Time-Related Hardware Trojan Attacks on Processor Cores

碩士 === 國立成功大學 === 電機工程學系 === 107 === This thesis presents two hardware Trojan designs that employ time information as a trigger condition based on the understanding of the time maintenance and update mechanism on a modern system. One is a real-time based Trojan, which will attack a system at some sp...

Full description

Bibliographic Details
Main Authors: Man-HsuanKuo, 郭蔓萱
Other Authors: Kuen-Jong Lee
Format: Others
Language:en_US
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/5ea6rz
id ndltd-TW-107NCKU5442206
record_format oai_dc
spelling ndltd-TW-107NCKU54422062019-10-26T06:24:19Z http://ndltd.ncl.edu.tw/handle/5ea6rz Time-Related Hardware Trojan Attacks on Processor Cores 處理器中利用時間相關訊號觸發之硬體木馬設計 Man-HsuanKuo 郭蔓萱 碩士 國立成功大學 電機工程學系 107 This thesis presents two hardware Trojan designs that employ time information as a trigger condition based on the understanding of the time maintenance and update mechanism on a modern system. One is a real-time based Trojan, which will attack a system at some specific real-world time. The other is a relative-time based Trojan, which will be triggered when a specific time passes after the system is powered on. In either case, when a hardware Trojan is triggered, its payload circuit will corrupt the system or leakage internal confidential information to the attackers. In addition, this thesis also presents a hardware design scheme, which allows the trigger condition to be programmed after the chip is manufactured. The proposed time-related hardware Trojans have been inserted into an open-source processor and some of the current Trojan detection methods have been used to evaluate the effectiveness of the time-related hardware Trojans. Moreover, we implement the time- related hardware Trojans in the FPGA boards to demonstrate the attack effect. Experimental results show that the extra delay, area and power consumption are very small. In addition, we also use commercial verification tools and Trojan feature extraction detection technology to evaluate the presented hardware Trojans. Analysis results show that the above methods are not effective or additional test assertions are needed to detect the presented Trojan designs. Kuen-Jong Lee 李昆忠 2019 學位論文 ; thesis 44 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電機工程學系 === 107 === This thesis presents two hardware Trojan designs that employ time information as a trigger condition based on the understanding of the time maintenance and update mechanism on a modern system. One is a real-time based Trojan, which will attack a system at some specific real-world time. The other is a relative-time based Trojan, which will be triggered when a specific time passes after the system is powered on. In either case, when a hardware Trojan is triggered, its payload circuit will corrupt the system or leakage internal confidential information to the attackers. In addition, this thesis also presents a hardware design scheme, which allows the trigger condition to be programmed after the chip is manufactured. The proposed time-related hardware Trojans have been inserted into an open-source processor and some of the current Trojan detection methods have been used to evaluate the effectiveness of the time-related hardware Trojans. Moreover, we implement the time- related hardware Trojans in the FPGA boards to demonstrate the attack effect. Experimental results show that the extra delay, area and power consumption are very small. In addition, we also use commercial verification tools and Trojan feature extraction detection technology to evaluate the presented hardware Trojans. Analysis results show that the above methods are not effective or additional test assertions are needed to detect the presented Trojan designs.
author2 Kuen-Jong Lee
author_facet Kuen-Jong Lee
Man-HsuanKuo
郭蔓萱
author Man-HsuanKuo
郭蔓萱
spellingShingle Man-HsuanKuo
郭蔓萱
Time-Related Hardware Trojan Attacks on Processor Cores
author_sort Man-HsuanKuo
title Time-Related Hardware Trojan Attacks on Processor Cores
title_short Time-Related Hardware Trojan Attacks on Processor Cores
title_full Time-Related Hardware Trojan Attacks on Processor Cores
title_fullStr Time-Related Hardware Trojan Attacks on Processor Cores
title_full_unstemmed Time-Related Hardware Trojan Attacks on Processor Cores
title_sort time-related hardware trojan attacks on processor cores
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/5ea6rz
work_keys_str_mv AT manhsuankuo timerelatedhardwaretrojanattacksonprocessorcores
AT guōmànxuān timerelatedhardwaretrojanattacksonprocessorcores
AT manhsuankuo chùlǐqìzhōnglìyòngshíjiānxiāngguānxùnhàochùfāzhīyìngtǐmùmǎshèjì
AT guōmànxuān chùlǐqìzhōnglìyòngshíjiānxiāngguānxùnhàochùfāzhīyìngtǐmùmǎshèjì
_version_ 1719279490031419392