Exposing vulnerabilities of untrusted computing platforms

Yier Jin, Mihalis Maniatakos, Yiorgos Makris

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

    Original languageEnglish (US)
    Title of host publication2012 IEEE 30th International Conference on Computer Design, ICCD 2012
    Pages131-134
    Number of pages4
    DOIs
    StatePublished - Dec 1 2012
    Event2012 IEEE 30th International Conference on Computer Design, ICCD 2012 - Montreal, QC, Canada
    Duration: Sep 30 2012Oct 3 2012

    Other

    Other2012 IEEE 30th International Conference on Computer Design, ICCD 2012
    CountryCanada
    CityMontreal, QC
    Period9/30/1210/3/12

    Fingerprint

    Hardware
    Embedded systems
    Cryptography
    Data storage equipment
    Trusted computing

    ASJC Scopus subject areas

    • Hardware and Architecture
    • Electrical and Electronic Engineering

    Cite this

    Jin, Y., Maniatakos, M., & Makris, Y. (2012). Exposing vulnerabilities of untrusted computing platforms. In 2012 IEEE 30th International Conference on Computer Design, ICCD 2012 (pp. 131-134). [6378629] https://doi.org/10.1109/ICCD.2012.6378629

    Exposing vulnerabilities of untrusted computing platforms. / Jin, Yier; Maniatakos, Mihalis; Makris, Yiorgos.

    2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. p. 131-134 6378629.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Jin, Y, Maniatakos, M & Makris, Y 2012, Exposing vulnerabilities of untrusted computing platforms. in 2012 IEEE 30th International Conference on Computer Design, ICCD 2012., 6378629, pp. 131-134, 2012 IEEE 30th International Conference on Computer Design, ICCD 2012, Montreal, QC, Canada, 9/30/12. https://doi.org/10.1109/ICCD.2012.6378629
    Jin Y, Maniatakos M, Makris Y. Exposing vulnerabilities of untrusted computing platforms. In 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. p. 131-134. 6378629 https://doi.org/10.1109/ICCD.2012.6378629
    Jin, Yier ; Maniatakos, Mihalis ; Makris, Yiorgos. / Exposing vulnerabilities of untrusted computing platforms. 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. pp. 131-134
    @inproceedings{3e3d38ea0b864692a182aba7e375e490,
    title = "Exposing vulnerabilities of untrusted computing platforms",
    abstract = "This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.",
    author = "Yier Jin and Mihalis Maniatakos and Yiorgos Makris",
    year = "2012",
    month = "12",
    day = "1",
    doi = "10.1109/ICCD.2012.6378629",
    language = "English (US)",
    isbn = "9781467330503",
    pages = "131--134",
    booktitle = "2012 IEEE 30th International Conference on Computer Design, ICCD 2012",

    }

    TY - GEN

    T1 - Exposing vulnerabilities of untrusted computing platforms

    AU - Jin, Yier

    AU - Maniatakos, Mihalis

    AU - Makris, Yiorgos

    PY - 2012/12/1

    Y1 - 2012/12/1

    N2 - This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

    AB - This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

    UR - http://www.scopus.com/inward/record.url?scp=84872078170&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=84872078170&partnerID=8YFLogxK

    U2 - 10.1109/ICCD.2012.6378629

    DO - 10.1109/ICCD.2012.6378629

    M3 - Conference contribution

    SN - 9781467330503

    SP - 131

    EP - 134

    BT - 2012 IEEE 30th International Conference on Computer Design, ICCD 2012

    ER -