2020
DOI: 10.1109/tvlsi.2019.2961358
|View full text |Cite
|
Sign up to set email alerts
|

HarTBleed: Using Hardware Trojans for Data Leakage Exploits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…In [44], authors present HarTBleed, a Trojan design embedded in a CPU that has a capacitor-based triggering circuit accompanied by a novel payload circuit. The Trojan is triggered when a pre-defined address of the L1 cache is accessed 1800 times.…”
Section: E Cpumentioning
confidence: 99%
“…In [44], authors present HarTBleed, a Trojan design embedded in a CPU that has a capacitor-based triggering circuit accompanied by a novel payload circuit. The Trojan is triggered when a pre-defined address of the L1 cache is accessed 1800 times.…”
Section: E Cpumentioning
confidence: 99%
“…In addition, it also must be admitted that the hardware system protections are not particularly comprehensive due to malicious attacks that may arise from different-level sources, mainly including hardware-level attack and system-level attack. As the hardware-level attack, a malicious logic (well-known as hardware Trojan) hidden in internal logic might be premeditatedly designed to cause the program execution failures at key points or could create the backdoors for both confidential information leakages and subsequent system hijacking to attackers [ 5 ]. On the other hand, the external physical attacks can exploit the three invasive methods of bus monitoring, offline analysis, and data tampering to steal the sensitive information and/or activate the built-in hardware Trojan to disorganize the program execution through external access interfaces [ 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%
“…In hardware-level attacks, hardware Trojan is a typical example which could be inserted into an internal logic and activated under a specific condition to cause the processor unintended behaviors or program execution failures. Especially, recent reports show that attackers are inserting the hardware Trojans into memories to leak and modify critical data [8,9], which further aggravates the security concerns of SoCs in security-critical applications. The softwarelevel attacks are mainly exploiting some vulnerabilities or bugs in programs to disturb instruction executions or perform other unintended actions, such as tampering program code or data and injecting malicious code.…”
Section: Introductionmentioning
confidence: 99%