DocumentCode :
465244
Title :
Trusted Hardware: Can It Be Trustworthy?
Author :
Irvine, Cynthia E. ; Levitt, Karl
Author_Institution :
Naval Postgraduate Sch., Monterey
fYear :
2007
fDate :
4-8 June 2007
Firstpage :
1
Lastpage :
4
Abstract :
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important consideration during hardware design and fabrication. For instance, devices are increasingly required to store confidential information. This includes data such as cryptographic keys, personal information, and the intellectual property (IP) in the device\´s design. Furthermore, computing systems in critical applications must work as specified. Therefore it is important that hardware be designed and fabricated to be trustworthy. Many potential attacks can be used to exploit a computing device. Physical attacks, that monitor power, timing, electromagnetic radiation, etc. can be used to steal confidential information from the system. A "malicious" foundry can perform a number of devious activities including stealing the mask, reverse engineering IP, subverting the hardware through back doors and time bombs, and overproducing counterfeit chips. Design tools can be subverted to insert malicious circuitry, and chip packagers can modify selected devices with their own that provide similar functionality, in addition to underhanded behavior, e.g. stealing information or malfunctioning at critical junctures. The notions of trust and trustworthiness are presented. Although major challenges still confront secure software system development, there has been substantial progress.Techniques that have been useful in the context of software systems are described and their relevance to the hardware domain is discussed. Challenges to trusted hardware development are then explored.
Keywords :
data privacy; field programmable gate arrays; industrial property; logic arrays; microcomputers; microprocessor chips; security of data; FPGA; chip packaging; computing device trustworthiness; confidential information; counterfeit chips; critical information; cryptographic keys; hardware design; hardware fabrication; intellectual property; malicious circuitry; personal information; reverse engineering; trusted hardware development; Cryptography; Electromagnetic radiation; Fabrication; Foundries; Hardware; Intellectual property; Power engineering computing; Radiation monitoring; Software systems; Timing; ASIC; Assurance; Evaluation; FPGA; Hardware; Processor; Security; Threats; Trust; Vulnerabilities;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Design Automation Conference, 2007. DAC '07. 44th ACM/IEEE
Conference_Location :
San Diego, CA
ISSN :
0738-100X
Print_ISBN :
978-1-59593-627-1
Type :
conf
Filename :
4261132
Link To Document :
بازگشت