2012
DOI: 10.1109/tifs.2011.2160627
|View full text |Cite
|
Sign up to set email alerts
|

Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
61
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(61 citation statements)
references
References 19 publications
0
61
0
Order By: Relevance
“…Eric et al [9] showed that by assigning 3PIP vendor, the task of constructing compliance proofs for their hardware IP, consumers (SoC integrator) can make sure that the HW they purchase operates within the parameters they have chosen as provable security properties. This is basically an agreement between a SoC integrator and a 3PIP vendor on a pre-defined set of properties which can be verified by SoC integrator.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Eric et al [9] showed that by assigning 3PIP vendor, the task of constructing compliance proofs for their hardware IP, consumers (SoC integrator) can make sure that the HW they purchase operates within the parameters they have chosen as provable security properties. This is basically an agreement between a SoC integrator and a 3PIP vendor on a pre-defined set of properties which can be verified by SoC integrator.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The recent efforts around the Proof Carrying Hardware (PCH) [18,19,8], inspired by the research about Proof Carrying Code (PCC), is promising. The main idea behind PCH is to derive a model from a hardware device implementation written in a Hardware Description Language (HDL).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the equivalence between the model and the implementation has to be established. In this perspective, the Proof Carrying Hardware framework [7,18,19,8] is particulary interesting and we intend to investigate in this direction.…”
Section: Related Workmentioning
confidence: 99%
“…Yet these techniques are not quite effective for trojans in 3PIPs since there is no golden (trojan-free) model for the designer to refer to. Neither are techniques used to detect design bugs, such as RTL verification, effective for detecting trojans in 3PIPs [12], since they are very time consuming and do not scale for complex MPSoCs.…”
Section: A Security Challenges In Mpsoc Designmentioning
confidence: 99%
“…As these techniques require detailed RTL information, their application to third-party IP cores is limited. Another related work [12] requires the check of a 3PIP against pre-defined agreements on security related properties provided by the vendor. Yet developing security related properties for a 3PIP is still in its infancy.…”
Section: Related Workmentioning
confidence: 99%