首页> 外文会议>International Conference on VLSI Design;International Conference on Embedded Systems >Tutorial T2B: Hardware Intellectual Property (IP) Security and Trust: Challenges and Solutions
【24h】

Tutorial T2B: Hardware Intellectual Property (IP) Security and Trust: Challenges and Solutions

机译:教程T2B:硬件知识产权(IP)安全和信任:挑战与解决方案

获取原文

摘要

Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. Growing reliance on reusable, functionally pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, and cloning, counterfeiting, as well as malicious, hard-to-detect hardware modifications in the hardware IPs. The global electronic piracy market is growing rapidly and is now estimated to be over $1B/day [1], of which a significant part is related to hardware IPs. Due to evergrowing computing demands, modern SoCs tend to include many heterogeneous processing IP cores, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities through the 3rd party IP (3-PIP) route - and develop low-cost effective countermeasures. These countermeasures would encompass hardware encryption and obfuscation, intelligent automatic test pattern generation (ATPG), hardware watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of the hardware IPs to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow to establish the necessary trust level of hardware IPs, eventually leading to secure SoC systems. The tutorial presenters with complementary areas of expertise and extensive experience of consulting for leading companies and R&D labs will provide a unique snapshot of the challenges, cutting-edge solutions and open problems in this area. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of four parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various demonstrated attacks and design modification based countermeasures such as hardware watermarking and obfuscation. Part III covers formal methods, simulation-based approaches as well as side channel analysis for security and trust validation in hardware IPs. Finally, Part V concludes this tutorial with discussion on emerging issues and future directions.
机译:可重复使用的硬件知识产权(IP)的片上系统(SoC)设计已成为行业的普遍设计实践,从而大大降低了设计/验证成本,同时满足了积极的上市时间限制。在SoC设计期间,越来越依赖可重复使用的,功能预先认证的硬件IP和各种CAD工具 - 通常从不受​​信任的第三方供应商收集 - 严重影响SoC计算平台的安全性和可信度。硬件IPS在SoC生命周期的不同阶段的主要安全问题包括在IP评估,逆向工程和克隆,伪造的以及恶意,难以检测硬件IP中的恶意的盗版问题。全球电子盗版市场正在迅速增长,现在估计超过1B美元/天[1],其中重要组成部分与硬件IP有关。由于常见的计算需求,现代SoC倾向于包括许多异质加工IP核心,与可重新配置的核心一起。嵌入式FPGA旨在合并可能随着标准和需求的变化而变化的逻辑。这种设计实践大大增加了SoC设计流程中不受信任的组件的数量,并使整体系统安全成为压力问题。由于第三方IP(3-PIP)路线延伸多个不受信任的实体,致力于分析SoC安全问题和攻击模型的危急情况 - 并开展低成本效益的对策。这些对策将包括硬件加密和混淆,智能自动测试模式生成(ATPG),硬件水印和指纹识别,以及源自硬件IP的行为方面的某些分析方法,以使可信操作与不受信任的组件能够实现。在本教程中,我们计划提供基本概念的全面覆盖,以及验证硬件IPS安全和信任的最新进展。它在这个具有挑战性地区以及工业实践中审查了最先进的研究,并指出需要填补的重要差距,以便开发验证和调试流动,以确定硬件IPS的必要信任级别,最终导致安全的SoC系统。辅导演示者具有互补领域的专业领域和广泛的领先公司和研发实验室的经验将提供挑战,尖端解决方案和该地区的开放问题的独特快照。主题的选择涵盖了广泛的频谱,对广泛的受众感兴趣,包括设计,验证,安全性和调试工程师。建议的教程由四部分组成。第一部分介绍了与硬件IPS的信任验证相关的安全漏洞和各种挑战。第二部分涵盖了各种证明的攻击和基于硬件水印和混淆的对策。第III部分涵盖了基于正式的方法,仿真的方法以及硬件IP中的安全性和信任验证的侧频分析。最后,第五部分结束了本辅导,讨论了新兴问题和未来方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号