Trustworthy Hardware from Untrusted Components

被引:19
|
作者
Sethumadhavan, Simha [1 ]
Waksman, Adam [2 ,3 ]
Suozzo, Matthew [3 ,4 ]
Huang, Yipeng [3 ]
Eum, Julianna [3 ,5 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] DE Shaw Grp, New York, NY USA
[3] Columbia Univ, New York, NY USA
[4] Chip Scan LLC, New York, NY USA
[5] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
基金
美国国家科学基金会;
关键词
System-on-chip;
D O I
10.1145/2699412
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many factors combine to make hardware more susceptible to malicious alterations and less trustworthy, including increased use of third-party intellectual property components in system-on-chip designs, global scope of the chip-design process, increased design complexity and integration, and design teams with relatively few designers responsible for each subcomponent. There are unconfirmed reports of compromised hardware leading to undesirable economic consequences. A nontechnical solution is to design and manufacture hardware locally in a trusted facility with trusted personnel. The most common threats are from third-party vendors, as modern designs can contain a large number of distinct IP components, many of which may be sourced from small groups of designers.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [31] Enclavisor: A Hardware-Software Co-Design for Enclaves on Untrusted Cloud
    Gu, Jinyu
    Wu, Xinyue
    Zhu, Bojun
    Xia, Yubin
    Zang, Binyu
    Guan, Haibing
    Chen, Haibo
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (10) : 1598 - 1611
  • [32] Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory
    Kai Lu
    Peng-Fei Wang
    Gen Li
    Xu Zhou
    Journal of Computer Science and Technology, 2018, 33 : 587 - 602
  • [33] Secrecy rate maximization for hardware impaired untrusted relaying network with deep learning
    Bastami, Hamed
    Moradikia, Majid
    Behroozi, Hamid
    de Lamare, Rodrigo C.
    Abdelhadi, Ahmed
    Ding, Zhiguo
    PHYSICAL COMMUNICATION, 2021, 49
  • [34] Untrusted Hardware Causes Double-Fetch Problems in the I/O Memory
    Lu, Kai
    Wang, Peng-Fei
    Li, Gen
    Zhou, Xu
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 587 - 602
  • [35] The Study of Software Components Trustworthy Evaluation Method for Library
    Zhao, Guifen
    ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 214 - 217
  • [36] Rethinking Reverse Converter Design: From Algorithms to Hardware Components
    Molahosseini, Amir Sabbagh
    Zarandi, Azadeh Alsadat Emrani
    Mirhosseini, Seyed Mostafa
    Hosseinzadeh, Mehdi
    2014 14TH INTERNATIONAL SYMPOSIUM ON INTEGRATED CIRCUITS (ISIC), 2014, : 444 - 447
  • [37] Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms
    Segers, Laurent
    Talebi, Borna
    da Silva, Bruno
    Touhafi, Abdellah
    Braeken, An
    SENSORS, 2024, 24 (14)
  • [38] TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud
    Wang, Xiaoguang
    Shi, Yi
    Dai, Yuehua
    Qi, Yong
    Ren, Jianbao
    Xuan, Yu
    JOURNAL OF COMPUTERS, 2014, 9 (10) : 2303 - 2314
  • [39] Hardware Assistance for Trustworthy Systems through 3-D Integration
    Valamehr, Jonathan
    Tiwari, Mohit
    Sherwood, Timothy
    Kastner, Ryan
    Huffmire, Ted
    Irvine, Cynthia
    Levin, Timothy
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 199 - 210
  • [40] Learning from Untrusted Data
    Charikar, Moses
    Steinhardt, Jacob
    Valiant, Gregory
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 47 - 60