2011 IEEE Symposium on Security and Privacy 2011
DOI: 10.1109/sp.2011.27
|View full text |Cite
|
Sign up to set email alerts
|

Silencing Hardware Backdoors

Abstract: Abstract-Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP provider. In this paper, we propose techniques that allow us to build trustworthy hardware systems from components designed by untrusted designers or procured from untrusted third-party IP providers.We present the first solution for disabling digital, designlevel hardware backdoors. The p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
59
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 128 publications
(59 citation statements)
references
References 19 publications
0
59
0
Order By: Relevance
“…There have been some recent research efforts to achieve the above objectives via design obfuscation and/or isolation [19][20][21][22]. These solutions facilitate to mitigate some HT threats, but the associated design cost is quite high and there is no guarantee that ICs would be HT-free with these design methodologies.…”
Section: Hardware Trust Challengesmentioning
confidence: 99%
“…There have been some recent research efforts to achieve the above objectives via design obfuscation and/or isolation [19][20][21][22]. These solutions facilitate to mitigate some HT threats, but the associated design cost is quite high and there is no guarantee that ICs would be HT-free with these design methodologies.…”
Section: Hardware Trust Challengesmentioning
confidence: 99%
“…This is basically an agreement between a SoC integrator and a 3PIP vendor on a pre-defined set of properties which can be verified by SoC integrator. Waksman et al [10] instead of discovering the malicious logic in the design, which they believe-is an extremely hard problem-made the backdoor design problem itself intractable to the attacker. They have scrambled the inputs that are supplied to hardware units at runtime, making it infeasible for malicious components to acquire the information they need to perform malicious actions.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Beaumont et al [11] have developed SAFER PATH architecture, which uses instruction, data fragmentation, program replication, and voting to create the computational system that is able to operate safely in the presence of active hardware Trojans. However, both of these works [10,11] lead to systems with considerable area and performance overheads.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Waksman and Sethumadhavan [7] propose bus scrambling, homomorphic cryptography, and time-guards. Bloom et al [10] use a double memory guard to securely pass encrypted data to and from memory.…”
Section: Related Workmentioning
confidence: 99%
“…Most research has focused on preventing the modification of an Integrated Circuit (IC), or methods for detecting a Hardware Trojan once it has been inserted into an IC. However, there can be no guarantee that an IC is free of Hardware Trojans before it is deployed [5], nor, given the large state-space of trigger mechanisms [6] is it possible to reliably prevent the activation of a Hardware Trojan in a device, despite current best efforts [7] [8].…”
Section: Introductionmentioning
confidence: 99%