Hardware Trojans in Emerging Non-Volatile Memories

Mohammad Nasim Imtiaz Khan, Karthikeyan Nagarajan, Swaroop Ghosh
{"title":"Hardware Trojans in Emerging Non-Volatile Memories","authors":"Mohammad Nasim Imtiaz Khan, Karthikeyan Nagarajan, Swaroop Ghosh","doi":"10.23919/DATE.2019.8714843","DOIUrl":null,"url":null,"abstract":"Emerging Non-Volatile Memories (NVMs) possess unique characteristics that make them a top target for deploying Hardware Trojan. In this paper, we investigate such knobs that can be targeted by the Trojans to cause read/write failure. For example, NVM read operation depends on clamp voltage which the adversary can manipulate. Adversary can also use ground bounce generated in NVM write operation to hamper another parallel read/write operation. We have designed a Trojan that can be activated and deactivated by writing a specific data pattern to a particular address. Once activated, the Trojan can couple two predetermined addresses and data written to one address (victim’s address space) will get copied to another address (adversary’s address space). This will leak sensitive information e.g., encryption keys. Adversary can also create read/write failure to predetermined locations (fault injection). Simulation results indicate that the Trojan can be activated by writing a specific data pattern to a specific address for 1956 times. Once activated, the attack duration can be as low as 52.4μs and as high as 1.1ms (with reset-enable trigger). We also show that the proposed Trojan can scale down the clamp voltage by 400mV from optimum value which is sufficient to inject specific data-polarity read error. We also propose techniques to inject noise in the ground/power rail to cause read/write failure.","PeriodicalId":445778,"journal":{"name":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Design, Automation & Test in Europe Conference & Exhibition (DATE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/DATE.2019.8714843","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 17

Abstract

Emerging Non-Volatile Memories (NVMs) possess unique characteristics that make them a top target for deploying Hardware Trojan. In this paper, we investigate such knobs that can be targeted by the Trojans to cause read/write failure. For example, NVM read operation depends on clamp voltage which the adversary can manipulate. Adversary can also use ground bounce generated in NVM write operation to hamper another parallel read/write operation. We have designed a Trojan that can be activated and deactivated by writing a specific data pattern to a particular address. Once activated, the Trojan can couple two predetermined addresses and data written to one address (victim’s address space) will get copied to another address (adversary’s address space). This will leak sensitive information e.g., encryption keys. Adversary can also create read/write failure to predetermined locations (fault injection). Simulation results indicate that the Trojan can be activated by writing a specific data pattern to a specific address for 1956 times. Once activated, the attack duration can be as low as 52.4μs and as high as 1.1ms (with reset-enable trigger). We also show that the proposed Trojan can scale down the clamp voltage by 400mV from optimum value which is sufficient to inject specific data-polarity read error. We also propose techniques to inject noise in the ground/power rail to cause read/write failure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
新兴非易失性存储器中的硬件木马
新兴非易失性存储器(nvm)具有独特的特性,使其成为部署硬件木马的首选目标。在本文中,我们研究了这些旋钮,这些旋钮可以被木马攻击,导致读/写失败。例如,NVM读取操作依赖于对手可以操纵的箝位电压。攻击者还可以使用NVM写操作中产生的地面反弹来阻碍另一个并行读写操作。我们设计了一个特洛伊木马,它可以通过向特定地址写入特定数据模式来激活和停用。一旦激活,木马可以耦合两个预定的地址和数据写入一个地址(受害者的地址空间)将被复制到另一个地址(对手的地址空间)。这将泄露敏感信息,例如加密密钥。攻击者还可以在预定位置造成读/写故障(故障注入)。仿真结果表明,该木马可以通过将特定数据模式写入特定地址1956次来激活。一旦激活,攻击持续时间可低至52.4μs,高至1.1ms(具有复位触发)。我们还表明,所提出的木马可以将钳位电压从最佳值降低400mV,这足以注入特定的数据极性读取误差。我们还提出了在地/电源轨中注入噪声以导致读/写失败的技术。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On-the-fly and DAG-aware: Rewriting Boolean Networks with Exact Synthesis An Energy Efficient Non-Volatile Flip-Flop based on CoMET Technology Hardware Trojans in Emerging Non-Volatile Memories Chip Health Tracking Using Dynamic In-Situ Delay Monitoring Implementation-aware design of image-based control with on-line measurable variable-delay
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1