Detecting and thwarting hardware trojan attacks in cyber-physical systems
                                                                                                        | Title | Detecting and thwarting hardware trojan attacks in cyber-physical systems | 
| Publication Type | Conference Paper | 
| Year of Publication | 2016 | 
| Authors | Venugopalan, V., Patterson, C. D., Shila, D. M. | 
| Conference Name | 2016 IEEE Conference on Communications and Network Security (CNS) | 
| Date Published | oct | 
| Keywords | attack vector models, composability, counter-measure, cyber-physical system integrity, Cyber-physical systems, Design, diagnostics, embedded system, field programmable gate arrays, Hardware, hardware component, hardware security platform, hardware-only attack, invasive software, IP networks, isolated security primitives, Measurement, pubcrawl, reliability, Resiliency, security, security measures, smart grid application, Software component, software security, software-only attack, supervisory module, third-party soft IP cores, thwarting hardware trojan attacks, Trojan horses, Trust, trust enhancements, trust metric, trust specifications, Trusted Computing, trusted platform modules, verification | 
| Abstract | Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not provide the overall trust required in an embedded system. Trust enhancements are proposed to a hardware security platform, where the trust specifications are implemented in both software and hardware. This distribution of trust makes it difficult for a hardware-only or software-only attack to cripple the system. The proposed approach is applied to a smart grid application consisting of third-party soft IP cores, where an attack on this module can result in a blackout. System integrity is preserved in the event of an attack and the anomalous behavior of the IP core is recorded by a supervisory module. The IP core also provides a snapshot of its trust metric, which is logged for further diagnostics.  |  
| URL | http://ieeexplore.ieee.org/document/7860530/ | 
| DOI | 10.1109/CNS.2016.7860530 | 
| Citation Key | venugopalan_detecting_2016 | 
- thwarting hardware trojan attacks
 - Resiliency
 - security
 - security measures
 - smart grid application
 - Software component
 - software security
 - software-only attack
 - supervisory module
 - third-party soft IP cores
 - Reliability
 - Trojan horses
 - trust
 - trust enhancements
 - trust metric
 - trust specifications
 - Trusted Computing
 - trusted platform modules
 - verification
 - Hardware
 - composability
 - counter-measure
 - cyber-physical system integrity
 - cyber-physical systems
 - design
 - Diagnostics
 - Embedded System
 - field programmable gate arrays
 - attack vector models
 - hardware component
 - hardware security platform
 - hardware-only attack
 - invasive software
 - IP networks
 - isolated security primitives
 - Measurement
 - pubcrawl
 
