Trustworthy Hardware from Untrusted Components

被引:19
|
作者
Sethumadhavan, Simha [1 ]
Waksman, Adam [2 ,3 ]
Suozzo, Matthew [3 ,4 ]
Huang, Yipeng [3 ]
Eum, Julianna [3 ,5 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] DE Shaw Grp, New York, NY USA
[3] Columbia Univ, New York, NY USA
[4] Chip Scan LLC, New York, NY USA
[5] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
基金
美国国家科学基金会;
关键词
System-on-chip;
D O I
10.1145/2699412
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many factors combine to make hardware more susceptible to malicious alterations and less trustworthy, including increased use of third-party intellectual property components in system-on-chip designs, global scope of the chip-design process, increased design complexity and integration, and design teams with relatively few designers responsible for each subcomponent. There are unconfirmed reports of compromised hardware leading to undesirable economic consequences. A nontechnical solution is to design and manufacture hardware locally in a trusted facility with trusted personnel. The most common threats are from third-party vendors, as modern designs can contain a large number of distinct IP components, many of which may be sourced from small groups of designers.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [21] AppGuard: A Hardware Virtualization Based Approach on Protecting User Applications from Untrusted Commodity Operating System
    Zha, Zili
    Li, Min
    Zang, Wanyu
    Yu, Meng
    Chen, Songqing
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 685 - 689
  • [22] Extending tamper-proof hardware security to untrusted execution environments
    Loureiro, S
    Bussard, L
    Roudier, Y
    USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 111 - 123
  • [23] Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
    Hicks, Matthew
    Finnicum, Murph
    King, Samuel T.
    Martin, Milo M. K.
    Smith, Jonathan M.
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 159 - 172
  • [24] Efficient Secure Two-Party Computation with Untrusted Hardware Tokens
    Jarvinen, Kimmo
    Kolesnikov, Vladimir
    Sadeghi, Ahmad-Reza
    Schneider, Thomas
    TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 367 - 386
  • [25] Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks
    Kuhestani, Ali
    Mohammadi, Abbas
    Wong, Kai-Kit
    Yeoh, Phee Lep
    Moradikia, Majid
    Khandaker, Muhammad R. A.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (07) : 4302 - 4314
  • [26] The Research of Software Components Trustworthy Evaluation Method
    Hou Hong
    He JiuSong
    Song QinBao
    Hao KeGang
    ICAIE 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND EDUCATION, VOLS 1 AND 2, 2009, : 241 - 246
  • [27] Trustworthy Assembly of Components Using the B Refinement
    Lanoix, Arnaud
    Souquieres, Jeanine
    E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2008, 2 (01) : 9 - 23
  • [28] Reference Model of Trustworthy Proof for Trusted Components
    He JiuSong
    Hou Hong
    Song QinBao
    Hao KeGang
    2009 SECOND INTERNATIONAL CONFERENCE ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, FITME 2009, 2009, : 136 - +
  • [29] Trustworthy Hardware: Trojan Detection and Design-for-Trust Challenges
    Tehranipoor, Mohammad
    Salmani, Hassan
    Zhang, Xuehui
    Wang, Xiaoxiao
    Karri, Ramesh
    Rajendran, Jeyavijayan
    Rosenfeld, Kurt
    COMPUTER, 2011, 44 (07) : 66 - 74
  • [30] Secrecy Performance Analysis of Energy Harvesting Untrusted Relay Networks with Hardware Impairments
    Chen, Dechuan
    Li, Jin
    Hu, Jianwei
    Zhang, Xingang
    Zhang, Shuai
    Wang, Dong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2024, 2024