Run-time detection of hardware Trojans: The processor protection unit

Jeremy Dubeuf, David Hely, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Typical SOC designs use processors and therefore, trust in such processor cores is essential. The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans. We propose an approach to detect suspicious behavior of a processor and thus assess if the processor is trustworthy or not. A countermeasure, called Processor Protection Unit (PPU) is presented focusing on its design to be particularly resilient against hardware Trojan insertion.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 18th IEEE European Test Symposium, ETS 2013
DOIs
StatePublished - 2013
Event2013 18th IEEE European Test Symposium, ETS 2013 - Avignon, France
Duration: May 27 2013May 30 2013

Other

Other2013 18th IEEE European Test Symposium, ETS 2013
CountryFrance
CityAvignon
Period5/27/135/30/13

Fingerprint

Hardware
Embedded systems
Hardware security

Keywords

  • Hardware Trojan
  • secure processors
  • trusted hardware

ASJC Scopus subject areas

  • Software

Cite this

Dubeuf, J., Hely, D., & Karri, R. (2013). Run-time detection of hardware Trojans: The processor protection unit. In Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013 [6569378] https://doi.org/10.1109/ETS.2013.6569378

Run-time detection of hardware Trojans : The processor protection unit. / Dubeuf, Jeremy; Hely, David; Karri, Ramesh.

Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013. 2013. 6569378.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dubeuf, J, Hely, D & Karri, R 2013, Run-time detection of hardware Trojans: The processor protection unit. in Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013., 6569378, 2013 18th IEEE European Test Symposium, ETS 2013, Avignon, France, 5/27/13. https://doi.org/10.1109/ETS.2013.6569378
Dubeuf J, Hely D, Karri R. Run-time detection of hardware Trojans: The processor protection unit. In Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013. 2013. 6569378 https://doi.org/10.1109/ETS.2013.6569378
Dubeuf, Jeremy ; Hely, David ; Karri, Ramesh. / Run-time detection of hardware Trojans : The processor protection unit. Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013. 2013.
@inproceedings{51bb469628d14189a54fddb598dd9517,
title = "Run-time detection of hardware Trojans: The processor protection unit",
abstract = "Typical SOC designs use processors and therefore, trust in such processor cores is essential. The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans. We propose an approach to detect suspicious behavior of a processor and thus assess if the processor is trustworthy or not. A countermeasure, called Processor Protection Unit (PPU) is presented focusing on its design to be particularly resilient against hardware Trojan insertion.",
keywords = "Hardware Trojan, secure processors, trusted hardware",
author = "Jeremy Dubeuf and David Hely and Ramesh Karri",
year = "2013",
doi = "10.1109/ETS.2013.6569378",
language = "English (US)",
isbn = "9781467363778",
booktitle = "Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013",

}

TY - GEN

T1 - Run-time detection of hardware Trojans

T2 - The processor protection unit

AU - Dubeuf, Jeremy

AU - Hely, David

AU - Karri, Ramesh

PY - 2013

Y1 - 2013

N2 - Typical SOC designs use processors and therefore, trust in such processor cores is essential. The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans. We propose an approach to detect suspicious behavior of a processor and thus assess if the processor is trustworthy or not. A countermeasure, called Processor Protection Unit (PPU) is presented focusing on its design to be particularly resilient against hardware Trojan insertion.

AB - Typical SOC designs use processors and therefore, trust in such processor cores is essential. The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans. We propose an approach to detect suspicious behavior of a processor and thus assess if the processor is trustworthy or not. A countermeasure, called Processor Protection Unit (PPU) is presented focusing on its design to be particularly resilient against hardware Trojan insertion.

KW - Hardware Trojan

KW - secure processors

KW - trusted hardware

UR - http://www.scopus.com/inward/record.url?scp=84883345158&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883345158&partnerID=8YFLogxK

U2 - 10.1109/ETS.2013.6569378

DO - 10.1109/ETS.2013.6569378

M3 - Conference contribution

SN - 9781467363778

BT - Proceedings - 2013 18th IEEE European Test Symposium, ETS 2013

ER -