیدواژه ها:

نویسندگان

Peyman Talebian

Department of Computer Science and Engineering Shahid Beheshti University, G. C.

Ali Jahanian

Department of Computer Science and Engineering Shahid Beheshti University, G. C.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • A. Waksman and S. S ethumadhavan, "Tamper evident microprocessors , ...
  • M. Tehranipoor and F. Koushanfar, "A survey of hardware Trojan ...
  • S. Bhunia, M.S. Hsiao, M. Banga and S. Narasimhan, "Hardware ...
  • _ _ _ Transactions on, vol. 20, pp. 1 12-125, ...
  • F. Wolff, C. Papachristou, S. Bhunia and R.S. Chakraborty, "Towards ...
  • X. Wang, M. Tehranipoor and .J. Plusquellic, "Detecting malicious inclusions ...
  • L. Lin, W. Burleson and , Paar, "MOLES: malicious off-chip ...
  • _ _ _ _ Defcon, vol. 16, 2008. ...
  • D. Wackerly, W. Mendenhall and R. Scheaffer, Mathematical statistics with ...
  • X. Wang, H. Salmani, M. Tehranipoor and J. Plusquellic, "Hardware ...
  • M. Bushnell and V.D. Agrawal, Essentials of electronic testing for ...
  • M. Potkonjak, A. Nahapetian, M. Nelson and T Massey, "Hardware ...
  • Y. Alkabani and F. Koushanfar, "C ons istency-based characterizatio for ...
  • _ S _ _ Security and Trust, 2008. HOST 2008. ...
  • J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van ...
  • _ _ _ _ Programming and Security, Springer, 2001, pp. ...
  • V. Verbauwhede, K. Tiri, D. Hwang and P. Schaumont, "Circuits ...
  • (2016, April 7). ARM Information Center. [Online]. Available: http ://infocenter. ...
  • (2016, April 7). Keil. [Online]. Available: http : //www. keil.com/ ...
  • S. Adee, "The hunt for the kill switch, " Spectrum, ...
  • M. Swanson, N. Bartol and R Moorthy, "Piloting Supply Chain ...
  • _ _ _ identification of stealthy malicious logic using boolean ...
  • M. Banga and M.S. Hsiao, "A region based approach for ...
  • M. Banga, M. Chandrasekar, L. Fang and M.S. Hsiao, "Guided ...
  • D. Agrawal, S. Baktir, D. Karakoyunlu, P. Rohatgi and B. ...
  • R.M. Rad, X. Wang, M. Tehranipoor and J. Plusquellic, "Power ...
  • Conference on C omputer-Aided Design, pp. 632-639, 2008. ...
  • J. Li and J. Lach, "At-speed delay characterization for IC ...
  • S.T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang ...
  • _ _ _ _ Security and Information Intelligence Research: Cyber ...
  • _ _ " _ _ _ J. Plusquellic and M. ...
  • D. McIntyre, F. Wolff, C. Papachristou, S. Bhunia and D ...
  • G. Bloom, B. Narahari and . Simha, "OS support for ...
  • M. Hicks, M. Finnicum, S.T. King, M.M. Martin and J.M. ...
  • and Privacy, pp. 159-172, 2010. ...
  • Y. Alkabani and F Koushanfar, "Designer's hardware Trojan horse, " ...
  • نمایش کامل مراجع