Silencing Hardware Backdoors
- 1 May 2011
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP provider. In this paper, we propose techniques that allow us to build trustworthy hardware systems from components designed by untrusted designers or procured from untrusted third-party IP providers. We present the first solution for disabling digital, design-level hardware backdoors. The principle is that rather than try to discover the malicious logic in the design -- an extremely hard problem -- we make the backdoor design problem itself intractable to the attacker. The key idea is to scramble inputs that are supplied to the hardware units at runtime, making it infeasible for malicious components to acquire the information they need to perform malicious actions. We show that the proposed techniques cover the attack space of deterministic, digital HDL backdoors, provide probabilistic security guarantees, and can be applied to a wide variety of hardware components. Our evaluation with the SPEC 2006 benchmarks shows negligible performance loss (less than 1% on average) and that our techniques can be integrated into contemporary microprocessor designs.Keywords
This publication has 12 references indexed in Scilit:
- Computing arbitrary functions of encrypted dataCommunications of the ACM, 2010
- Tamper Evident MicroprocessorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2010
- New design strategy for improving hardware Trojan detection and reducing Trojan activation timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Power supply signal calibration techniques for improving detection resolution to hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- On-demand transparency for improving hardware Trojan detectabilityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A region based approach for the identification of hardware TrojansPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Guided test generation for isolation and detection of embedded trojans in icsPublished by Association for Computing Machinery (ACM) ,2008
- The Hunt For The Kill SwitchIEEE Spectrum, 2008
- A technique to build a secret key in integrated circuits for identification and authentication applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- NooksPublished by Association for Computing Machinery (ACM) ,2002