Publication: Control-Lock: Securing Processor Cores Against Software-Controlled Hardware Trojans
- Authors:
- Šišejković, D. , Merchant, F. , Leupers, R. , Ascheid, G. , Kegreiß, S.
- Journal:
- Great Lakes Symposium on VLSI (GLSVLSI'19)
- Date:
- May. 2019
- DOI:
- 10.1145/3299874.3317983
- hsb:
- RWTH-2019-07016
- Language:
- English
Abstract
Malicious circuit modifications known as hardware Trojans represent a rising threat to the integrated circuit supply chain. As many Trojans are activated based on a specific sequence of circuit states, we have recognized the ease of utilizing an instruction sequence for Trojan activation inside a processor core as a significant security issue. To protect against this threat, we propose Control-Lock: a novel methodology for securing inter-module control signals against software-controlled hardware Trojans, even if the signals are known to the adversary during fabrication. We demonstrate the approach with a RISC-V processor infected with a denial of service Trojan. We evaluate different Control-Lock encryption schemes with regards to the security-cost trade-off. Our results show that protecting a processor against a software-controlled hardware Trojan exploiting code execution implies an area overhead of only 4.75% as well as a negligible delay and power overhead.Download
BibTeX