Real-Time Detection Of Hardware Trojan Attacks On General-Purpose Registers In A Risc-V Processor

IEICE ELECTRONICS EXPRESS(2021)

引用 2|浏览3
暂无评分
摘要
Hardware trojans(HT) is one of the main threats for hardware security, especially attacks on General-Purpose Registers(GPRs) of processors. This paper presented a novel method to detect HT induced attacks by comparing the states of GPRs with an embedded reference model in real time. Firstly, the instruction sequence was realigned with four principles. Secondly, based on the realigned instruction stream, a reference model for GPRs was built. Finally, HT induced attacks on GPRs can be detected by comparing the expected GPRs' state from the reference model with the sampled GPRs' state from processors. We integrated this method into a RISC-V core of PULpino and investigated the feasibility with different programs. The experimental results showed that all the randomly inserted HT attacks can be detected in real time with the latency of two clock cycles.
更多
查看译文
关键词
hardware trojan, GPRs, instruction sets, hardware security, RISC-V
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要