Trojan Assets and Attack Vectors in Processors

Czea Sie Chuah1, Alexander Hepp2, Christian Appold1, Tim Leinm├╝ller1
1DENSO Automotive Deutschland GmbH, 2Technical University of Munich, TUM School of Computation, Information and Technology


Abstract

Processor design and manufacturing is often done globally, involving multiple companies, some of which can be untrustworthy. This lack of trust leads to the threat of malicious modifications like Hardware Trojans. Hardware Trojans can cause drastic consequences and even endanger human lives. Hence, effective countermeasures against Hardware Trojans are urgently needed. To develop countermeasures, Hardware Trojans and their properties have to be understood well. No previous work presents a detailed investigation of Hardware Trojans for processors. This paper fills this gap with a theoretical analysis of Hardware Trojans for processors. We present a new classification of processor constituents, which can be used to derive several triggers and payloads and compare them with previously published Hardware Trojans. This shows in detail possible attack vectors for processors and gaps in existing processor Hardware Trojan landscape. With this work, we intend to improve understanding of Hardware Trojans in processors, supporting the development of new countermeasures and prevention techniques.