liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
On Modeling and Detecting Trojans in Instruction Sets
School of Software Engineering, Tongji University, Shanghai, China.ORCID iD: 0000-0001-7887-6510
School of Software Engineering, Tongji University, Shanghai, China.ORCID iD: 0009-0007-4778-5457
School of Software Engineering, Tongji University, Shanghai, China.ORCID iD: 0009-0004-5501-0035
Linköping University, Department of Computer and Information Science, Software and Systems. Linköping University, Faculty of Science & Engineering.ORCID iD: 0000-0002-0440-4753
Show others and affiliations
2024 (English)In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, ISSN 0278-0070, E-ISSN 1937-4151, Vol. 43, no 10, p. 3226-3239Article in journal (Refereed) Published
Abstract [en]

Amid growing concerns about hardware security, comprehensive security testing has become essential for chip certification. This article proposes a deep-testing method for identifying Trojans of particular concern to middle-to-high-end users, with a focus on illegal instructions. A hidden instruction Trojan can employ a low-probability sequence of normal instructions as a boot sequence, which is followed by an illegal instruction that triggers the Trojan. This enables the Trojan to remain deeply hidden within the processor. It then exploits an intrusion mechanism to acquire Linux control authority by setting a hidden interrupt as its payload. We have developed an unbounded model checking (UMC) technique to uncover such Trojans. The proposed UMC technique has been optimized with slicing based on the input cone, head-point replacement, and backward implication. Our experimental results demonstrate that the presented instruction Trojans can survive detection by existing methods, thus allowing normal users to steal root user privileges and compromising the security of processors. Moreover, our proposed deep-testing method is empirically shown to be a powerful and effective approach for detecting these instruction Trojans.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC , 2024. Vol. 43, no 10, p. 3226-3239
Keywords [en]
Deep test for security, hidden instruction Trojan (HIT), unbounded model checking (UMC), VLSI test
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:liu:diva-207755DOI: 10.1109/tcad.2024.3389558ISI: 001319522900007OAI: oai:DiVA.org:liu-207755DiVA, id: diva2:1899760
Note

Funding Agencies|National Key Research and Development Program of China [2020YFB1600201]; National Natural Science Foundation of China (NSFC) [62374114, 62373206, 61974105, 62090024]; Zhejiang Laboratory [2021KC0AB01]

Available from: 2024-09-20 Created: 2024-09-20 Last updated: 2024-10-09

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Rezine, AhmedPeng, Zebo

Search in DiVA

By author/editor
Zhang, YingHe, AodiLi, JiayingRezine, AhmedPeng, ZeboLarsson, ErikJiang, JianhuiLi, Huawei
By organisation
Software and SystemsFaculty of Science & Engineering
In the same journal
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 95 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf