skip to main content
research-article
Free access

Trustworthy hardware from untrusted components

Published: 24 August 2015 Publication History

Abstract

This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.

References

[1]
Abdel-Hamid, A.T., Tahar, S., and Aboulhamid, E.M. IP watermarking techniques: Survey and comparison. In Proceedings of the IEEE International Workshop on System-on-Chip for Real-Time Applications (Calgary, Alberta, Canada, June 30--July 2). IEEE Press, 2003.
[2]
Agrawal, D., Baktir, S., Karakoyunlu, D., Rohatgi, P., and Sunar, B. Trojan detection using IC Fingerprinting. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 20--23). IEEE Press, 2007, 296--310.
[3]
Banga, M., Chandrasekar, M., Fang, L., and Hsiao, M.S. Guided test generation for isolation and detection of embedded trojans in ICS. In Proceedings of the 18th ACM Great Lakes symposium on VLSI (Pittsburgh, PA, May 20--22). ACM Press, New York, 2008, 363--366.
[4]
BBC News. U.S. Government restricts China PCs (May 19, 2006); http://news.bbc.co.uk/2/hi/4997288.stm
[5]
Becker, G.T., Regazzoni, F., Paar, C., and Burleson, W.P. Stealthy dopant-level gardware trojans. In Proceedings of the 15th International Conference on Cryptographic Hardware and Embedded Security. Springer-Verlag, Berlin, Heidelberg, Germany, 2013, 197--214.
[6]
Choudhary, N., Wadhavkar, S., Shah, T., Mayukh, H., Gandhi, J., Dwiel, B., Navada, S., Najaf-Abadi, H., and Rotenberg, E. Fabscalar: Composing synthesizable RTL designs of arbitrary cores within a canonical superscalar template. In Proceedings of the 38th Annual International Symposium on Computer Architecture (San Jose, CA, June 4--8). ACM Press, New York, 2011, 11--22.
[7]
Gentry, C. Computing arbitrary functions of encrypted data. Commun. ACM 53, 3 (Mar. 2010), 97--105.
[8]
Hicks, M., King, S.T., Martin, M.M.K., and Smith, J.M. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In Proceedings of the 31st IEEE Symposium on Security and Privacy (Oakland, CA, May 16--19). IEEE Computer Society Press, 2010, 159--172.
[9]
Hu, K., Nowroz, A.N., Reda, S., and Koushanfar, F. High-sensitivity hardware trojan detection using multimodal characterization. In Proceedings of Design Automation & Test in Europe (Grenoble, France). IEEE Press, 2013, 1271--1276.
[10]
Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., and Irvine, C. Moats and drawbridges: An isolation primitive for reconfigurable hardware-based systems. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May 20--23). IEEE Press, 2007, 281--295.
[11]
Joseph, M.K. Architectural Issues in Fault-Tolerant, Secure Computing Systems. Ph.D. Thesis, University of California, Los Angeles, 1988; http://ftp.cs.ucla.edu/tech-report/198_-reports/880047.pdf
[12]
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., and Zhou, Y. Designing and implementing malicious hardware. In Proceedings of the First Usenix Workshop on Large-Scale Exploits and Emergent Threats (San Francisco, CA, Apr. 15). USENIX Association, Berkeley, CA, 2008, 5:1--5:8.
[13]
Molho, L.M. Hardware aspects of secure computing. In Proceedings of the Spring Joint Computer Conference (Atlantic City, NJ, May 5--7). ACM Press, New York, 1970, 135--141.
[14]
NYU Cyber Security Awareness Week. The 2013 Embedded Systems Challenge; https://csaw.engineering.nyu.edu/
[15]
Rajendran, J., Jyothi, V., and Karri, R. Blue team-red team approach to hardware trust assessment. In Proceedings of the IEEE 29th International Conference on Computer Design (Amherst, MA, Oct. 9--12). IEEE, 2011, 285--288.
[16]
Salmani, H. and Tehranipoor, M. Analyzing circuit vulnerability to hardware trojan insertion at the behavioral level. In Proceedings of the IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (New York, Oct. 2--4). IEEE Press, 2013, 190--195.
[17]
Simonite, T. NSA's own hardware backdoors may still be a problem from hell. MIT Technology Review (Oct. 2013); http://www.technologyreview.com/news/519661/nsas-own-hardware-backdoors-may-still-be-a-problem-from-hell/
[18]
Sturton, C., Hicks, M., Wagner, D., and King, S.T. Defeating UCI: Building stealthy and malicious hardware. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland, CA, May 22--25). IEEE Computer Society, 2011, 64--77.
[19]
Tehranipoor, M., Karri, R., Koushanfar, F., and Potkonjak, M. TrustHub; https://www.trust-hub.org/
[20]
Tehranipoor, M. and Koushanfar, F. A survey of hardware trojan taxonomy and detection. IEEE Design Test of Computers 27, 1 (Jan.--Feb. 2010), 10--25.
[21]
U.S. Department of Defense. High Performance Microchip Supply (Feb. 2005); http://www.acq.osd.mil/dsb/reports/ADA435563.pdf
[22]
Waksman, A., Eum, J., and Sethumadhavan, S. Practical, lightweight secure inclusion of third-party intellectual property. IEEE Design and Test Magazine 30, 2 (2013), 8--16.
[23]
Waksman, A. and Sethumadhavan, S. Tamper-evident microprocessors. In Proceedings of the 31st IEEE Symposium on Security and Privacy (Oakland, CA, May 16--19). IEEE Press, 2010, 173--188.
[24]
Waksman, A. and Sethumadhavan, S. Silencing hardware backdoors. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland, CA, May 22--25). IEEE Press, 2011, 49--63.
[25]
Waksman, A., Suozzo, M., and Sethumadhavan, S. FANCI: Identification of stealthy malicious logic using Boolean functional analysis. In Proceedings of the 20th ACM Conference on Computer and Communications Security (Berlin, Germany, Nov. 4--8). ACM Press, New York, 2013, 697--708.
[26]
Wei, S., Li, K., Koushanfar, F., and Potkonjak, M. Provably complete hardware trojan detection using test point insertion. In Proceedings of the International Conference on Computer-Aided Design (San Jose, CA, Nov. 5--8). ACM Press, New York, 2012, 569--576.

Cited By

View all
  • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
  • (2023)Trust-Based Adaptive Routing for NoCsEmbedded Computer Systems: Architectures, Modeling, and Simulation10.1007/978-3-031-46077-7_20(296-310)Online publication date: 2-Jul-2023
  • (2023)Fundamentals of Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_5(89-107)Online publication date: 26-Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 58, Issue 9
September 2015
119 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2817191
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
© 2015 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 August 2015
Published in CACM Volume 58, Issue 9

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Funding Sources

  • National Science Foundation CCF/SaTC Programs
  • Defense Advanced Research Projects Agency
  • Alfred P. Sloan Foundation

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)737
  • Downloads (Last 6 weeks)88
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Resilience-by-Design in 6G Networks: Literature Review and Novel Enabling ConceptsIEEE Access10.1109/ACCESS.2024.348027512(155666-155695)Online publication date: 2024
  • (2023)Trust-Based Adaptive Routing for NoCsEmbedded Computer Systems: Architectures, Modeling, and Simulation10.1007/978-3-031-46077-7_20(296-310)Online publication date: 2-Jul-2023
  • (2023)Fundamentals of Logic LockingUnderstanding Logic Locking10.1007/978-3-031-37989-5_5(89-107)Online publication date: 26-Jun-2023
  • (2022)Anomaly Detection for Insider Attacks From Untrusted Intelligent Electronic Devices in Substation Automation SystemsIEEE Access10.1109/ACCESS.2022.314202210(6629-6649)Online publication date: 2022
  • (2022) Logic Locking of Integrated Circuits Enabled by Nanoscale MoS 2 -Based Memtransistors ACS Applied Nano Materials10.1021/acsanm.2c028075:10(14447-14455)Online publication date: 4-Oct-2022
  • (2022)Hardware Trojan detection via rewriting logicJournal of Logical and Algebraic Methods in Programming10.1016/j.jlamp.2022.100762127(100762)Online publication date: Jun-2022
  • (2022)Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendationsInternational Journal of Information Security10.1007/s10207-021-00545-821:1(115-158)Online publication date: 1-Feb-2022
  • (2021)Efficient Communication Protection of Many-Core Systems against Active AttackersElectronics10.3390/electronics1003023810:3(238)Online publication date: 21-Jan-2021
  • (2021)Feature Selection for Precise Anomaly Detection in Substation Automation Systems2021 13th IEEE PES Asia Pacific Power & Energy Engineering Conference (APPEEC)10.1109/APPEEC50844.2021.9687629(1-6)Online publication date: 21-Nov-2021
  • (2021)Secure Electronics Enabled by Atomically Thin and Photosensitive Two-Dimensional MemtransistorsACS Nano10.1021/acsnano.1c0729215:12(19815-19827)Online publication date: 16-Dec-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media