Interacting with Hardware Trojans over a network

Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Pr...

Full description

Saved in:
Bibliographic Details
Published in:2012 IEEE International Symposium on Hardware-Oriented Security and Trust pp. 69 - 74
Main Authors: Farag, M. M., Lerner, L. W., Patterson, C. D.
Format: Conference Proceeding
Language:English
Published: IEEE 01-06-2012
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Previous research has focused on short-range interaction via side-channels and existing IC interfaces, while remote interaction with HTHs across wired computer networks has received less attention. Generalized and non-local HTH interaction can support attacks normally associated with software Trojans. We investigate remote communication with HTHs and provide partial methods to exploit vulnerabilities in media layers of the protocol stack. Specifically, we focus on covert communication over point-to-point physical links in 10 gigabit Ethernet (10GbE) networks by exploiting loose specifications in physical- and link-layer protocols. The developed HTHs are assessed in terms of resource overhead and achieved bit rate, and demonstrate the potential for establishing high bandwidth covert channels using lightweight implanted circuits. We also describe a PUF-based IC or IP tracking attack enabled by HTH interaction across a network.
AbstractList Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and intellectual property (IP). HTHs are stealthy in nature, and covert communication is their usual means of interaction and information transfer. Previous research has focused on short-range interaction via side-channels and existing IC interfaces, while remote interaction with HTHs across wired computer networks has received less attention. Generalized and non-local HTH interaction can support attacks normally associated with software Trojans. We investigate remote communication with HTHs and provide partial methods to exploit vulnerabilities in media layers of the protocol stack. Specifically, we focus on covert communication over point-to-point physical links in 10 gigabit Ethernet (10GbE) networks by exploiting loose specifications in physical- and link-layer protocols. The developed HTHs are assessed in terms of resource overhead and achieved bit rate, and demonstrate the potential for establishing high bandwidth covert channels using lightweight implanted circuits. We also describe a PUF-based IC or IP tracking attack enabled by HTH interaction across a network.
Author Patterson, C. D.
Farag, M. M.
Lerner, L. W.
Author_xml – sequence: 1
  givenname: M. M.
  surname: Farag
  fullname: Farag, M. M.
  email: mmorsy@vt.edu
  organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA
– sequence: 2
  givenname: L. W.
  surname: Lerner
  fullname: Lerner, L. W.
  email: lwl@vt.edu
  organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA
– sequence: 3
  givenname: C. D.
  surname: Patterson
  fullname: Patterson, C. D.
  email: cdp@vt.edu
  organization: Bradley Dept. of Electr. & Comput. Eng., Cyber at VT, Virginia Tech, Blacksburg, VA, USA
BookMark eNotj09Lw0AUxFdU0NbcBS_7BRLf_k32KEVNoeDBHLyVl-xbTdWNbILBb2-gncvM7zLDrNhFHCIxdiugEALcff3aFBKELKyUWkl1xlZC23JJyr2ds8yV1Ym1UFcsG8cDLCqNEEpeM9jGiRJ2Ux_f-dxPH7zG5GdMxJs0HDCOfPilxJFHmuYhfd6wy4BfI2UnX7Pm6bHZ1Pnu5Xm7edjlvYMpXzbROh8MKWfJocey6tAY2YkQvOnaoCl0BEFi672R4KGSoMHr1orKVmrN7o61PRHtf1L_jelvf_qo_gEQlkal
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HST.2012.6224323
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library Online
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library Online
  url: http://ieeexplore.ieee.org/Xplore/DynWel.jsp
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 146732339X
1467323403
9781467323406
9781467323390
EndPage 74
ExternalDocumentID 6224323
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-814a69df5e396e9ada78ca552c1ffd5cbf4efce0f2abdd520d082040d4b618683
IEDL.DBID RIE
ISBN 9781467323413
1467323411
IngestDate Wed Jun 26 19:24:01 EDT 2024
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-814a69df5e396e9ada78ca552c1ffd5cbf4efce0f2abdd520d082040d4b618683
PageCount 6
ParticipantIDs ieee_primary_6224323
PublicationCentury 2000
PublicationDate 2012-June
PublicationDateYYYYMMDD 2012-06-01
PublicationDate_xml – month: 06
  year: 2012
  text: 2012-June
PublicationDecade 2010
PublicationTitle 2012 IEEE International Symposium on Hardware-Oriented Security and Trust
PublicationTitleAbbrev HST
PublicationYear 2012
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000751132
Score 1.5611539
Snippet Hardware Trojan horses (HTHs) are emerging threats to integrated circuits (ICs) outsourced to a global supply chain or developed with untrusted tools and...
SourceID ieee
SourceType Publisher
StartPage 69
SubjectTerms Clocks
IP networks
Protocols
Receivers
Synchronization
Trojan horses
Title Interacting with Hardware Trojans over a network
URI https://ieeexplore.ieee.org/document/6224323
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwED3RTkyAWsRHQR4YSWs7n56hVSeE1AxslT_OCIYUlUb8fXxOWoTEwhZblhXbw7PfvXcHcGdKbbCQVWID9iSZVSbR2spEB2wS3pjw6CAqe7kqn16qxzmlybk_eGEQMYrPcEqfMZbvNrYlqmxWBLxJZTqAQamqzqt14FMC9FHR9OjdKsowKhNin9Kpb6f7MCVXs-WqJl2XnPZz_iquErFlcfK_vzqF8Y9Jjz0f4OcMjrAZAY8MH5kVmldGHCuj0PyX3iKrt5v3gEuMNJtMs6bTf4-hXszrh2XSF0VI3hTfEWOnC-V8jqkqUGmny8rqPJdWeO9ya3yG3iL3UhvncskdYXzGXWZiZvz0HIbNpsELYIYLq7wUVmIZLkXC2HB9qyxWRabT0H8JI1rs-qNLe7Hu13n1d_c1HNN-diqqCQx32xZvYPDp2tt4UN-fsY-Y
link.rule.ids 310,311,782,786,791,792,798,27934,54767
linkProvider IEEE
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV09T8MwFLRoGWAC1CK-8cBI2thx7HiGVkGUCqkZ2Cp_PCMYUlRa8fexnbQIiYUttiwrtoez7929h9CNFkoDp0ViPPYkzEidKGVoojw2Eae1f3QEKrucielLcT8KaXJut14YAIjiMxiEzxjLtwuzDlTZkHu8yWjWQbs5E1w0bq0to-LBL5RNj-4tLvw4RsgmqVPbzjaBylQOy1kVlF100M76q7xKRJfxwf_-6xD1f2x6-HkLQEdoB-oeSiPHF-wK9SsOLCsOwfkvtQRcLRfvHplwUG1ihetGAd5H1XhU3ZVJWxYheZPpKnB2ikvrcsgkB6msEoVReU4Ncc7mRjsGzkDqqNLW5jS1AeVZapmOufGzY9StFzWcIKxTYqSjxFAQ_lpEtPEXuMJAwZnKfP8p6oXFzj-axBfzdp1nf3dfo72yeprMJw_Tx3O0H_a20VRdoO5quYZL1Pm066t4aN9ofpLp
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2012+IEEE+International+Symposium+on+Hardware-Oriented+Security+and+Trust&rft.atitle=Interacting+with+Hardware+Trojans+over+a+network&rft.au=Farag%2C+M.+M.&rft.au=Lerner%2C+L.+W.&rft.au=Patterson%2C+C.+D.&rft.date=2012-06-01&rft.pub=IEEE&rft.isbn=9781467323413&rft.spage=69&rft.epage=74&rft_id=info:doi/10.1109%2FHST.2012.6224323&rft.externalDocID=6224323
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467323413/sc.gif&client=summon&freeimage=true