TY - GEN
T1 - Defense against on-Chip Trojans Enabling Traffic Analysis Attacks
AU - Meraj Ahmed, M.
AU - Dhavlle, Abhijitt
AU - Mansoor, Naseef
AU - Sutradhar, Purab
AU - Pudukotai Dinakarrao, Sai Manoj
AU - Basu, Kanad
AU - Ganguly, Amlan
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/12/15
Y1 - 2020/12/15
N2 - Interconnection networks for multi/many-core processors or server systems are the backbone of the system as they enable data communication among the processing cores, caches, memory and other peripherals. Given the criticality of the interconnects, the system can be severely subverted if the interconnection is compromised. The threat of Hardware Trojans (HTs) penetrating complex hardware systems such as multi/many-core processors are increasing due to the increasing presence of third party players in a System-on-chip (SoC) design. Even by deploying naïve HTs, an adversary can exploit the Network-on-Chip (NoC) backbone of the processor and get access to communication patterns in the system. This information, if leaked to an attacker, can reveal important insights regarding the application suites running on the system; thereby compromising the user privacy and paving the way for more severe attacks on the entire system. In this paper, we demonstrate that one or more HTs embedded in the NoC of a multi/many-core processor is capable of leaking sensitive information regarding traffic patterns to an external malicious attacker; who, in turn, can analyze the HT payload data with machine learning techniques to infer the applications running on the processor. Furthermore, to protect against such attacks, we propose a Simulated Annealing-based randomized routing algorithm in the system. The proposed defense is capable of obfuscating the attacker's data processing capabilities to infer the user profiles successfully. Our experimental results demonstrate that the proposed randomized routing algorithm could reduce the accuracy of identifying user profiles by the attacker from >98% to <15% in multi/many-core systems.
AB - Interconnection networks for multi/many-core processors or server systems are the backbone of the system as they enable data communication among the processing cores, caches, memory and other peripherals. Given the criticality of the interconnects, the system can be severely subverted if the interconnection is compromised. The threat of Hardware Trojans (HTs) penetrating complex hardware systems such as multi/many-core processors are increasing due to the increasing presence of third party players in a System-on-chip (SoC) design. Even by deploying naïve HTs, an adversary can exploit the Network-on-Chip (NoC) backbone of the processor and get access to communication patterns in the system. This information, if leaked to an attacker, can reveal important insights regarding the application suites running on the system; thereby compromising the user privacy and paving the way for more severe attacks on the entire system. In this paper, we demonstrate that one or more HTs embedded in the NoC of a multi/many-core processor is capable of leaking sensitive information regarding traffic patterns to an external malicious attacker; who, in turn, can analyze the HT payload data with machine learning techniques to infer the applications running on the processor. Furthermore, to protect against such attacks, we propose a Simulated Annealing-based randomized routing algorithm in the system. The proposed defense is capable of obfuscating the attacker's data processing capabilities to infer the user profiles successfully. Our experimental results demonstrate that the proposed randomized routing algorithm could reduce the accuracy of identifying user profiles by the attacker from >98% to <15% in multi/many-core systems.
KW - hardware trojan
KW - NoC
KW - obfuscation
KW - routineg
UR - http://www.scopus.com/inward/record.url?scp=85102514963&partnerID=8YFLogxK
U2 - 10.1109/AsianHOST51057.2020.9358250
DO - 10.1109/AsianHOST51057.2020.9358250
M3 - Conference contribution
AN - SCOPUS:85102514963
T3 - Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020
BT - Proceedings of the 2020 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2020 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2020
Y2 - 15 December 2020 through 17 December 2020
ER -