作者: Festus Hategekimana , Taylor J L Whitaker , Md Jubaer Hossain Pantho , Christophe Bobda
DOI: 10.1109/ASIANHOST.2017.8354003
关键词: Resource (project management) 、 Overhead (computing) 、 Software 、 Embedded system 、 Interface (computing) 、 Sandbox (computer security) 、 Correctness 、 Computer science 、 Automaton 、 Trojan
摘要: This paper explores the use of hardware sand-boxes, conceptually similar to software sandboxes, for secure integration non-trusted IPs in systems-on-chip (SoC) designs. Our approach is based on a general assumption that malicious components hidden pose no harm system as long they don't manifest. Thus, goal sandbox only allow permissible interactions between IP and rest system. The proposed design achieves this by exposing interface isolated virtual resources checking signals' “correctness” at run-time. We evaluated through real world implementation. can detect majority Trust-Hub.org Trojan benchmarks with negligible increase resource overhead.