The University of Southampton
University of Southampton Institutional Repository

On a new hardware Trojan attack on power budgeting of many core systems

On a new hardware Trojan attack on power budgeting of many core systems
On a new hardware Trojan attack on power budgeting of many core systems

In this paper, we study stealthy false-data attacks that exploit the vulnerabilities of power budgeting scheme in NoC, which can cause catastrophic denial of service (DoS) effects. Essentially, when a power budget request packet is routed through a Trojan-infected network-on-chip node's router, the power budget request can be unknowingly modified. The global manager then tends to make really bad power budget allocation decisions with all the tampered power requests it received. That is, legitimate applications will be victimized with lower power budgets than what they initially asked for, and thus, could suffer serious performance degradation; malicious applications, on the other hand, may be entitled to high power budgets and thus see performance boost that they do not deserve. Our study has shown that this new type of DoS attack can be initiated and sustained by a simple hardware Trojan (HT) circuit that is extremely hard to be detected. The effects of this new DoS attack are simulated using a network model, and all the major parameters and factors that impact the attack effects are identified and quantified.

Hardware Trojan, power budgeting
90-95
IEEE Computer Society
Zhao, Yiming
82ea0726-8b2b-452a-b4d7-6f99e0273385
Wang, Xiaohang
95ffd2f0-3e1f-4cbe-8067-b600d6a08f75
Jiang, Yingtao
4d583f6f-1706-4732-9a66-9cc2eb803464
Mei, Yang
13de5068-c3f9-4dab-bf88-cf484f5efa51
Singh, Amit Kumar
bb67d43e-34d9-4b58-9295-8b5458270408
Mak, Terrence
0f90ac88-f035-4f92-a62a-7eb92406ea53
Stan, Mircea
Sridhar, Ramalingam
Bhatia, Karan
Alioto, Massimo
Li, Helen
Zhao, Yiming
82ea0726-8b2b-452a-b4d7-6f99e0273385
Wang, Xiaohang
95ffd2f0-3e1f-4cbe-8067-b600d6a08f75
Jiang, Yingtao
4d583f6f-1706-4732-9a66-9cc2eb803464
Mei, Yang
13de5068-c3f9-4dab-bf88-cf484f5efa51
Singh, Amit Kumar
bb67d43e-34d9-4b58-9295-8b5458270408
Mak, Terrence
0f90ac88-f035-4f92-a62a-7eb92406ea53
Stan, Mircea
Sridhar, Ramalingam
Bhatia, Karan
Alioto, Massimo
Li, Helen

Zhao, Yiming, Wang, Xiaohang, Jiang, Yingtao, Mei, Yang, Singh, Amit Kumar and Mak, Terrence (2019) On a new hardware Trojan attack on power budgeting of many core systems. Stan, Mircea, Sridhar, Ramalingam, Bhatia, Karan, Alioto, Massimo and Li, Helen (eds.) In Proceedings - 31st IEEE International System on Chip Conference, SOCC 2018. vol. 2018-September, IEEE Computer Society. pp. 90-95 . (doi:10.1109/SOCC.2018.8618565).

Record type: Conference or Workshop Item (Paper)

Abstract

In this paper, we study stealthy false-data attacks that exploit the vulnerabilities of power budgeting scheme in NoC, which can cause catastrophic denial of service (DoS) effects. Essentially, when a power budget request packet is routed through a Trojan-infected network-on-chip node's router, the power budget request can be unknowingly modified. The global manager then tends to make really bad power budget allocation decisions with all the tampered power requests it received. That is, legitimate applications will be victimized with lower power budgets than what they initially asked for, and thus, could suffer serious performance degradation; malicious applications, on the other hand, may be entitled to high power budgets and thus see performance boost that they do not deserve. Our study has shown that this new type of DoS attack can be initiated and sustained by a simple hardware Trojan (HT) circuit that is extremely hard to be detected. The effects of this new DoS attack are simulated using a network model, and all the major parameters and factors that impact the attack effects are identified and quantified.

This record has no associated files available for download.

More information

Published date: 17 January 2019
Venue - Dates: 31st IEEE International System on Chip Conference, SOCC 2018, , Arlington, United States, 2018-09-04 - 2018-09-07
Keywords: Hardware Trojan, power budgeting

Identifiers

Local EPrints ID: 429627
URI: http://eprints.soton.ac.uk/id/eprint/429627
PURE UUID: 6a9b8e32-340e-44ae-b37d-8fd5f53838fa

Catalogue record

Date deposited: 02 Apr 2019 16:30
Last modified: 17 Mar 2024 12:23

Export record

Altmetrics

Contributors

Author: Yiming Zhao
Author: Xiaohang Wang
Author: Yingtao Jiang
Author: Yang Mei
Author: Amit Kumar Singh
Author: Terrence Mak
Editor: Mircea Stan
Editor: Ramalingam Sridhar
Editor: Karan Bhatia
Editor: Massimo Alioto
Editor: Helen Li

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×