Visible to the public Detecting and thwarting hardware trojan attacks in cyber-physical systems

TitleDetecting and thwarting hardware trojan attacks in cyber-physical systems
Publication TypeConference Paper
Year of Publication2016
AuthorsVenugopalan, V., Patterson, C. D., Shila, D. M.
Conference Name2016 IEEE Conference on Communications and Network Security (CNS)
Date Publishedoct
Keywordsattack vector models, composability, counter-measure, cyber-physical system integrity, Cyber-physical systems, Design, diagnostics, embedded system, field programmable gate arrays, Hardware, hardware component, hardware security platform, hardware-only attack, invasive software, IP networks, isolated security primitives, Measurement, pubcrawl, reliability, Resiliency, security, security measures, smart grid application, Software component, software security, software-only attack, supervisory module, third-party soft IP cores, thwarting hardware trojan attacks, Trojan horses, Trust, trust enhancements, trust metric, trust specifications, Trusted Computing, trusted platform modules, verification

Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not provide the overall trust required in an embedded system. Trust enhancements are proposed to a hardware security platform, where the trust specifications are implemented in both software and hardware. This distribution of trust makes it difficult for a hardware-only or software-only attack to cripple the system. The proposed approach is applied to a smart grid application consisting of third-party soft IP cores, where an attack on this module can result in a blackout. System integrity is preserved in the event of an attack and the anomalous behavior of the IP core is recorded by a supervisory module. The IP core also provides a snapshot of its trust metric, which is logged for further diagnostics.

Citation Keyvenugopalan_detecting_2016