中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
On Modeling and Detecting Trojans in Instruction Sets

文献类型:期刊论文

作者Zhang, Ying2; He, Aodi2; Li, Jiaying2; Rezine, Ahmed1; Peng, Zebo1; Larsson, Erik3; Yang, Tao4; Jiang, Jianhui2; Li, Huawei5,6
刊名IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
出版日期2024-10-01
卷号43期号:10页码:3226-3239
关键词Trojan horses Security Program processors Companies Inspection Hardware security Reverse engineering Deep test for security hidden instruction Trojan (HIT) unbounded model checking (UMC) VLSI test
ISSN号0278-0070
DOI10.1109/TCAD.2024.3389558
英文摘要Amid growing concerns about hardware security, comprehensive security testing has become essential for chip certification. This article proposes a deep-testing method for identifying Trojans of particular concern to middle-to-high-end users, with a focus on illegal instructions. A hidden instruction Trojan can employ a low-probability sequence of normal instructions as a boot sequence, which is followed by an illegal instruction that triggers the Trojan. This enables the Trojan to remain deeply hidden within the processor. It then exploits an intrusion mechanism to acquire Linux control authority by setting a hidden interrupt as its payload. We have developed an unbounded model checking (UMC) technique to uncover such Trojans. The proposed UMC technique has been optimized with slicing based on the input cone, head-point replacement, and backward implication. Our experimental results demonstrate that the presented instruction Trojans can survive detection by existing methods, thus allowing normal users to steal root user privileges and compromising the security of processors. Moreover, our proposed deep-testing method is empirically shown to be a powerful and effective approach for detecting these instruction Trojans.
资助项目National Key Research and Development Program of China[2020YFB1600201] ; National Natural Science Foundation of China (NSFC)[62374114] ; National Natural Science Foundation of China (NSFC)[62373206] ; National Natural Science Foundation of China (NSFC)[61974105] ; National Natural Science Foundation of China (NSFC)[62090024] ; Zhejiang Laboratory[2021KC0AB01]
WOS研究方向Computer Science ; Engineering
语种英语
WOS记录号WOS:001319522900007
出版者IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
源URL[http://119.78.100.204/handle/2XEOYT63/39541]  
专题中国科学院计算技术研究所期刊论文_英文
通讯作者Li, Huawei
作者单位1.Linkoping Univ, Embedded Syst Lab, S-58183 Linkoping, Sweden
2.Tongji Univ, Sch Software Engn, Shanghai 201804, Peoples R China
3.Lund Univ, Elect & Informat Technol, S-22100 Lund, Sweden
4.Zhejiang Lab, Adv Comp Res Ctr, Hangzhou 311121, Zhejiang, Peoples R China
5.Chinese Acad Sci, SKLCA, Inst Comp Technol, Beijing, Peoples R China
6.Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing 100190, Peoples R China
推荐引用方式
GB/T 7714
Zhang, Ying,He, Aodi,Li, Jiaying,et al. On Modeling and Detecting Trojans in Instruction Sets[J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,2024,43(10):3226-3239.
APA Zhang, Ying.,He, Aodi.,Li, Jiaying.,Rezine, Ahmed.,Peng, Zebo.,...&Li, Huawei.(2024).On Modeling and Detecting Trojans in Instruction Sets.IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,43(10),3226-3239.
MLA Zhang, Ying,et al."On Modeling and Detecting Trojans in Instruction Sets".IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 43.10(2024):3226-3239.

入库方式: OAI收割

来源:计算技术研究所

浏览0
下载0
收藏0
其他版本

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。