Homework6_Solution (1)

.pdf

School

Rutgers University *

*We aren’t endorsed by this school

Course

446

Subject

Computer Science

Date

Jan 9, 2024

Type

pdf

Pages

2

Uploaded by dan47433

Report
ECE 446/579:04 (Spring 2023) Homework #6 1. ( “Hello World” Hardware Security Attacks ) In the lecture we discussed a “hello world” example of hardware security attack using a 3-input encoder that assigns a 2-bit code. (1) Please provide a simplified implementation of this encoder. (2) Please discuss why the simplified implementation is not secure and what types of attacks this system may be subject to. (3) In your opinion, what are the fundamental reasons that caused these potential security attacks? (4) Can you please suggest countermeasures that may prevent the potential attacks? For (1) and (2), please see pages 18 and 19 in Slides 6 (3) is an open question. An example answer can be that the system described by the truth table has the “don’t care” outputs that are not fully specified, leading to undefined behavior that caused the security issues we discussed. (4) is an open question. An example answer can be changing the “don’t care” outputs to fully specified ones, such as error codes, to avoid the undefined behavior. 2. (Hardware Trojan Basics) What are the two basic components that a typical hardware Trojan consists of? Based on the two components, please discuss how the attacker might be able to hide the Trojan from regular hardware tests. (1) trigger; and (2) payload (i.e., malicious circuitry) Attackers tend to make the trigger very rarely activated (e.g., under a rare event only known by the attackers) to bypass the regular hardware tests. 3. (Software vs. Hardware Trojans) Please compare and discuss the difficulties with detecting software Trojans vs. hardware Trojans. In your opinion, what may be the possible methods to overcome the difficulties/challenges you listed for hardware Trojan detection? Comparing to software, the detection of hardware Trojans is significantly more challenging, as hardware is hard to inspect, contains huge process variation, and has no “golden model” available for the security check. Ways to overcome the challenges: open question. Example answers can be the three hardware Trojan detection mechanisms we discussed in Pages 27-29 of Slides 6 or other hardware Trojan defense mechanisms discussed in the literature (each of them may not address all the challenges but probably only a subset of them). 4. (Passive & Proactive Defenses against Hardware Trojans) In the lecture we discussed passive and proactive approaches to defend against hardware Trojan attacks. Please provide 1 or 2 examples for each approach. Passive: power/timing based side channel analysis. Proactive: design for trust. 5. (Side Channel-based Hardware Trojan Detection) Side channel analysis (SCA) has been a very popular hardware Trojan detection approach discussed in the community. Please answer the following questions about SCA for hardware Trojan detection. (1) Please provide a few examples about what side channels may be used to detect hardware Trojans and their pros & cons. (2) What is the motivation of using SCA to detect hardware Trojan? What are the advantages & disadvantages of SCA-based approaches compared to other possible approaches?
(1) The most popular ones are power and delay. There are also other side channels that may be leveraged, such as electromagnetic field (EMF). (2) The motivation of using SCA is that the physical inspection on hardware is very expensive and thus cannot scale well. SCA could address this challenge by enabling a faster monitoring mechanism. (Pros & Cons are open questions for discussions depending on the specific side channels or other approaches under discussion. For example, they may have different resource requirements and difficulty of measurements.)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help