Detecting Malicious Modifications of Data in Third-Party Intellectual Property Cores

被引:53
|
作者
Rajendran, Jeyavijayan [1 ]
Vedula, Vivekananda [2 ]
Karri, Ramesh [1 ]
机构
[1] NYU, ECE Dept, Brooklyn, NY USA
[2] TSR Labs, Austin, TX USA
关键词
D O I
10.1145/2744769.2744823
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Globalization of the system-on-chip (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corruption of critical data such as secret key. Our approach develops properties to identify corruption of critical registers. Furthermore, we describe two attacks where computations can be performed on corrupted data without corrupting the critical register. We develop additional properties to detect such attacks. We validate our technique using Trojans in 8051 and RISC processors and AES designs from Trust-Hub.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Trust-minimized Integration of Third-Party Intellectual Property Cores
    Pauls, Friedrich
    Haas, Sebastian
    Hasler, Mattis
    [J]. 2023 20TH INTERNATIONAL SOC DESIGN CONFERENCE, ISOCC, 2023, : 53 - 54
  • [2] Hardware Trojan Detection in Third-Party Digital Intellectual Property Cores by Multilevel Feature Analysis
    Chen, Xiaoming
    Liu, Qiaoyi
    Yao, Song
    Wang, Jia
    Xu, Qiang
    Wang, Yu
    Liu, Yongpan
    Yang, Huazhong
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (07) : 1370 - 1383
  • [3] Digital Watermarking for Detecting Malicious Intellectual Property Cores in NoC Architectures
    Charles, Subodha
    Bindschaedler, Vincent
    Mishra, Prabhat
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 30 (07) : 952 - 965
  • [4] Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property
    Waksman, Adam
    Sethumadhavan, Simha
    Eum, Julianna
    [J]. IEEE DESIGN & TEST, 2013, 30 (02) : 8 - 16
  • [5] Protecting your intellectual property against third-party infringers and patents
    Bianco, Krista
    [J]. ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2014, 248
  • [6] Using intellectual property agreements in the presence of supplier and third-party copycatting
    Ghamat, Salar
    Pun, Hubert
    Critchley, Greg
    Hou, Pengwen
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 680 - 692
  • [7] Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning
    Sanamontre, Thanaporn
    Visoottiviseth, Vasaka
    Ragkhitwetsagul, Chaiyong
    [J]. ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 238 - 251
  • [8] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    [J]. RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [9] Detection of Hardware Trojans in Third-Party Intellectual Property Using Untrusted Modules
    Reece, Trey
    Robinson, William H.
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2016, 35 (03) : 357 - 366
  • [10] The Hitchhiker's Guide to Malicious Third-Party Dependencies
    Ladisa, Piergiorgio
    Sahin, Merve
    Ponta, Serena Elisa
    [J]. PROCEEDINGS OF THE 2023 WORKSHOP ON SOFTWARE SUPPLY CHAIN OFFENSIVE RESEARCH AND ECOSYSTEM DEFENSES, SCORED 2023, 2023, : 65 - 74