The Community for Technology Leaders
2011 IEEE Symposium on Security and Privacy (2011)
Oakland, California USA
May 22, 2011 to May 25, 2011
ISSN: 1081-6011
ISBN: 978-0-7695-4402-1
pp: 49-63
Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or a third-party IP provider. In this paper, we propose techniques that allow us to build trustworthy hardware systems from components designed by untrusted designers or procured from untrusted third-party IP providers. We present the first solution for disabling digital, design-level hardware backdoors. The principle is that rather than try to discover the malicious logic in the design -- an extremely hard problem -- we make the backdoor design problem itself intractable to the attacker. The key idea is to scramble inputs that are supplied to the hardware units at runtime, making it infeasible for malicious components to acquire the information they need to perform malicious actions. We show that the proposed techniques cover the attack space of deterministic, digital HDL backdoors, provide probabilistic security guarantees, and can be applied to a wide variety of hardware components. Our evaluation with the SPEC 2006 benchmarks shows negligible performance loss (less than 1% on average) and that our techniques can be integrated into contemporary microprocessor designs.
hardware, security, performance, backdoors, triggers, obfuscation

S. Sethumadhavan and A. Waksman, "Silencing Hardware Backdoors," 2011 IEEE Symposium on Security and Privacy(SP), Oakland, California USA, 2011, pp. 49-63.
97 ms
(Ver 3.3 (11022016))