Trustworthy Hardware from Untrusted Components

被引:19
|
作者
Sethumadhavan, Simha [1 ]
Waksman, Adam [2 ,3 ]
Suozzo, Matthew [3 ,4 ]
Huang, Yipeng [3 ]
Eum, Julianna [3 ,5 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] DE Shaw Grp, New York, NY USA
[3] Columbia Univ, New York, NY USA
[4] Chip Scan LLC, New York, NY USA
[5] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
基金
美国国家科学基金会;
关键词
System-on-chip;
D O I
10.1145/2699412
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many factors combine to make hardware more susceptible to malicious alterations and less trustworthy, including increased use of third-party intellectual property components in system-on-chip designs, global scope of the chip-design process, increased design complexity and integration, and design teams with relatively few designers responsible for each subcomponent. There are unconfirmed reports of compromised hardware leading to undesirable economic consequences. A nontechnical solution is to design and manufacture hardware locally in a trusted facility with trusted personnel. The most common threats are from third-party vendors, as modern designs can contain a large number of distinct IP components, many of which may be sourced from small groups of designers.
引用
下载
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [1] SecCheck : A Trustworthy System with Untrusted Components
    Kalayappan, Rajshekar
    Sarangi, Smruti R.
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 379 - 384
  • [2] Trustworthy and reliable computing using untrusted and unreliable quantum hardware
    Upadhyay, Suryansh
    Ghosh, Swaroop
    FRONTIERS IN COMPUTER SCIENCE, 2024, 6
  • [3] Trustworthy Data from Untrusted Databases
    Jain, Rohit
    Prabhakar, Sunil
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 529 - 540
  • [4] A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components
    Mavroudis, Vasilios
    Cerulli, Andrea
    Svenda, Petr
    Cvrcek, Dan
    Klinec, Dusan
    Danezis, George
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1583 - 1600
  • [5] Trustworthy Sensing in an Untrusted IoT Environment
    Diallo, Mamadou H.
    Panwar, Nisha
    Mehrotra, Sharad
    Sani, Ardalan Amiri
    2018 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2018,
  • [6] Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers
    Bronchain, Olivier
    Dassy, Louis
    Faust, Sebastian
    Standaert, Francois-Xavier
    PROCEEDINGS OF THE 2018 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'18), 2018, : 1 - 10
  • [7] Trustworthy Hardware
    Karri, Ramesh
    Koushanfar, Farinaz
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1123 - 1125
  • [8] Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective
    Cui, Xiaotong
    Zhang, Xing
    Yan, Hao
    Zhang, Liang
    Cheng, Kefei
    Wu, Yu
    Wu, Kaijie
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 41 (05) : 1386 - 1399
  • [9] q Building Trustworthy Systems Using Untrusted Components: A High-Level Synthesis Approach
    Rajendran, Jeyavijayan
    Sinanoglu, Ozgur
    Karri, Ramesh
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2016, 24 (09) : 2946 - 2959
  • [10] TRUSTWORTHY HARDWARE: IDENTIFYING AND CLASSIFYING HARDWARE TROJANS
    Karri, Ramesh
    Rajendran, Jeyavijayan
    Rosenfeld, Kurt
    Tehranipoor, Mohammad
    COMPUTER, 2010, 43 (10) : 39 - 46