2012 Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE) 2012
DOI: 10.1109/date.2012.6176642
|View full text |Cite
|
Sign up to set email alerts
|

SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware

Abstract: Ensuring electronic components are free from Hardware Trojans is a very difficult task. Research suggests that even the best pre-and post-deployment detection mechanisms will not discover all malicious inclusions, nor prevent them from being activated. For economic reasons electronic components are used regardless of the possible presence of such Trojans.We developed the SAFER PATH architecture, which uses instruction and data fragmentation, program replication, and voting to create a computational system that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(27 citation statements)
references
References 14 publications
0
27
0
Order By: Relevance
“…With more than two IP cores, a voting protocol can determine which output to select in case of disagreement. Beaumont et al [2] pioneered this approach, along with fragmented execution to limit access to code and data. We use a similar scheme as the prior work, except we limit replication to the outer-most cryptographic modules used in onion-encryption, which we suggest is sufficient for ensuring confidentiality.…”
Section: R Replicationmentioning
confidence: 99%
See 1 more Smart Citation
“…With more than two IP cores, a voting protocol can determine which output to select in case of disagreement. Beaumont et al [2] pioneered this approach, along with fragmented execution to limit access to code and data. We use a similar scheme as the prior work, except we limit replication to the outer-most cryptographic modules used in onion-encryption, which we suggest is sufficient for ensuring confidentiality.…”
Section: R Replicationmentioning
confidence: 99%
“…Waksman and Sethumadhavan [4] use cryptography at the granularity of functional units in a processor to defend against value-triggered Trojans, but only against the untrusted designer. Replication using functionally-equivalent variants was first proposed by McIntyre et al [5] at the software-level to detect hardware Trojans, and Beaumont et al [2] propose an architectural solution using replication, voting, and fragmented execution. These works focus on untrusted design, and attacks from untrusted foundry or end-user void security guarantees.…”
Section: Related Workmentioning
confidence: 99%
“…In [14], a trojan detection and prevention scheme is proposed for homogeneous systems. Each program is partitioned into segments and redundantly executed on three or more cores, aiming at limiting the data access capability of each core.…”
Section: Related Workmentioning
confidence: 99%
“…In this paper, we propose a securitydriven MPSoC task scheduling technique to account for the untrustworthiness of the 3PIP cores. Comparing to existing trojan detection and prevention techniques [6], [7], [8], our main contribution is the incorporation of diversity into MPSoC task schedules. As multiple copies of the same 3PIP may be instantiated in the target MPSoC, diversity is essential to reduce false negatives: on one hand it prevents two copies of a task from producing the same incorrect outputs, and on the other hand it isolates potential trojans, preventing them from sending triggering messages through undesired communication paths.…”
Section: Introductionmentioning
confidence: 99%