@inproceedings{0359305d82ed4f8b941f2efe672052e2,
title = "Evaluating coherence-exploiting hardware Trojan",
abstract = "Increasing complexity of integrated circuits and IP-based hardware designs have created the risk of hardware Trojans. This paper introduces a new type of threat, a coherence-exploiting hardware Trojan. This Trojan can be maliciously implanted in master components in a system, and continuously injects memory transactions onto the main interconnect. The injected traffic forces the eviction of cache lines, taking advantage of cache coherence protocols. This type of Trojans insidiously slows down the system performance, incurring Denial-of-Service (DoS) attack. We used a Xilinx Zynq-7000 device to implement the Trojan and evaluate its severity. Experiments revealed that the system performance can be severely degraded as much as 258% with the Trojan. A countermeasure to annihilate the Trojan attack is proposed in detail. We also found that AXI version 3.0 supports a seemingly irrelevant invalidation protocol through ACP, opening a door for the potential Trojan attack.",
keywords = "AXI protocol, Cache coherence, DoS attack, Hardware Trojan, Zynq-7000",
author = "Minsu Kim and Sunhee Kong and Boeui Hong and Lei Xu and Weidong Shi and Taeweon Suh",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 20th Design, Automation and Test in Europe, DATE 2017 ; Conference date: 27-03-2017 Through 31-03-2017",
year = "2017",
month = may,
day = "11",
doi = "10.23919/DATE.2017.7926975",
language = "English",
series = "Proceedings of the 2017 Design, Automation and Test in Europe, DATE 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "157--162",
booktitle = "Proceedings of the 2017 Design, Automation and Test in Europe, DATE 2017",
}