Hardware Security and Trust
Hardware security and trust issues span a broad spectrum of topics, including
- the malicious insertion of hardware Trojans designed to act as silicon time bombs by enabling chips upon fabrication and disabling them upon tampering,
- intellectual property (IP) and integrated circuit (IC) piracy,
- digital rights management,
- untrusted third-party IP cores,
- attacks designed to extract encryption keys and IP from ICs, and
- malicious system disruption and diversion.
This month's theme includes the following featured articles:
A Survey of Hardware Trojan Taxonomy and Detection
Today's integrated circuits are vulnerable to hardware Trojans, malicious alterations to the circuit, either during design or fabrication. Read a classification of hardware Trojans and a survey of published techniques for Trojan detection. More »
Hardware Trojans in Wireless Cryptographic ICs
Hardware Trojans in wireless cryptographic ICs are designed to leak secret information through the wireless channel. Learn about the challenges of detecting such Trojans and a proposed statistical analysis of side-channel signals that could help.
Preventing IC Piracy Using Reconfigurable Logic Barriers
Hardware metering to prevent IC piracy is a challenging and important problem. This proposed combinational locking scheme, based on intelligent placement of the barriers throughout the design, aims to maximize the barriers' effectiveness and to minimize overhead. More »
Design Methods for Security and Trust
Security and trust are often an afterthought in the design of embedded computers, but should be a first-order concern. Learn about a methodology for the design of secure and trusted electronic embedded systems. More »
The Trojan Stable: A Special Last Byte
The walls may not have ears but, unless the recommendations for hardware security and trust in this month's theme are followed, the picture frames hanging on the wall might. More »
This special issue includes four articles covering various aspects of hardware security and trust and provides insight and novel solutions for addressing these challenges.
In this issue
In "A Survey of Hardware Trojan Taxonomy and Detection," we discuss vulnerabilities in today's design and fabrication processes and the possibility of malicious circuit insertion into a design that can impact the design's functionality or enable transmitting key information to the adversary. The hardware Trojan detection problem has gained significant attention over the past few years, and we provide a comprehensive overview and analysis of the current state of knowledge in this area.
The second article, "Hardware Trojans in Wireless Cryptographic ICs" by Yier Jin and Yiogos Makris, studies the problem of hardware Trojans in wireless cryptographic ICs. Using a mixed-signal SoC, Jin and Makris demonstrate that simple malicious modifications to the digital part of a wireless cryptographic chip would suffice to leak information without changing the more sensitive analog part. They design two hardware Trojans that leak the encryption key by manipulating the transmission amplitude or frequency. The Trojans are designed so that they change neither the functionality of the digital part nor the performance of the analog part, and their impact on the wireless transmission parameters can be hidden within the fabrication process variations. The authors present an advanced statistical analysis for the transmission power to reveal a Trojan's presence.
"Hardware Trojan Horse Detection Using Gate-Level Characterization," by M. Potkonjak et al. (login required), provides an impetus for hardware Trojan research by creating a generic and easily applicable set of techniques and tools for Trojan detection. The authors introduce a technique for recovery of characteristics of gates in terms of leakage current, switching power, and delay, which uses linear programming to solve a system of equations created by non-destructive measurements of power or delays.
In the fourth article, "Design Methods for Security and Trust," I. Verbauwhede and P. Schaumont argue that security and trust are usually an afterthought during the design of ubiquitous and embedded computers. The authors outline a methodology for the design of secure and trusted electronic embedded systems, which builds on identifying the secure-sensitive part of a system and iteratively partitioning and protecting it at all levels of design abstraction.
The fifth article, "Silicon Physical Random Functions" by B. Gassend et al. (login required), describes the notion of physical unclonable functions (PUF) and develops several circuit realizations of different PUFs. The authors describe the application of PUFs to design of secure smart cards, licensing, and certification.
The last article, "Preventing IC Piracy Using Reconfigurable Logic Barriers" by Alex Baumgarten, Akhilesh Tyagi, and Joseph Zambreno, addresses IC piracy prevention. The approach adds reconfigurable logic barriers to the IC pre-fabrication. These barriers separate the inputs from the outputs such that every path from inputs to outputs passes through a barrier. The IC would function correctly only when the correct keys are applied to the barriers. The barrier insertion heuristic utilizes the don't-care sets and the node locations in the network to maximize the reverse-engineering effort while limiting the overhead.
We sincerely hope that you will enjoy reading this special issue, and we would like to thank all the authors for their tremendous efforts in producing these high-quality articles.
Getting Started with Google App Engine and Clojure
Learn how to use Clojure, a relatively new but robust Lisp implementation on the Java Virtual Machine, to create and deploy an application on the Google App Engine platform. More »
Least-Cost Avoiders in Online Fraud and Abuse
Harvard Business School's Ben Edelman thinks consumers browsing online need as much protection as those reading a newspaper or visiting a retail store—and outlines a proposal to achieve that. More »
Story Time for the 21st Century
An interactive book-reading system couples videoconferencing with paper books and interactive content to help grandparents read with their grandchildren over the Internet. More »
Programming Multicores: Do Applications Programmers Need to Write Explicitly Parallel Programs?
A debate from the 36th International Symposium on Computer Architectures sparks a panel discussion: How should applications programmers exploit the potential of multicores? More »
A Tactile Glove Design and Authoring System for Immersive Multimedia
Researchers demonstrate an immersive system for augmenting audiovisual media with on-skin sensations in a glove-based design and authoring tool. More »
Up in the Air: Moving Your Applications to the Cloud
This overview goes beyond hype by characterizing cloud computing's unique requirements, suggesting ways to pick the right cloud services and infrastructures, and comparing major products. More »
Experimental Platforms for Computational Photography
Learn about one lab's solution for an open architecture for portable, programmable cameras with sufficient image quality and computing power to use for everyday photography. More »
The Emergence of Intelligent Enterprises: From CPS to CPSS
The rapid development and application of cyber-physical-social systems raise compelling technological, economic, and social implications. What is CPSS's role in today's connected world? More »
Using Python for Signal Processing and Visualization
Applying Python to a neuroscience project let developers put complex data processing and advanced visualization techniques together in a coherent framework. More »