xDEFENSE: An Extended DEFENSE for Mitigating Next Generation Intrusions. Lamberti, J., Shila, D., & Venugopalan, V. In Proceedings of the 2014 ACM/SIGDA International Symposium on Field-programmable Gate Arrays, of FPGA 14, pages 253-253, New York, NY, USA, February, 2014. ACM.
abstract   bibtex   
In this work, we propose a modified DEFENSE architecture termed as xDEFENSE that can detect and react to hardware attacks in real-time. In the past, several Root of Trust architectures such as DEFENSE and RETC have been proposed to foil attempts by hardware Trojans to leak sensitive information. In a typical Root of Trust architecture scenario, hardware is allowed to access the memory only by responding properly to a challenge requested by the memory guard. However in a recent effort, we observed that these architectures can in fact be susceptible to a variety of threats ranging from denial of service attacks, privilege escalation to information leakage, by injecting a Trojan into the Root of Trust modules such as memory guards and authorized hardware. In our work, we propose a security monitor that monitors all transactions between the authorized hardware, memory guard and memory. It also authenticates these components through the use of Hashed Message Authentication Codes (HMAC) to detect any invalid memory access or denial of service attack by disrupting the challenge-response pairs. The proposed xDEFENSE architecture was implemented on a Xilinx SPARTAN 3 FPGA evaluation board and our results indicate that xDEFENSE requires 143 additional slices as compared to DEFENSE and incurs a monitoring latency of 22ns.
@inproceedings{Lamberti2014xDEFENSE:-,
	abstract = {In this work, we propose a modified DEFENSE architecture termed as xDEFENSE that can detect and react to hardware attacks in real-time. In the past, several Root of Trust architectures such as DEFENSE and RETC have been proposed to foil attempts by hardware Trojans to leak sensitive information. In a typical Root of Trust architecture scenario, hardware is allowed to access the memory only by responding properly to a challenge requested by the memory guard. However in a recent effort, we observed that these architectures can in fact be susceptible to a variety of threats ranging from denial of service attacks, privilege escalation to information leakage, by injecting a Trojan into the Root of Trust modules such as memory guards and authorized hardware. In our work, we propose a security monitor that monitors all transactions between the authorized hardware, memory guard and memory. It also authenticates these components through the use of Hashed Message Authentication Codes (HMAC) to detect any invalid memory access or denial of service attack by disrupting the challenge-response pairs. The proposed xDEFENSE architecture was implemented on a Xilinx SPARTAN 3 FPGA evaluation board and our results indicate that xDEFENSE requires 143 additional slices as compared to DEFENSE and incurs a monitoring latency of 22ns.},
	acmid = {2554714},
	address = {New York, NY, USA},
	author = {Lamberti, James and Shila, Devu and Venugopalan, Vivek},
	booktitle = {Proceedings of the 2014 ACM/SIGDA International Symposium on Field-programmable Gate Arrays},
	date-added = {2021-01-30 10:24:01 -0500},
	date-modified = {2021-01-30 10:24:01 -0500},
	isbn = {978-1-4503-2671-1},
	keywords = {architecture, denial of service attacks, hardware trojan threats, information leakage, root of trust, security monitor, trojan detection},
	location = {Monterey, California, USA},
	month = feb,
	numpages = {1},
	pages = {253-253},
	publisher = {ACM},
	series = {FPGA 14},
	title = {{xDEFENSE: An Extended DEFENSE for Mitigating Next Generation Intrusions}},
	year = {2014}}

Downloads: 0