skip to main content
10.1145/3373087.3375883acmconferencesArticle/Chapter ViewAbstractPublication PagesfpgaConference Proceedingsconference-collections
invited-talk

Establishing Trust in Microelectronics

Published:24 February 2020Publication History

ABSTRACT

In recent years, substantial attention has been drawn to vulnerabilities in the architectural design of microelectronics, as well as the security of their global supply chains. In reality, establishing trust in microelectronics requires broader considerations, from verification of the software leveraged to implement hardware designs, to analyzing third-party intellectual property cores, all the way to run-time design assurance and periodic device screening post-deployment. These concerns are relevant to stakeholders at all levels, from small independent design houses all the way to multi-national strategic interests. One notable example of the latter is the U.S. Department of Defense's Trusted and Assured Microelectronics (T&AM) program, which seeks assured access to state-of-the-art foundries through modern trust and assurance methods and demonstrations [1]. This talk will describe research efforts at the Georgia Tech Research Institute centered around providing assurance of FPGAs. Current research thrusts include the development of verification techniques at multiple stages of the design process, including vendor design software execution, implementation of user designs, and even the operation of the underlying physical device hardware itself. For example, to address trust in synthesis and implementation of high-level user source code, we discuss the development of canary circuits which are compiled alongside user design circuits and can be independently inspected and verified to ensure adherence to user-defined implementation rules. Additionally, we discuss one avenue for providing trust in vendor hardware devices through our development of Independent Functional Test (IFT) suites.

References

  1. Jeremy Muldavin, "DoD Trusted and Assured Microelectronics Summary," https://www.ndia.org/-/media/sites/ndia/divisions/electronics/ndia-ed-mtg-020719_jeremy-muldavin_overview-vf.ashx?la=enGoogle ScholarGoogle Scholar
  2. Georgia Tech Research Institute CIPHER Lab, https://www.gtri.gatech.edu/laboratories/cybersecurity-information-protection-and-hardware-evaluation-researchGoogle ScholarGoogle Scholar

Index Terms

  1. Establishing Trust in Microelectronics

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          FPGA '20: Proceedings of the 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays
          February 2020
          346 pages
          ISBN:9781450370998
          DOI:10.1145/3373087

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 24 February 2020

          Check for updates

          Qualifiers

          • invited-talk

          Acceptance Rates

          Overall Acceptance Rate125of627submissions,20%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader