Interacting with Hardware Trojans over a network
Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Pr...
Saved in:
Published in: | 2012 IEEE International Symposium on Hardware-Oriented Security and Trust pp. 69 - 74 |
---|---|
Main Authors: | , , |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-06-2012
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Previous research has focused on short-range interaction via side-channels and existing IC interfaces, while remote interaction with HTHs across wired computer networks has received less attention. Generalized and non-local HTH interaction can support attacks normally associated with software Trojans. We investigate remote communication with HTHs and provide partial methods to exploit vulnerabilities in media layers of the protocol stack. Specifically, we focus on covert communication over point-to-point physical links in 10 gigabit Ethernet (10GbE) networks by exploiting loose specifications in physical- and link-layer protocols. The developed HTHs are assessed in terms of resource overhead and achieved bit rate, and demonstrate the potential for establishing high bandwidth covert channels using lightweight implanted circuits. We also describe a PUF-based IC or IP tracking attack enabled by HTH interaction across a network. |
---|---|
AbstractList | Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Previous research has focused on short-range interaction via side-channels and existing IC interfaces, while remote interaction with HTHs across wired computer networks has received less attention. Generalized and non-local HTH interaction can support attacks normally associated with software Trojans. We investigate remote communication with HTHs and provide partial methods to exploit vulnerabilities in media layers of the protocol stack. Specifically, we focus on covert communication over point-to-point physical links in 10 gigabit Ethernet (10GbE) networks by exploiting loose specifications in physical- and link-layer protocols. The developed HTHs are assessed in terms of resource overhead and achieved bit rate, and demonstrate the potential for establishing high bandwidth covert channels using lightweight implanted circuits. We also describe a PUF-based IC or IP tracking attack enabled by HTH interaction across a network. |
Author | Patterson, C. D. Farag, M. M. Lerner, L. W. |
Author_xml | – sequence: 1 givenname: M. M. surname: Farag fullname: Farag, M. M. email: mmorsy@vt.edu organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA – sequence: 2 givenname: L. W. surname: Lerner fullname: Lerner, L. W. email: lwl@vt.edu organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA – sequence: 3 givenname: C. D. surname: Patterson fullname: Patterson, C. D. email: cdp@vt.edu organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA |
BookMark | eNotj09Lw0AUxFdU0NbcBS_7BRLf_k32KEVNoeDBHLyVl-xbTdWNbILBb2-gncvM7zLDrNhFHCIxdiugEALcff3aFBKELKyUWkl1xlZC23JJyr2ds8yV1Ym1UFcsG8cDLCqNEEpeM9jGiRJ2Ux_f-dxPH7zG5GdMxJs0HDCOfPilxJFHmuYhfd6wy4BfI2UnX7Pm6bHZ1Pnu5Xm7edjlvYMpXzbROh8MKWfJocey6tAY2YkQvOnaoCl0BEFi672R4KGSoMHr1orKVmrN7o61PRHtf1L_jelvf_qo_gEQlkal |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/HST.2012.6224323 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library Online IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 146732339X 1467323403 9781467323406 9781467323390 |
EndPage | 74 |
ExternalDocumentID | 6224323 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-814a69df5e396e9ada78ca552c1ffd5cbf4efce0f2abdd520d082040d4b618683 |
IEDL.DBID | RIE |
ISBN | 9781467323413 1467323411 |
IngestDate | Wed Jun 26 19:24:01 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-814a69df5e396e9ada78ca552c1ffd5cbf4efce0f2abdd520d082040d4b618683 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6224323 |
PublicationCentury | 2000 |
PublicationDate | 2012-June |
PublicationDateYYYYMMDD | 2012-06-01 |
PublicationDate_xml | – month: 06 year: 2012 text: 2012-June |
PublicationDecade | 2010 |
PublicationTitle | 2012 IEEE International Symposium on Hardware-Oriented Security and Trust |
PublicationTitleAbbrev | HST |
PublicationYear | 2012 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000751132 |
Score | 1.5611539 |
Snippet | Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 69 |
SubjectTerms | Clocks IP networks Protocols Receivers Synchronization Trojan horses |
Title | Interacting with Hardware Trojans over a network |
URI | https://ieeexplore.ieee.org/document/6224323 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RTkyAWsRHQR4YSWs7n56hVSeE1AxslT_OCIYUlUb8fXxOWoTEwhZblhXbw7PfvXcHcGdKbbCQVWID9iSZVSbR2spEB2wS3pjw6CAqe7kqn16qxzmlybk_eGEQMYrPcEqfMZbvNrYlqmxWBLxJZTqAQamqzqt14FMC9FHR9OjdKsowKhNin9Kpb6f7MCVXs-WqJl2XnPZz_iquErFlcfK_vzqF8Y9Jjz0f4OcMjrAZAY8MH5kVmldGHCuj0PyX3iKrt5v3gEuMNJtMs6bTf4-hXszrh2XSF0VI3hTfEWOnC-V8jqkqUGmny8rqPJdWeO9ya3yG3iL3UhvncskdYXzGXWZiZvz0HIbNpsELYIYLq7wUVmIZLkXC2HB9qyxWRabT0H8JI1rs-qNLe7Hu13n1d_c1HNN-diqqCQx32xZvYPDp2tt4UN-fsY-Y |
link.rule.ids | 310,311,782,786,791,792,798,27934,54767 |
linkProvider | IEEE |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwFLRoGWAC1CK-8cBI2thx7HiGVkGUCqkZ2Cp_PCMYUlRa8fexnbQIiYUttiwrtoez7929h9CNFkoDp0ViPPYkzEidKGVoojw2Eae1f3QEKrucielLcT8KaXJut14YAIjiMxiEzxjLtwuzDlTZkHu8yWjWQbs5E1w0bq0to-LBL5RNj-4tLvw4RsgmqVPbzjaBylQOy1kVlF100M76q7xKRJfxwf_-6xD1f2x6-HkLQEdoB-oeSiPHF-wK9SsOLCsOwfkvtQRcLRfvHplwUG1ihetGAd5H1XhU3ZVJWxYheZPpKnB2ikvrcsgkB6msEoVReU4Ncc7mRjsGzkDqqNLW5jS1AeVZapmOufGzY9StFzWcIKxTYqSjxFAQ_lpEtPEXuMJAwZnKfP8p6oXFzj-axBfzdp1nf3dfo72yeprMJw_Tx3O0H_a20VRdoO5quYZL1Pm066t4aN9ofpLp |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+International+Symposium+on+Hardware-Oriented+Security+and+Trust&rft.atitle=Interacting+with+Hardware+Trojans+over+a+network&rft.au=Farag%2C+M.+M.&rft.au=Lerner%2C+L.+W.&rft.au=Patterson%2C+C.+D.&rft.date=2012-06-01&rft.pub=IEEE&rft.isbn=9781467323413&rft.spage=69&rft.epage=74&rft_id=info:doi/10.1109%2FHST.2012.6224323&rft.externalDocID=6224323 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/sc.gif&client=summon&freeimage=true |