Detecting and thwarting hardware trojan attacks in cyber-physical systems
Title | Detecting and thwarting hardware trojan attacks in cyber-physical systems |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Venugopalan, V., Patterson, C. D., Shila, D. M. |
Conference Name | 2016 IEEE Conference on Communications and Network Security (CNS) |
Date Published | oct |
Keywords | attack vector models, composability, counter-measure, cyber-physical system integrity, Cyber-physical systems, Design, diagnostics, embedded system, field programmable gate arrays, Hardware, hardware component, hardware security platform, hardware-only attack, invasive software, IP networks, isolated security primitives, Measurement, pubcrawl, reliability, Resiliency, security, security measures, smart grid application, Software component, software security, software-only attack, supervisory module, third-party soft IP cores, thwarting hardware trojan attacks, Trojan horses, Trust, trust enhancements, trust metric, trust specifications, Trusted Computing, trusted platform modules, verification |
Abstract | Cyber-physical system integrity requires both hardware and software security. Many of the cyber attacks are successful as they are designed to selectively target a specific hardware or software component in an embedded system and trigger its failure. Existing security measures also use attack vector models and isolate the malicious component as a counter-measure. Isolated security primitives do not provide the overall trust required in an embedded system. Trust enhancements are proposed to a hardware security platform, where the trust specifications are implemented in both software and hardware. This distribution of trust makes it difficult for a hardware-only or software-only attack to cripple the system. The proposed approach is applied to a smart grid application consisting of third-party soft IP cores, where an attack on this module can result in a blackout. System integrity is preserved in the event of an attack and the anomalous behavior of the IP core is recorded by a supervisory module. The IP core also provides a snapshot of its trust metric, which is logged for further diagnostics. |
URL | http://ieeexplore.ieee.org/document/7860530/ |
DOI | 10.1109/CNS.2016.7860530 |
Citation Key | venugopalan_detecting_2016 |
- thwarting hardware trojan attacks
- Resiliency
- security
- security measures
- smart grid application
- Software component
- software security
- software-only attack
- supervisory module
- third-party soft IP cores
- Reliability
- Trojan horses
- trust
- trust enhancements
- trust metric
- trust specifications
- Trusted Computing
- trusted platform modules
- verification
- Hardware
- composability
- counter-measure
- cyber-physical system integrity
- cyber-physical systems
- design
- Diagnostics
- Embedded System
- field programmable gate arrays
- attack vector models
- hardware component
- hardware security platform
- hardware-only attack
- invasive software
- IP networks
- isolated security primitives
- Measurement
- pubcrawl