Hardware sandboxing: A novel defense paradigm against hardware trojans in systems on chip

6Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A novel approach for mitigation of hardware Trojan in Systems on Chip (SoC) is presented. With the assumption that Trojans can cause harm only when they are activated, the goal is to avoid cumbersome and sometimes destructive pre-fabrication and pre-deployment tests for Trojans in SoCs, by building systems capable of capturing Trojan activation or simply nullifying their effect at run-time to prevent damage to the system. To reach this goal, non-trusted third-party IPs and components off the shelf (COTS) are executed in sandboxes with checkers and virtual resources. While checkers are used to detect runtime activation of Trojans and mitigate potential damage to the system, virtual resources are provided to IPs in the sandbox, thus preventing direct access to physical resources. Our approach was validated with benchmarks from trust-hub.com, a synthetic system on FPGA scenario using the same benchmark. All our results showed a 100% Trojan detection and mitigation, with only a minimal increase in resource overhead and no performance decrease.

Cite

CITATION STYLE

APA

Bobda, C., Mead, J., Whitaker, T. J. L., Kamhoua, C., & Kwiat, K. (2017). Hardware sandboxing: A novel defense paradigm against hardware trojans in systems on chip. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10216 LNCS, pp. 47–59). Springer Verlag. https://doi.org/10.1007/978-3-319-56258-2_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free