Runtime Detection of Hardware Trojan in Untrusted Network-On-Chip Mubashir Hussain
Total Page:16
File Type:pdf, Size:1020Kb
Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip Mubashir Hussain A thesis in fulfillment of the requirements for the degree of Doctor of Philosophy School of Computer Science and Engineering Faculty of Engineering The University of New South Wales August 2018 THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: Hussain First name: Mubashir Other name/s: Abreviation for degree as given in the University calendar: PhD School: School of Computer Science and Engineering Faculty: Faculty of Engineering Title: Runtime Detection of Hardware Trojan in Untrusted Network-on-Chip Abstract 350 words maximum Traditionally, the computing system security has been tackled as a software-level problem. With the globalization of the modern semiconductor industry, the design of a system may involve different parties, especially for the design of system-on-chip (SoC) where the high complexity of the design has pushed designers towards using the third-party components that may have been modified with malicious additions without notice of the designer. Such a malicious modification (known as hardware Trojan) may be very small and can escape the scrutiny of the offline circuit-level testing and appear in the final product, which creates a new class of threats that have to be addressed at the hardware level and at the runtime. For SoCs, one of the most vulnerable components is the communication sub-system, called network- on-chip (NoC). NoC is able to access all components in the system and can be an easy target for varied attacks. This thesis aims at the hardware Trojan inside the router of a NoC. When activated, the Trojan can modify passing packets for two different purposes: 1) hijacking packets to harvest information carried by the packet; 2) manipulating the packet to alter the packet data. Both attacks can be tackled by the authentication. But unlike the software level authentication designs in the traditional networking system, the authen- tication in NoC has on-chip overhead issues. The thesis investigates three designs: one for packet hijacking attack detection, one for packet integrity attack detection, and one for Trojan location detection. Each design has a different dominant overhead issue. We, therefore, have a different optimization objective in the design. For the packet hijacking attack detection, we target the overhead on the chip cost and we present a customization design. For the packet data integrity authentication, the main concern is the bandwidth consumption caused by the large tag size and we introduce a progressive authentication scheme to reduce the bandwidth overhead. For the Trojan location detection, we propose a dynamic search algorithm to minimize the energy consumption. We have conducted a range of extensive experiments on each design, which demonstrate the effective- ness of our design approaches. Declaration relating to disposition of project thesis/dissertation I hereby grant to the University of New South Wales or its agents the right to archive and to make available my thesis or dissertation in whole or in part in the University libraries in all forms of media, now or here after known, subject to the provisions of the Copyright Act 1968. I retain all property rights, such as patent rights. I also retain the right to use in future works (such as articles or books) all or part of this thesis or dissertation. I also authorise University Microfilms to use the 350 word abstract of my thesis in Dissertation Abstracts International (this is applicable to doctoral theses only). Signature Witness Date The University recognises that there may be exceptional circumstances requiring restrictions on copying or conditions on use. Requests for restriction for a period of up to 2 years must be made in writing. Requests for a longer period of restriction may be considered in exceptional circumstances and require the approval of the Dean of Graduate Research. FOR OFFICE USE ONLY Date of completion of requirements for Award Originality Statement ‘I hereby declare that this submission is my own work and to the best of my knowl- edge it contains no materials previously published or written by another person, or substantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of this thesis is the product of my own work, except to the extent that assistance from others in the project’s design and conception or in style, presentation and linguistic expression is acknowledged.’ Mubashir Hussain August 1, 2018 Copyright Statement ‘I hereby grant the University of New South Wales or its agents the right to archive and to make available my thesis or dissertation in whole or part in the University libraries in all forms of media, now or here after known, subject to the provisions of the Copyright Act 1968. I retain all proprietary rights, such as patent rights. I also retain the right to use in future works (such as articles or books) all or part of this thesis or dissertation. I also authorise University Microfilms to use the 350 word abstract of my thesis in Dissertation Abstract International (this is applicable to doctoral theses only). I have either used no substantial portions of copyright material in my thesis or I have obtained permission to use copyright material; where permission has not been granted I have applied/will apply for a partial restriction of the digital copy of my thesis or dissertation.’ Mubashir Hussain August 1, 2018 Authenticity Statement ‘I certify that the Library deposit digital copy is a direct equivalent of the final officially approved version of my thesis. No emendation of content has occurred and if there are any minor variations in formatting, they are the result of the conversion to digital format.’ Mubashir Hussain August 1, 2018 Acknowledgements My PhD journey has been full of excitement, frustration, and satisfaction. I would like to take this opportunity to acknowledge all the people who guide, inspire and support me during every step of this journey. First and foremost, I would like to thank Almighty Allah for His endless blessings. It was through His kindness that I was able to overcome all the challenges that I faced during my research. Secondly, I would like to extend my sincere gratitude to my supervisor Dr Annie Hui Guo, for her invaluable guidance, support, and patience. She helped me to learn how to identify and solve research problems. Without her technical support, guidance and rigorous feedback this research work will never be possible. I will always be grateful for her kindness and encouragement. I also like to thank my co-supervisor Professor Sri Parameswaran for his valuable feedback on my research and constant encouragement to boost my confidence during stressful times. I acknowledge my research committee members Prof. Jingling Xue, Dr Eric Andre Martin, Dr Salil Kanhere for their valuable reviews that helped shape this dissertation. Furthermore, I gratefully acknowledge the financial support from School of Computer Science and Engineering UNSW, Faculty of Engineering UNSW and Graduate Research School UNSW to carry out this research. I would like to extend my special thanks to Dr Haseeb Bokhari for his valuable help and feedback on my research. I am very grateful to my friends and colleagues Umair, Hassaan, Wajid and Dimitris for their support and making my PhD journey so enjoyable. I am also thankful for the help provided by my colleagues Mahanama, Darshana, Amin and Sajid. I also like to extend my thanks to a friend and partner in a crime Sana. Her kind words always lifted my moral when I was down. She always cared more about my problems than her own. I am very grateful to her motivational talks and support. i Last but not least, my heartfelt gratitude goes to my loving family. Their uncondi- tional love, prayers, and faith gave me confidence in the most desperate times of my degree. Especially mom and dad, I will always be in debt to your kindness, support, and efforts to bring me to the place where I am today. I am also very thankful to my sisters Sundas, Iqra, and brother Muddasir for being there when I needed them the most. I am genuinely grateful to all the amazing people who believed in me and helped me on this exciting journey. This work is dedicated to all of you. ii List of Publications • Hussain, M. and Guo, H., 2017, March. “Packet Leak Detection on Hardware- Trojan Infected NoCs for MPSoC Systems”. In Proceedings of the 2017 In- ternational Conference on Cryptography, Security and Privacy (pp. 85 - 90). ACM. • Hussain, M., Guo, H. and Parameswaran, S., 2017. “A Customized Authen- tication Design for Traffic Hijacking Detection on Hardware-Trojan Infected NoCs”. Journal of Computer and Communications, 6(01), (pp. 135 - 152). • Hussain, M., Malekpour, A., Guo, H. and Parameswaran, S., 2018, March. “EETD: An Energy Efficient Design for Runtime Hardware Trojan Detection in Untrusted Network-on-Chip”. In VLSI (ISVLSI), 2018 IEEE Computer Society Annual Symposium on (pp. 345 - 350). IEEE. • Hussain, M. and Guo, H. “A Bandwidth-Aware Authentication Scheme for Packet-Integrity Attack Detection on Trojan Infected NoCs”. Accepted In Very Large Scale Integration (VLSI-SoC), 2018 IFIP/IEEE International Con- ference. IEEE. iii Abstract Traditionally, the security of the computing systems has been tackled as a software- level problem where attacks largely come from software and the counter-attack so- lutions are also software oriented. However, with the globalisation of the modern semiconductor industry, the design of a hardware system may involve many different parties, especially for the design of system-on-chip (SoC) where the increasingly high complexity of the design has pushed designers towards using the components from the third-party vendors.