Hardware Trojan Attack in Embedded Memory

被引:7
|
作者
Wang, Xinmu [1 ]
Hoque, Tamzidul [2 ]
Basak, Abhishek [3 ]
Karam, Robert [4 ]
Hu, Wei [1 ]
Qin, Maoyuan [1 ]
Mu, Dejun [1 ]
Bhunia, Swarup [5 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
[2] Univ Kansas, 2038 Eaton Hall, Lawrence, KS 66045 USA
[3] Intel Corp, Hillsboro, OR USA
[4] Univ S Florida, Tampa, FL 33620 USA
[5] Univ Florida, 968 Ctr Dr, Gainesville, FL 32611 USA
关键词
Hardware Trojan; SRAM array; SRAM fault; system-level attack; DIFFERENTIAL FAULT ATTACK; AES; VOLTAGE; DESIGN; TRUST; CACHE;
D O I
10.1145/3422353
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Static Random Access Memory (SRAM) is a core technology for building computing hardware, including cache memory, register files and field programmable gate array devices. Hence, SRAM reliability is essential to guarantee dependable computing. While significant research has been conducted to develop automated test algorithms for detecting manufacture-induced SRAM faults, they cannot ensure detection of faults deliberately implemented in the SRAM array by untrusted parties in the integrated circuit development flow. Indeed, such hardware Trojan attacks represent an emerging security threat. While a growing body of research addresses Trojan designs in logic circuits, little research has explored hardware Trojan attacks in embedded memory arrays [20]. In this article, we propose a new class of hardware Trojans targeting embedded SRAM arrays. The Trojans are designed to evade industry standard post-manufacturing tests while enabling attacks targeting various system hardware components during deployment. Transistor-level simulation results demonstrate minimal impact on SRAM power, performance, and stability while Trojans are not activated. We also prove the feasibility of Trojan insertion in foundries by showing the proposed layouts that preserve the SRAM cell footprint and incur zero silicon area overhead. Finally, we elaborate on several system-level attacks that can leverage these Trojans to compromise security and privacy.
引用
收藏
页数:28
相关论文
共 50 条
  • [1] Hardware Trojan Attacks in Embedded Memory
    Hoque, Tamzidul
    Wang, Xinmu
    Basak, Abhishek
    Karam, Robert
    Bhunia, Swamp
    2018 IEEE 36TH VLSI TEST SYMPOSIUM (VTS 2018), 2018,
  • [2] Ransomware Attack as Hardware Trojan: A Feasibility and Demonstration Study
    Almeida, Felipe
    Imran, Malik
    Raik, Jaan
    Pagliarini, Samuel
    IEEE ACCESS, 2022, 10 : 44827 - 44839
  • [3] A stealthy Hardware Trojan based on a Statistical Fault Attack
    Momin, Charles
    Bronchain, Olivier
    Standaert, Francois-Xavier
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (04): : 587 - 600
  • [4] HTree: Hardware Trojan Attack on Cache Resizing Policies
    Kumar, Atul
    Das, Shirshendu
    Subba, Basant
    IEEE EMBEDDED SYSTEMS LETTERS, 2024, 16 (03) : 263 - 266
  • [5] A stealthy Hardware Trojan based on a Statistical Fault Attack
    Charles Momin
    Olivier Bronchain
    François-Xavier Standaert
    Cryptography and Communications, 2021, 13 : 587 - 600
  • [6] A Hardware Trojan Embedded in the Inverse Widlar Reference Generator
    Cao, Xing
    Wang, Qianqian
    Geiger, Randall L.
    Chen, Degang J.
    2015 IEEE 58TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2015,
  • [7] Memory Trojan Attack on Neural Network Accelerators
    Zhao, Yang
    Hu, Xing
    Li, Shuangchen
    Ye, Jing
    Deng, Lei
    Ji, Yu
    Xu, Jianyu
    Wu, Dong
    Xie, Yuan
    2019 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2019, : 1415 - 1420
  • [8] Multiple fault attack on PRESENT with a hardware trojan implementation in FPGA
    Breier, Jakub
    He, Wei
    arXiv, 2017,
  • [9] Multiple Fault Attack on PRESENT with a Hardware Trojan Implementation in FPGA
    Breier, Jakub
    He, Wei
    2015 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT), 2015, : 58 - 64
  • [10] Cube Attack on a Trojan-Compromised Hardware Implementation of Ascon
    Halak, Basel
    Duarte-Sanchez, Jorge
    2020 IEEE 33RD INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2020, : 43 - 47