On a new hardware Trojan attack on power budgeting of many core systems
On a new hardware Trojan attack on power budgeting of many core systems
In this paper, we study stealthy false-data attacks that exploit the vulnerabilities of power budgeting scheme in NoC, which can cause catastrophic denial of service (DoS) effects. Essentially, when a power budget request packet is routed through a Trojan-infected network-on-chip node's router, the power budget request can be unknowingly modified. The global manager then tends to make really bad power budget allocation decisions with all the tampered power requests it received. That is, legitimate applications will be victimized with lower power budgets than what they initially asked for, and thus, could suffer serious performance degradation; malicious applications, on the other hand, may be entitled to high power budgets and thus see performance boost that they do not deserve. Our study has shown that this new type of DoS attack can be initiated and sustained by a simple hardware Trojan (HT) circuit that is extremely hard to be detected. The effects of this new DoS attack are simulated using a network model, and all the major parameters and factors that impact the attack effects are identified and quantified.
Hardware Trojan, power budgeting
90-95
Zhao, Yiming
82ea0726-8b2b-452a-b4d7-6f99e0273385
Wang, Xiaohang
95ffd2f0-3e1f-4cbe-8067-b600d6a08f75
Jiang, Yingtao
4d583f6f-1706-4732-9a66-9cc2eb803464
Mei, Yang
13de5068-c3f9-4dab-bf88-cf484f5efa51
Singh, Amit Kumar
bb67d43e-34d9-4b58-9295-8b5458270408
Mak, Terrence
0f90ac88-f035-4f92-a62a-7eb92406ea53
17 January 2019
Zhao, Yiming
82ea0726-8b2b-452a-b4d7-6f99e0273385
Wang, Xiaohang
95ffd2f0-3e1f-4cbe-8067-b600d6a08f75
Jiang, Yingtao
4d583f6f-1706-4732-9a66-9cc2eb803464
Mei, Yang
13de5068-c3f9-4dab-bf88-cf484f5efa51
Singh, Amit Kumar
bb67d43e-34d9-4b58-9295-8b5458270408
Mak, Terrence
0f90ac88-f035-4f92-a62a-7eb92406ea53
Zhao, Yiming, Wang, Xiaohang, Jiang, Yingtao, Mei, Yang, Singh, Amit Kumar and Mak, Terrence
(2019)
On a new hardware Trojan attack on power budgeting of many core systems.
Stan, Mircea, Sridhar, Ramalingam, Bhatia, Karan, Alioto, Massimo and Li, Helen
(eds.)
In Proceedings - 31st IEEE International System on Chip Conference, SOCC 2018.
vol. 2018-September,
IEEE Computer Society.
.
(doi:10.1109/SOCC.2018.8618565).
Record type:
Conference or Workshop Item
(Paper)
Abstract
In this paper, we study stealthy false-data attacks that exploit the vulnerabilities of power budgeting scheme in NoC, which can cause catastrophic denial of service (DoS) effects. Essentially, when a power budget request packet is routed through a Trojan-infected network-on-chip node's router, the power budget request can be unknowingly modified. The global manager then tends to make really bad power budget allocation decisions with all the tampered power requests it received. That is, legitimate applications will be victimized with lower power budgets than what they initially asked for, and thus, could suffer serious performance degradation; malicious applications, on the other hand, may be entitled to high power budgets and thus see performance boost that they do not deserve. Our study has shown that this new type of DoS attack can be initiated and sustained by a simple hardware Trojan (HT) circuit that is extremely hard to be detected. The effects of this new DoS attack are simulated using a network model, and all the major parameters and factors that impact the attack effects are identified and quantified.
This record has no associated files available for download.
More information
Published date: 17 January 2019
Venue - Dates:
31st IEEE International System on Chip Conference, SOCC 2018, , Arlington, United States, 2018-09-04 - 2018-09-07
Keywords:
Hardware Trojan, power budgeting
Identifiers
Local EPrints ID: 429627
URI: http://eprints.soton.ac.uk/id/eprint/429627
PURE UUID: 6a9b8e32-340e-44ae-b37d-8fd5f53838fa
Catalogue record
Date deposited: 02 Apr 2019 16:30
Last modified: 17 Mar 2024 12:23
Export record
Altmetrics
Contributors
Author:
Yiming Zhao
Author:
Xiaohang Wang
Author:
Yingtao Jiang
Author:
Yang Mei
Author:
Amit Kumar Singh
Author:
Terrence Mak
Editor:
Mircea Stan
Editor:
Ramalingam Sridhar
Editor:
Karan Bhatia
Editor:
Massimo Alioto
Editor:
Helen Li
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics