Journal ArticleDOI
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition
TLDR
A novel framework for facilitating the acquisition of provably trustworthy hardware intellectual property (IP) that draws upon research in the field of proof-carrying code (PCC) to allow for formal yet computationally straightforward validation of security-related properties by the IP consumer.Abstract:
We present a novel framework for facilitating the acquisition of provably trustworthy hardware intellectual property (IP). The proposed framework draws upon research in the field of proof-carrying code (PCC) to allow for formal yet computationally straightforward validation of security-related properties by the IP consumer. These security-related properties, agreed upon a priori by the IP vendor and consumer and codified in a temporal logic, outline the boundaries of trusted operation, without necessarily specifying the exact IP functionality. A formal proof of these properties is then crafted by the vendor and presented to the consumer alongside the hardware IP. The consumer, in turn, can easily and automatically check the correctness of the proof and, thereby, validate compliance of the hardware IP with the agreed-upon properties. We implement the proposed framework using a synthesizable subset of Verilog and a series of pertinent definitions in the Coq theorem-proving language. Finally, we demonstrate the application of this framework on a simple IP acquisition scenario, including specification of security-related properties, Verilog code for two alter- native circuit implementations, as well as proofs of their security compliance.read more
Citations
More filters
Journal ArticleDOI
Hardware Trojan Attacks: Threat Analysis and Countermeasures
TL;DR: The threat of hardware Trojan attacks is analyzed; attack models, types, and scenarios are presented; different forms of protection approaches are discussed; and emerging attack modes, defenses, and future research pathways are described.
Journal ArticleDOI
A Primer on Hardware Security: Models, Methods, and Metrics
TL;DR: This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.
Journal ArticleDOI
Benchmarking of Hardware Trojans and Maliciously Affected Circuits
TL;DR: This paper presents a comprehensive vulnerability analysis flow at various levels of abstraction of digital-design, that has been utilized to create a suite of Trojans and ‘trust benchmarks’ that can be used by researchers in the community to compare and contrast various Trojan detection techniques.
Journal ArticleDOI
VeriTrust: Verification for Hardware Trust
TL;DR: VeriTrust is a novel verification technique for hardware trust, namely VeriTrust, which facilitates to detect HTs inserted at design stage and is insensitive to the implementation style of HTs.
Journal ArticleDOI
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
TL;DR: Using an unsupervised clustering analysis, the paper shows that the controllability and observability characteristics of Trojan gates present significant inter-cluster distance from those of genuine gates in a Trojan-inserted circuit, such that Trojan gates are easily distinguishable.
References
More filters
Proceedings ArticleDOI
Proof-carrying code
TL;DR: It is shown in this paper how proof-carrying code might be used to develop safe assembly-language extensions of ML programs and the adequacy of concrete representations for the safety policy, the safety proofs, and the proof validation is proved.
Journal ArticleDOI
A Survey of Hardware Trojan Taxonomy and Detection
TL;DR: A classification of hardware Trojans and a survey of published techniques for Trojan detection are presented.
Proceedings ArticleDOI
Trojan Detection using IC Fingerprinting
TL;DR: These results show that Trojans that are 3-4 orders of magnitude smaller than the main circuit can be detected by signal processing techniques and provide a starting point to address this important problem.
Proceedings ArticleDOI
Hardware Trojan detection using path delay fingerprint
Yier Jin,Yiorgos Makris +1 more
TL;DR: A new behavior-oriented category method is proposed to divide trojans into two categories: explicit payload trojan and implicit payloadtrojan, which makes it possible to construct trojan models and then lower the cost of testing.
Journal ArticleDOI
The Hunt For The Kill Switch
TL;DR: The Trust in Integrated Circuits (TIIC) program as discussed by the authors is a three-year initiative to verify the integrity of the military's integrated circuits, including the F-35.