Institute of Computing Technology, Chinese Academy IR
On Modeling and Detecting Trojans in Instruction Sets | |
Zhang, Ying1; He, Aodi1; Li, Jiaying1; Rezine, Ahmed2; Peng, Zebo2; Larsson, Erik3; Yang, Tao4; Jiang, Jianhui1; Li, Huawei5,6 | |
2024-10-01 | |
发表期刊 | IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS |
ISSN | 0278-0070 |
卷号 | 43期号:10页码:3226-3239 |
摘要 | Amid growing concerns about hardware security, comprehensive security testing has become essential for chip certification. This article proposes a deep-testing method for identifying Trojans of particular concern to middle-to-high-end users, with a focus on illegal instructions. A hidden instruction Trojan can employ a low-probability sequence of normal instructions as a boot sequence, which is followed by an illegal instruction that triggers the Trojan. This enables the Trojan to remain deeply hidden within the processor. It then exploits an intrusion mechanism to acquire Linux control authority by setting a hidden interrupt as its payload. We have developed an unbounded model checking (UMC) technique to uncover such Trojans. The proposed UMC technique has been optimized with slicing based on the input cone, head-point replacement, and backward implication. Our experimental results demonstrate that the presented instruction Trojans can survive detection by existing methods, thus allowing normal users to steal root user privileges and compromising the security of processors. Moreover, our proposed deep-testing method is empirically shown to be a powerful and effective approach for detecting these instruction Trojans. |
关键词 | Trojan horses Security Program processors Companies Inspection Hardware security Reverse engineering Deep test for security hidden instruction Trojan (HIT) unbounded model checking (UMC) VLSI test |
DOI | 10.1109/TCAD.2024.3389558 |
收录类别 | SCI |
语种 | 英语 |
资助项目 | National Key Research and Development Program of China[2020YFB1600201] ; National Natural Science Foundation of China (NSFC)[62374114] ; National Natural Science Foundation of China (NSFC)[62373206] ; National Natural Science Foundation of China (NSFC)[61974105] ; National Natural Science Foundation of China (NSFC)[62090024] ; Zhejiang Laboratory[2021KC0AB01] |
WOS研究方向 | Computer Science ; Engineering |
WOS类目 | Computer Science, Hardware & Architecture ; Computer Science, Interdisciplinary Applications ; Engineering, Electrical & Electronic |
WOS记录号 | WOS:001319522900007 |
出版者 | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC |
引用统计 | |
文献类型 | 期刊论文 |
条目标识符 | http://119.78.100.204/handle/2XEOYT63/39542 |
专题 | 中国科学院计算技术研究所期刊论文_英文 |
通讯作者 | Li, Huawei |
作者单位 | 1.Tongji Univ, Sch Software Engn, Shanghai 201804, Peoples R China 2.Linkoping Univ, Embedded Syst Lab, S-58183 Linkoping, Sweden 3.Lund Univ, Elect & Informat Technol, S-22100 Lund, Sweden 4.Zhejiang Lab, Adv Comp Res Ctr, Hangzhou 311121, Zhejiang, Peoples R China 5.Chinese Acad Sci, SKLCA, Inst Comp Technol, Beijing, Peoples R China 6.Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing 100190, Peoples R China |
推荐引用方式 GB/T 7714 | Zhang, Ying,He, Aodi,Li, Jiaying,et al. On Modeling and Detecting Trojans in Instruction Sets[J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,2024,43(10):3226-3239. |
APA | Zhang, Ying.,He, Aodi.,Li, Jiaying.,Rezine, Ahmed.,Peng, Zebo.,...&Li, Huawei.(2024).On Modeling and Detecting Trojans in Instruction Sets.IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,43(10),3226-3239. |
MLA | Zhang, Ying,et al."On Modeling and Detecting Trojans in Instruction Sets".IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 43.10(2024):3226-3239. |
条目包含的文件 | 条目无相关文件。 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论