Trust-minimized Integration of Third-Party Intellectual Property Cores

被引:0
|
作者
Pauls, Friedrich [1 ]
Haas, Sebastian [1 ]
Hasler, Mattis [1 ]
机构
[1] Barkhausen Inst, Dresden, Germany
关键词
Hardware/Software Co-Design; Isolation; Network-on-Chip; Operating System; Privacy; Security; Tiled Architecture;
D O I
10.1109/ISOCC59558.2023.10396198
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Our society relies on smart digital systems that fulfil not only performance and energy-efficiency demands, but also address security and privacy goals. At the same time, vendors must deal with stringent time-to-market challenges and tight budget constraints. This leads to the use and integration of intellectual property (IP) cores. Vulnerabilities in these cores may compromise the system's security. This paper presents a novel architecture concept that allows for a secure integration of IP cores with only minimal security assumptions. This is achieved by a hardware component called trusted communication unit (TCU) that isolates all components on the chip. A post-routing implementation shows only small security costs in terms of TCU area overhead of around 13%.
引用
收藏
页码:53 / 54
页数:2
相关论文
共 50 条
  • [1] Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores
    Rajendran, Jeyavijayan
    Vedula, Vivekananda
    Karri, Ramesh
    [J]. 2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [2] Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis
    Chen, Xiaoming
    Liu, Qiaoyi
    Yao, Song
    Wang, Jia
    Xu, Qiang
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1370 - 1383
  • [3] CLAIMS AGAINST THIRD-PARTY RECIPIENTS OF TRUST PROPERTY
    Salmons, David
    [J]. CAMBRIDGE LAW JOURNAL, 2017, 76 (02): : 399 - 429
  • [4] Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property
    Waksman, Adam
    Sethumadhavan, Simha
    Eum, Julianna
    [J]. IEEE DESIGN & TEST, 2013, 30 (02) : 8 - 16
  • [5] Protecting your intellectual property against third-party infringers and patents
    Bianco, Krista
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 248
  • [6] Using intellectual property agreements in the presence of supplier and third-party copycatting
    Ghamat, Salar
    Pun, Hubert
    Critchley, Greg
    Hou, Pengwen
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 680 - 692
  • [7] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    [J]. RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [8] Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules
    Reece, Trey
    Robinson, William H.
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (03) : 357 - 366
  • [9] Formal Security Verification of Third Party Intellectual Property Cores For Information Leakage
    Rajendran, J.
    Dhandayuthapany, A.
    Vedula, V.
    Karri, R.
    [J]. 2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 547 - 552
  • [10] Third-Party Software's Trust Quagmire
    Voas, Jeffrey
    Hurlburt, George
    [J]. COMPUTER, 2015, 48 (12) : 80 - 87