Hardware trojan resistant computation using heterogeneous COTS processors

  • Authors:
  • Mark Beaumont;Bradley Hopkins;Tristan Newby

  • Affiliations:
  • Defence Science and Technology Organisation, Adelaide, Australia;Defence Science and Technology Organisation, Adelaide, Australia;Defence Science and Technology Organisation, Adelaide, Australia

  • Venue:
  • ACSC '13 Proceedings of the Thirty-Sixth Australasian Computer Science Conference - Volume 135
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Hardware Trojans pose a credible and increasing threat to computer security, with the potential to compromise the very electronics that ostensibly provide the security primitives underpinning various computer architectures. The discovery of stealthy Hardware Trojans within Integrated Circuits by current state-of-the-art pre-and post-manufacturing test and verification techniques cannot be guaranteed. Therefore electronic systems, especially those controlling safety or security critical systems should be designed to operate with integrity in the presence of any Hardware Trojans, and regardless of any Trojan activity. We present an architecture that fragments and replicates computation over a pool of Commercial-Off-The-Shelf processors with widely heterogeneous architectures. Processors are loosely synchronised through their use of a voted, architecture-independent message box mechanism to access a common memory space. A minimal Trusted Computing Base abstracts the processors as a single computational entity that can tolerate the effects of arbitrary Hardware Trojans within individual processors. The architecture provides integrity, data confidentiality, and availability for executing applications.