论文标题

董事会级特洛伊木马基准测试的自动框架

An Automated Framework for Board-level Trojan Benchmarking

论文作者

Hoque, Tamzidul, Yang, Shuo, Bhattacharyay, Aritra, Cruz, Jonathan, Bhunia, Swarup

论文摘要

经济和运营优势已导致印刷电路板(PCB)的供应链结合了各种不受信任的实体。任何不受信任的实体都能够引入恶意改变,以促进现场操作期间的功能故障或泄漏秘密信息的泄漏。尽管研究人员一直在调查单个微电子组件规模内恶意修改的威胁,但基本上尚未探索董事会级恶意操纵的可能性。在缺乏标准基准解决方案的情况下,PCB信任保证的预期对策可能会利用攻击的本土代表,这些攻击破坏了他们的评估,并且不提供与其他技术进行比较的范围。在本文中,我们开发了有史以来的第一个基准解决方案,以促进对适用于PCB信托保证的对策的公正和可比评估。基于针对PCB级变更的分类法,我们开发了高级特洛伊木马模型。从这些模型中,我们生成了一个自定义的董事会级特洛伊木马设计,具有多样化的复杂性和功能。我们还开发了一种工具流,用于自动将这些特洛伊木马插入各种PCB设计中,并生成Trojan基准测试(即使用Trojan的PCB设计)。基于工具的特洛伊木马插入促进了针对大量各种特洛伊木马实施以及数据挖掘的信任验证的全面评估。最后,通过制造PCB的实验测量,我们分析了特洛伊木马设计的隐身性。

Economic and operational advantages have led the supply chain of printed circuit boards (PCBs) to incorporate various untrusted entities. Any of the untrusted entities are capable of introducing malicious alterations to facilitate a functional failure or leakage of secret information during field operation. While researchers have been investigating the threat of malicious modification within the scale of individual microelectronic components, the possibility of a board-level malicious manipulation has essentially been unexplored. In the absence of standard benchmarking solutions, prospective countermeasures for PCB trust assurance are likely to utilize homegrown representation of the attacks that undermines their evaluation and does not provide scope for comparison with other techniques. In this paper, we have developed the first-ever benchmarking solution to facilitate an unbiased and comparable evaluation of countermeasures applicable to PCB trust assurance. Based on a taxonomy tailored for PCB-level alterations, we have developed high-level Trojan models. From these models, we have generated a custom pool of board-level Trojan designs of varied complexity and functionality. We have also developed a tool-flow for automatically inserting these Trojans into various PCB designs and generate the Trojan benchmarks (i.e., PCB designs with Trojan). The tool-based Trojan insertion facilitate a comprehensive evaluation against large number of diverse Trojan implementations and application of data mining for trust verification. Finally, with experimental measurements from a fabricated PCB, we analyze the stealthiness of the Trojan designs.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源