Blue team red team approach to hardware trust assessment

Jeyavijayan Rajendran, Vinayaka Jyothi, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.

Original languageEnglish (US)
Title of host publication2011 IEEE 29th International Conference on Computer Design, ICCD 2011
Pages285-288
Number of pages4
DOIs
StatePublished - 2011
Event29th IEEE International Conference on Computer Design 2011, ICCD 2011 - Amherst, MA, United States
Duration: Nov 9 2011Nov 12 2011

Other

Other29th IEEE International Conference on Computer Design 2011, ICCD 2011
CountryUnited States
CityAmherst, MA
Period11/9/1111/12/11

Fingerprint

Embedded systems
Hardware
Monitoring

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Hardware and Architecture

Cite this

Rajendran, J., Jyothi, V., & Karri, R. (2011). Blue team red team approach to hardware trust assessment. In 2011 IEEE 29th International Conference on Computer Design, ICCD 2011 (pp. 285-288). [6081410] https://doi.org/10.1109/ICCD.2011.6081410

Blue team red team approach to hardware trust assessment. / Rajendran, Jeyavijayan; Jyothi, Vinayaka; Karri, Ramesh.

2011 IEEE 29th International Conference on Computer Design, ICCD 2011. 2011. p. 285-288 6081410.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rajendran, J, Jyothi, V & Karri, R 2011, Blue team red team approach to hardware trust assessment. in 2011 IEEE 29th International Conference on Computer Design, ICCD 2011., 6081410, pp. 285-288, 29th IEEE International Conference on Computer Design 2011, ICCD 2011, Amherst, MA, United States, 11/9/11. https://doi.org/10.1109/ICCD.2011.6081410
Rajendran J, Jyothi V, Karri R. Blue team red team approach to hardware trust assessment. In 2011 IEEE 29th International Conference on Computer Design, ICCD 2011. 2011. p. 285-288. 6081410 https://doi.org/10.1109/ICCD.2011.6081410
Rajendran, Jeyavijayan ; Jyothi, Vinayaka ; Karri, Ramesh. / Blue team red team approach to hardware trust assessment. 2011 IEEE 29th International Conference on Computer Design, ICCD 2011. 2011. pp. 285-288
@inproceedings{55d6d181cf094f63b06e219f1efe362d,
title = "Blue team red team approach to hardware trust assessment",
abstract = "Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.",
author = "Jeyavijayan Rajendran and Vinayaka Jyothi and Ramesh Karri",
year = "2011",
doi = "10.1109/ICCD.2011.6081410",
language = "English (US)",
isbn = "9781457719523",
pages = "285--288",
booktitle = "2011 IEEE 29th International Conference on Computer Design, ICCD 2011",

}

TY - GEN

T1 - Blue team red team approach to hardware trust assessment

AU - Rajendran, Jeyavijayan

AU - Jyothi, Vinayaka

AU - Karri, Ramesh

PY - 2011

Y1 - 2011

N2 - Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.

AB - Hardware security techniques are validated using fixed in-house methods. However, the effectiveness of such techniques in the field cannot be the same as the attacks are dynamic. A red team blue team approach mimics dynamic attack scenarios and thus can be used to validate such techniques by determining the effectiveness of a defense and identifying vulnerabilities in it. By following a red team blue team approach, we validated two trojan detection techniques namely, path delay measurement and ring oscillator frequency monitoring, in the Embedded Systems Challenge (ESC) 2010. In ESC, one team performed the blue team activities and eight other teams performed red team activities. The path delay measurement technique detected all the trojans. The ESC exposed a vulnerability in the RO-based technique which was exploited by the red teams causing some trojans to be undetected. Post ESC, we developed a technique to fix this vulnerability.

UR - http://www.scopus.com/inward/record.url?scp=83455196098&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=83455196098&partnerID=8YFLogxK

U2 - 10.1109/ICCD.2011.6081410

DO - 10.1109/ICCD.2011.6081410

M3 - Conference contribution

SN - 9781457719523

SP - 285

EP - 288

BT - 2011 IEEE 29th International Conference on Computer Design, ICCD 2011

ER -