HIT: A Hidden Instruction Trojan Model for Processors.

Jiaqi Zhang,Ying Zhang,Huawei Li,Jianhui Jiang
DOI: https://doi.org/10.23919/date48585.2020.9116228
2020-01-01
Abstract:This paper explores an intrusion mechanism to microprocessors using illegal instructions, namely hidden instruction Trojan (HIT). It uses a low-probability sequence consisting of normal instructions as a boot sequence, followed by an illegal instruction to trigger the Trojan. The payload is a hidden interrupt to force the program counter to a specific address. Hence the program at the address has the super privileges. Meanwhile, we use integer programming to minimize the trigger probability of HIT within a given area overhead. The experimental results demonstrate that HIT has an extremely low trigger probability and can survive from the detection of the existing test methods.
What problem does this paper attempt to address?