Detecting Hardware Trojans in Microprocessors via Hardware Error Correction Code-based Modules
By: Alessandro Palumbo, Ruben Salvador
Potential Business Impact:
Finds hidden computer bugs that steal secrets.
Software-exploitable Hardware Trojans (HTs) enable attackers to execute unauthorized software or gain illicit access to privileged operations. This manuscript introduces a hardware-based methodology for detecting runtime HT activations using Error Correction Codes (ECCs) on a RISC-V microprocessor. Specifically, it focuses on HTs that inject malicious instructions, disrupting the normal execution flow by triggering unauthorized programs. To counter this threat, the manuscript introduces a Hardware Security Checker (HSC) leveraging Hamming Single Error Correction (HSEC) architectures for effective HT detection. Experimental results demonstrate that the proposed solution achieves a 100% detection rate for potential HT activations, with no false positives or undetected attacks. The implementation incurs minimal overhead, requiring only 72 #LUTs, 24 #FFs, and 0.5 #BRAM while maintaining the microprocessor's original operating frequency and introducing no additional time delay.
Similar Papers
Automated Hardware Trojan Insertion in Industrial-Scale Designs
Cryptography and Security
Creates fake computer bugs to test security.
TrojanLoC: LLM-based Framework for RTL Trojan Localization
Cryptography and Security
Finds hidden bad code in computer chips.
LibIHT: A Hardware-Based Approach to Efficient and Evasion-Resistant Dynamic Binary Analysis
Cryptography and Security
Finds hidden computer viruses without slowing them down.