Trustworthy Hardware from Untrusted Components

被引:19
|
作者
Sethumadhavan, Simha [1 ]
Waksman, Adam [2 ,3 ]
Suozzo, Matthew [3 ,4 ]
Huang, Yipeng [3 ]
Eum, Julianna [3 ,5 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[2] DE Shaw Grp, New York, NY USA
[3] Columbia Univ, New York, NY USA
[4] Chip Scan LLC, New York, NY USA
[5] US Mil Acad, Dept Elect Engn & Comp Sci, West Point, NY 10996 USA
基金
美国国家科学基金会;
关键词
System-on-chip;
D O I
10.1145/2699412
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many factors combine to make hardware more susceptible to malicious alterations and less trustworthy, including increased use of third-party intellectual property components in system-on-chip designs, global scope of the chip-design process, increased design complexity and integration, and design teams with relatively few designers responsible for each subcomponent. There are unconfirmed reports of compromised hardware leading to undesirable economic consequences. A nontechnical solution is to design and manufacture hardware locally in a trusted facility with trusted personnel. The most common threats are from third-party vendors, as modern designs can contain a large number of distinct IP components, many of which may be sourced from small groups of designers.
引用
收藏
页码:60 / 71
页数:12
相关论文
共 50 条
  • [41] Hardware components and computer design
    Huskey, HD
    FIRST COMPUTERS-HISTORY AND ARCHITECTURES, 2000, : 69 - 87
  • [42] Verifying hardware components with JACK
    DeNicola, R
    Fantechi, A
    Gnesi, S
    Larosa, S
    Ristori, G
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, 1995, 987 : 246 - 260
  • [43] Assembly hardware and machine components
    Anon
    Assembly, 2001, 44 (07):
  • [44] The development of hardware and software components
    Cop, R
    INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS, 1998, 28 (01): : 22 - 24
  • [45] Automated composition of hardware components
    Smith, J
    De Micheli, G
    1998 DESIGN AUTOMATION CONFERENCE, PROCEEDINGS, 1998, : 14 - 19
  • [46] Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments
    Van Phu Tuan
    Hyung Yun Kong
    Annals of Telecommunications, 2020, 75 : 397 - 405
  • [47] Secrecy capacity analysis of untrusted relaying energy-harvesting systems with hardware impairments
    Tuan, Van Phu
    Kong, Hyung Yun
    ANNALS OF TELECOMMUNICATIONS, 2020, 75 (7-8) : 397 - 405
  • [48] Guest Editors' Introduction: Trusted System-on-Chip with Untrusted Components
    Bhunia, Swarup
    Agrawal, Dakshi
    Nazhandali, Leyla
    IEEE DESIGN & TEST, 2013, 30 (02) : 5 - 7
  • [49] Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware
    Cook, DL
    Baratto, R
    Keromytis, AD
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 363 - 375
  • [50] Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules
    Reece, Trey
    Robinson, William H.
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (03) : 357 - 366