A CRISPR-Cas-Inspired Mechanism for Detecting Hardware Trojans in FPGA Devices

05/15/2020
by   Dillon Staub, et al.
0

Hardware security has risen in prominence in recent years with concerns stemming from a globalizing semiconductor supply chain and increased third-party IP (intellectual property) usage. Trojan detection is of paramount importance for ensuring systems with confidentiality, integrity, and availability. Existing methods for hardware Trojan detection in FPGA (field programmable gate array) devices include test-time methods, pre-implementation methods, and run-time methods. The first two methods provide effective ways of detecting some Trojans; however, Trojans may be specifically designed to avoid detection at test-time or before implementation making run-time detection a more attractive option. Run-time detection and removal of Trojans is highly desirable due to the wide range of critical systems which are deployed on FPGAs and may be difficult or costly to remove from operation. Many parallels can be drawn between hardware and natural systems, and one example creates an analogy between hardware attacks and biological attacks. We propose a CRISPR-Cas-inspired (clustered regularly interspaced palindromic repeats) method for detecting hardware Trojans in FPGAs. The fundamental concepts of the Type 1-E CRISPR-Cas mechanism are discussed and simulated to predict the flow of genetic information through this biological system. The basic structure of this system is utilized to propose a novel run-time Trojan detection method titled CADEFT (CRISPR-Cas-based Algorithm for DEtection of FPGA Trojans). Different levels of FPGA application design flow are explored, and CADEFT is proposed for realization at the bitstream level to monitor the configuration bitstream and the run-time properties of the FPGA. The flexibility of CADEFT originates in the CRISPR-Cas mechanism's ability to recognize similar albeit previously unseen patterns which may pose a threat to the system.

READ FULL TEXT

page 1

page 5

page 14

page 16

research
11/03/2017

Dynamic FPGA Detection and Protection of Hardware Trojan: A Comparative Analysis

Hardware Trojan detection and protection is becoming more crucial as mor...
research
03/07/2021

Comparative Analysis and Enhancement of CFG-based Hardware-Assisted CFI Schemes

Subverting the flow of instructions (e.g., by use of code-reuse attacks)...
research
09/22/2022

Trusted IP solution in multi-tenant cloud FPGA platform

Because FPGAs outperform traditional processing cores like CPUs and GPUs...
research
04/05/2023

FPGA-Patch: Mitigating Remote Side-Channel Attacks on FPGAs using Dynamic Patch Generation

We propose FPGA-Patch, the first-of-its-kind defense that leverages auto...
research
03/03/2023

Unsupervised Recycled FPGA Detection Using Symmetry Analysis

Recently, recycled field-programmable gate arrays (FPGAs) pose a signifi...
research
07/20/2020

A Deep Learning-Based FPGA Function Block Detection Method with Bitstream to Image Transformation

In the context of various application scenarios and/or for the sake of s...
research
08/06/2019

Topological Run-time Monitoring for Complex Systems

In this paper we introduce a new data-driven run-time monitoring system ...

Please sign up or login with your details

Forgot password? Click here to reset