首页> 外文学位 >Persistent monitoring of digital ICs to verify hardware trust.
【24h】

Persistent monitoring of digital ICs to verify hardware trust.

机译:持续监控数字IC以验证硬件信任度。

获取原文
获取原文并翻译 | 示例

摘要

The specialization of the semiconductor industry has resulted in a global Integrated Circuit (IC) supply chain that is susceptible to hardware Trojans---malicious circuitry that is embedded into the chip during the design cycle. This nefarious attack could compromise the mission-critical systems which implement these devices. While a trusted domestic IC supply chain exists with resources such as the Trusted Foundry Program, it's highly desirable to utilize the high yield, fast turn-around time, low cost, and leading-edge technology of the global IC supply chain. Research into the verification of hardware trust has made significant progress in recent years but is still far from a single, comprehensive solution. Most proposed solutions are one-time implementable methods that attempt to detect hardware Trojans during the verification stage of the IC development process. While this is a desirable solution, it's not realistic given the current limitations of hardware Trojan detection techniques. We propose a more comprehensive solution that involves the persistent verification of hardware trust in the field, in addition to several one-time methods implemented during IC verification. We define a persistent verification framework that involves the use of a few ICs from a secure process flow to persistently monitor and verify the operation of several untrusted ICs from the global supply chain. This allows the system integrator to realize the benefits of the global IC supply chain while maintaining the integrity of the system. We develop a system monitor which filters the IO of untrusted digital ICs for a set of patterns, which we refer to as digital signal signatures , to verify the operation of the devices.
机译:半导体行业的专业化导致全球集成电路(IC)供应链容易受到硬件特洛伊木马程序的侵害-恶意电路在设计周期中被嵌入到芯片中。这种邪恶的攻击可能会损害实现这些设备的关键任务系统。尽管可信的国内IC供应链拥有诸如“可靠的代工计划”之类的资源,但非常需要利用全球IC供应链的高产量,快速周转时间,低成本和领先技术。近年来,对硬件信任验证的研究取得了重大进展,但距离单一,全面的解决方案还差得很远。大多数提出的解决方案都是一次性可实施的方法,这些方法试图在IC开发过程的验证阶段检测硬件木马。尽管这是理想的解决方案,但鉴于硬件Trojan检测技术的当前限制,这是不现实的。我们提出了一种更全面的解决方案,除了在IC验证期间实施的几种一次性方法之外,还涉及对现场硬件信任的持久验证。我们定义了一个持久的验证框架,该框架涉及使用安全流程中的一些IC来持久地监视和验证来自全球供应链的多个不受信任的IC的操作。这使系统集成商能够在保持系统完整性的同时,实现全球IC供应链的优势。我们开发了一种系统监控器,用于过滤不受信任的数字IC的IO以获得一组模式(我们称为数字信号签名),以验证设备的运行情况。

著录项

  • 作者

    Rilling, Justin Richard.;

  • 作者单位

    Iowa State University.;

  • 授予单位 Iowa State University.;
  • 学科 Engineering Computer.
  • 学位 M.S.
  • 年度 2011
  • 页码 68 p.
  • 总页数 68
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号