Defeating UCI: Building Stealthy and Malicious Hardware
Citations Over TimeTop 10% of 2011 papers
Abstract
In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-time testing and flags them as potentially malicious. In this paper we construct circuits that have malicious behavior, but that would evade detection by the UCI algorithm and still pass design-time test cases. To enable our search for such circuits, we define one class of malicious circuits and perform a bounded exhaustive enumeration of all circuits in that class. Our approach is simple and straight forward, yet it proves to be effective at finding circuits that can thwart UCI. We use the results of our search to construct a practical attack on an open-source processor. Our malicious backdoor allows any user-level program running on the processor to enter supervisor mode through the use of a secret â knock. We close with a discussion on what we see as a major challenge facing any future design-time malicious hardware detection scheme: identifying a sufficient class of malicious circuits to defend against.
Related Papers
- → Low-cost detection of backdoor malware(2017)8 cited
- → An investigation of backdoors implication to avoid regional security impediment(2015)5 cited
- Analysis of Class Supervisors' Work in the 21st Century(2006)
- Analyzing Institution Construct of External Research Supervisor in Master of Engineering(2008)
- → The Battle for Backdoors and Encryption Keys(2021)