DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Journal of Systems Architecture Année : 2022

DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN

Résumé

Hardware Trojan Horses (HTHs) represent today a serious issue not only for academy but also for industry because of the dramatic complexity and dangerousness attackers can count on. It has been shown that HTHs can be inserted in modern and complex microprocessors allowing the attacker to run malicious software, to acquire root privileges and to steal secret user information. In this paper we propose DETON, an automatic methodology for software manipulation aimed at introducing obfuscation in programs’ execution to protect microprocessor-based systems against information stealing HTHs. The high-level goal of DETON is to produce an obfuscated version of the program under protection in order to allow a trusted execution over a (possibly) untrusted CPU-based system. The obfuscated program will then be the one actually executed on the target hardware platform. DETON is fully integrated in the classical software design flow since it takes the output of the compiler, i.e., the assembly code of the program to be protected, and it produces a modified version of the assembly code which is in turn fully compatible with the underlying target HW platform. DETON aims at (i) reducing the amount of sensitive information exposed to the attacker by spreading it through microprocessor’s registers and by submerging it among garbage information, and (ii) reducing the time for which sensitive information is exposed to the attacker by scrambling data among microprocessor’s registers. We present a set of guidelines, requirements and metrics aimed at driving and assessing software obfuscation against always-on information-stealing HTHs and we then present the DETON framework. We assessed DETON on the Ariane version of the 64 bit RISC-V microprocessor running a set of real-world benchmark programs for embedded systems.

Fichier principal
Vignette du fichier
DETON.pdf (801.54 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03691634 , version 1 (09-06-2022)

Licence

Paternité - Pas d'utilisation commerciale

Identifiants

Citer

Luca Cassano, Mattia Iamundo, Tomas Antonio Lopez, Alessandro Nazzari, Giorgio Di Natale. DETON: DEfeating hardware Trojan horses in microprocessors through software ObfuscatioN. Journal of Systems Architecture, 2022, 129, pp.102592. ⟨10.1016/j.sysarc.2022.102592⟩. ⟨hal-03691634⟩

Collections

UGA CNRS TIMA
26 Consultations
526 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More