CSpace  > 中国科学院计算技术研究所期刊论文  > 英文
On Modeling and Detecting Trojans in Instruction Sets
Zhang, Ying1; He, Aodi1; Li, Jiaying1; Rezine, Ahmed2; Peng, Zebo2; Larsson, Erik3; Yang, Tao4; Jiang, Jianhui1; Li, Huawei5,6
2024-10-01
发表期刊IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS
ISSN0278-0070
卷号43期号:10页码:3226-3239
摘要Amid growing concerns about hardware security, comprehensive security testing has become essential for chip certification. This article proposes a deep-testing method for identifying Trojans of particular concern to middle-to-high-end users, with a focus on illegal instructions. A hidden instruction Trojan can employ a low-probability sequence of normal instructions as a boot sequence, which is followed by an illegal instruction that triggers the Trojan. This enables the Trojan to remain deeply hidden within the processor. It then exploits an intrusion mechanism to acquire Linux control authority by setting a hidden interrupt as its payload. We have developed an unbounded model checking (UMC) technique to uncover such Trojans. The proposed UMC technique has been optimized with slicing based on the input cone, head-point replacement, and backward implication. Our experimental results demonstrate that the presented instruction Trojans can survive detection by existing methods, thus allowing normal users to steal root user privileges and compromising the security of processors. Moreover, our proposed deep-testing method is empirically shown to be a powerful and effective approach for detecting these instruction Trojans.
关键词Trojan horses Security Program processors Companies Inspection Hardware security Reverse engineering Deep test for security hidden instruction Trojan (HIT) unbounded model checking (UMC) VLSI test
DOI10.1109/TCAD.2024.3389558
收录类别SCI
语种英语
资助项目National Key Research and Development Program of China[2020YFB1600201] ; National Natural Science Foundation of China (NSFC)[62374114] ; National Natural Science Foundation of China (NSFC)[62373206] ; National Natural Science Foundation of China (NSFC)[61974105] ; National Natural Science Foundation of China (NSFC)[62090024] ; Zhejiang Laboratory[2021KC0AB01]
WOS研究方向Computer Science ; Engineering
WOS类目Computer Science, Hardware & Architecture ; Computer Science, Interdisciplinary Applications ; Engineering, Electrical & Electronic
WOS记录号WOS:001319522900007
出版者IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
引用统计
文献类型期刊论文
条目标识符http://119.78.100.204/handle/2XEOYT63/39542
专题中国科学院计算技术研究所期刊论文_英文
通讯作者Li, Huawei
作者单位1.Tongji Univ, Sch Software Engn, Shanghai 201804, Peoples R China
2.Linkoping Univ, Embedded Syst Lab, S-58183 Linkoping, Sweden
3.Lund Univ, Elect & Informat Technol, S-22100 Lund, Sweden
4.Zhejiang Lab, Adv Comp Res Ctr, Hangzhou 311121, Zhejiang, Peoples R China
5.Chinese Acad Sci, SKLCA, Inst Comp Technol, Beijing, Peoples R China
6.Univ Chinese Acad Sci, Sch Comp Sci & Technol, Beijing 100190, Peoples R China
推荐引用方式
GB/T 7714
Zhang, Ying,He, Aodi,Li, Jiaying,et al. On Modeling and Detecting Trojans in Instruction Sets[J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,2024,43(10):3226-3239.
APA Zhang, Ying.,He, Aodi.,Li, Jiaying.,Rezine, Ahmed.,Peng, Zebo.,...&Li, Huawei.(2024).On Modeling and Detecting Trojans in Instruction Sets.IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS,43(10),3226-3239.
MLA Zhang, Ying,et al."On Modeling and Detecting Trojans in Instruction Sets".IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 43.10(2024):3226-3239.
条目包含的文件
条目无相关文件。
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Zhang, Ying]的文章
[He, Aodi]的文章
[Li, Jiaying]的文章
百度学术
百度学术中相似的文章
[Zhang, Ying]的文章
[He, Aodi]的文章
[Li, Jiaying]的文章
必应学术
必应学术中相似的文章
[Zhang, Ying]的文章
[He, Aodi]的文章
[Li, Jiaying]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。