Exposing vulnerabilities of untrusted computing platforms

Yier Jin, Mihalis Maniatakos, Yiorgos Makris

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

Original languageEnglish (US)
Title of host publication2012 IEEE 30th International Conference on Computer Design, ICCD 2012
Pages131-134
Number of pages4
DOIs
StatePublished - Dec 1 2012
Event2012 IEEE 30th International Conference on Computer Design, ICCD 2012 - Montreal, QC, Canada
Duration: Sep 30 2012Oct 3 2012

Other

Other2012 IEEE 30th International Conference on Computer Design, ICCD 2012
CountryCanada
CityMontreal, QC
Period9/30/1210/3/12

Fingerprint

Hardware
Embedded systems
Cryptography
Data storage equipment
Trusted computing

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering

Cite this

Jin, Y., Maniatakos, M., & Makris, Y. (2012). Exposing vulnerabilities of untrusted computing platforms. In 2012 IEEE 30th International Conference on Computer Design, ICCD 2012 (pp. 131-134). [6378629] https://doi.org/10.1109/ICCD.2012.6378629

Exposing vulnerabilities of untrusted computing platforms. / Jin, Yier; Maniatakos, Mihalis; Makris, Yiorgos.

2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. p. 131-134 6378629.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jin, Y, Maniatakos, M & Makris, Y 2012, Exposing vulnerabilities of untrusted computing platforms. in 2012 IEEE 30th International Conference on Computer Design, ICCD 2012., 6378629, pp. 131-134, 2012 IEEE 30th International Conference on Computer Design, ICCD 2012, Montreal, QC, Canada, 9/30/12. https://doi.org/10.1109/ICCD.2012.6378629
Jin Y, Maniatakos M, Makris Y. Exposing vulnerabilities of untrusted computing platforms. In 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. p. 131-134. 6378629 https://doi.org/10.1109/ICCD.2012.6378629
Jin, Yier ; Maniatakos, Mihalis ; Makris, Yiorgos. / Exposing vulnerabilities of untrusted computing platforms. 2012 IEEE 30th International Conference on Computer Design, ICCD 2012. 2012. pp. 131-134
@inproceedings{3e3d38ea0b864692a182aba7e375e490,
title = "Exposing vulnerabilities of untrusted computing platforms",
abstract = "This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.",
author = "Yier Jin and Mihalis Maniatakos and Yiorgos Makris",
year = "2012",
month = "12",
day = "1",
doi = "10.1109/ICCD.2012.6378629",
language = "English (US)",
isbn = "9781467330503",
pages = "131--134",
booktitle = "2012 IEEE 30th International Conference on Computer Design, ICCD 2012",

}

TY - GEN

T1 - Exposing vulnerabilities of untrusted computing platforms

AU - Jin, Yier

AU - Maniatakos, Mihalis

AU - Makris, Yiorgos

PY - 2012/12/1

Y1 - 2012/12/1

N2 - This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

AB - This work seeks to expose the vulnerability of un-trusted computing platforms used in critical systems to hardware Trojans and combined hardware/software attacks. As part of our entry in the Cyber Security Awareness Week (CSAW) Embedded System Challenge hosted by NYU-Poly in 2011, we developed and presented 10 such processor-level hardware Trojans. These are split in five categories with various impacts, such as altering instruction memory, modifying the communication channel, stealing user information, changing interrupt handler location and RC-5 encryption algorithm checking of a medium complexity micro-processor (8051). Our work serves as a good starting point for researchers to develop Trojan detection and prevention methodologies on modern processor and to ensure trustworthiness of computing platforms.

UR - http://www.scopus.com/inward/record.url?scp=84872078170&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872078170&partnerID=8YFLogxK

U2 - 10.1109/ICCD.2012.6378629

DO - 10.1109/ICCD.2012.6378629

M3 - Conference contribution

AN - SCOPUS:84872078170

SN - 9781467330503

SP - 131

EP - 134

BT - 2012 IEEE 30th International Conference on Computer Design, ICCD 2012

ER -