Abstract | ||
---|---|---|
The security of computing systems relies on trust in hardware. This trust can no longer be assumed due to vulnerabilities in hardware designs. Security methodologies have been proposed for mitigating these threats, offering a variety of security guarantees and wide variance in terms of design-time and runtime costs. From an engineering standpoint it is not clear which of the plethora of solutions should be applied or how they should be implemented. We develop an engineering process for the practical and lightweight inclusion of untrusted third-party hardware design components. We find that by combining previously proposed techniques, we are able to build a microcontroller that uses each design module as if it were untrusted third-party intellectual property. Our experience supports the surprising claim that implementing a chip with untrusted components is not significantly more difficult than implementing a regular one. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/MDT.2013.2247458 | Design & Test, IEEE |
Keywords | Field | DocType |
industrial property,integrated circuit design,microcontrollers,trusted computing,chip,computing system,design module,design-time cost,engineering process,hardware trust,lightweight secure inclusion,microcontroller,runtime cost,security guarantees,security methodology,threat mitigation,untrusted third-party hardware design component,untrusted third-party intellectual property | Trusted Computing,Algorithm design,Computer security,Computer science,Network security,Encryption,Integrated circuit design,Microcontroller,Engineering design process,Intellectual property | Journal |
Volume | Issue | ISSN |
30 | 2 | 2168-2356 |
Citations | PageRank | References |
7 | 0.87 | 4 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adam Waksman | 1 | 342 | 14.64 |
Simha Sethumadhavan | 2 | 925 | 54.24 |
Julianna Eum | 3 | 7 | 0.87 |