Run-time detection of hardware Trojans: The processor protection unit

Jeremy Dubeuf, David Hely, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Typical SOC designs use processors and therefore, trust in such processor cores is essential. The 2011 Embedded Systems Challenge (ESC 2011) [1] showed a wide range of possibilities to attack a processor through hardware Trojans. We propose an approach to detect suspicious behavior of a processor and thus assess if the processor is trustworthy or not. A countermeasure, called Processor Protection Unit (PPU) is presented focusing on its design to be particularly resilient against hardware Trojan insertion.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 18th IEEE European Test Symposium, ETS 2013
DOIs
StatePublished - 2013
Event2013 18th IEEE European Test Symposium, ETS 2013 - Avignon, France
Duration: May 27 2013May 30 2013

Publication series

NameProceedings - 2013 18th IEEE European Test Symposium, ETS 2013

Other

Other2013 18th IEEE European Test Symposium, ETS 2013
Country/TerritoryFrance
CityAvignon
Period5/27/135/30/13

Keywords

  • Hardware Trojan
  • secure processors
  • trusted hardware

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Run-time detection of hardware Trojans: The processor protection unit'. Together they form a unique fingerprint.

Cite this