Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation

Nianhang Hu, Mengmei Ye, Sheng Wei

Research output: Contribution to journalArticlepeer-review

16 Scopus citations

Abstract

This paper presents a hardware isolation mechanism to protect secret information in third party IP cores subject to hardware Trojan attacks. We first implement the hardware Trojan threat model in commonly used third party IP cores, such as multiplier and RSA, which leak confidential information from the hardware under rarely triggered conditions. Then, we develop a hardware isolation-based security mechanism to trap the leaked data in the isolated secure environment, which prevents the attacker from unauthorized access to the data in the normal operation mode. We implement both the threat model and defense approach on an Xilinx Zynq SoC equipped with ARM processor. Based on the real hardware prototype, we conduct security and performance evaluations and prove the effectiveness of the proposed approach.

Original languageEnglish (US)
Article number7805221
Pages (from-to)253-261
Number of pages9
JournalIEEE Transactions on Emerging Topics in Computing
Volume7
Issue number2
DOIs
StatePublished - 2019
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • Information Systems
  • Human-Computer Interaction
  • Computer Science Applications

Keywords

  • Hardware Trojan
  • hardware isolation
  • information leakage

Fingerprint

Dive into the research topics of 'Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation'. Together they form a unique fingerprint.

Cite this