期刊文献+

Trusted Integrated Circuits: The Problem and Challenges 被引量:5

Trusted Integrated Circuits: The Problem and Challenges
原文传递
导出
摘要 Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed. Hardware security has become more and more important in current information security architecture. Recently collected reports have shown that there may have been considerable hardware attacks prepared for possible military usage from all over the world. Due to the intrinsic difference from software security, hardware security has some special features and challenges. In order to guarantee hardware security, academia has proposed the concept of trusted integrated circuits,which aims at a secure circulation of IC design, manufacture and chip using. This paper reviews the main problems of trusted integrated circuits, and concludes four key domains of the trusted IC, namely the trusted IC design, trusted manufacture,trusted IP protection, and trusted chip authentication. The main challenges in those domains are also analyzed based on the current known techniques. Finally, the main limitations of the current techniques and possible future trends are discussed.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第5期918-928,共11页 计算机科学技术学报(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No.61228204 the National Scienceand Technology Major Project of China under Grant No.2013ZX01039001-002-003
关键词 hardware security trusted integrated circuit hardware Trojan IC authentication IP protection hardware security trusted integrated circuit hardware Trojan IC authentication IP protection
  • 相关文献

参考文献62

  • 1Adee S. The hunt for the kill switch. IEEE Spectrum, 2008, 45(5): 34-39. http://spectrum.ieee.org/semiconductors/desi-gn/the-hunt-for-the-kill-switch, May 2014.
  • 2Markoff J. CYBERWAR: Old trick threatens the newest weapons. The New York Times, Oct. 2009. http://www.ny-times.com/2009/10/27/science/27trojan.html?_ r=2&pagew, Apr. 2014.
  • 3De Mulder E, Ors S B, Preneel B et al. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Computers and Electrical Engineering,2007, 33(5/6): 367-382.
  • 4Dehbaoui A, Lomne V, Maurine P et al. Enhancing electromagnetic attacks using spectral coherence based cartography. In VLSI-SoC: Technologies for Systems Integration, Becker J, Johann M, Reis R (eds.), Springer Berlin Heidelberg, 2011, pp.135-155.
  • 5Da Rolt J, Di Natale G, Flottes M L et al. New security threats against chips containing scan chain structures. In Proc. IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), June 2011, p.110.
  • 6Yang B, Wu K, Karri R. Secure scan: A design-for-test architecture for crypto chips. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2006, 25(10): 2287-2293.
  • 7Bar-El H, Choukri H, Naccache D et al. The sorcerer’s apprentice guide to fault attacks. Proceedings of the IEEE, 2006, 94(2): 370-382.
  • 8Aumiiller C, Bier P, Fischer W et al. Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In Proc. the Cryptographic Hardware and Embedded Systems (CUES), Aug. 2002, pp.260-275.
  • 9Yuan L, Qu G, Ghouti L et al. VLSI design IP protection: Solutions, new challenges, and opportunities. In Proc. the 1st IEEE NASA/ESA Conference on Adaptive Hardware and Systems, June 2006, pp.469-476.
  • 10Rostami M, Koushanfar F, Rajendran J, Karri R. Hardware security: Threat models and metrics. In Proc. International Conference on Computer-Aided Design, Nov. 2013, pp.819-823.

同被引文献37

  • 1ZHANG J, Qu G. A survey on security and trust of FPGA-based systems[ C[//ICFPT 2014: International Conference on Field-Pro- grammable Technology. Piscataway: IEEE, 2014:1-6.
  • 2ZHANG J, LIN Y, LYU Y. et al. A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing[ J]. IEEE Trans- actions on Information Forensics and Security, 2015, 10(6) : 1137 - 1150.
  • 3PAPPU R, RECHT B, TAYLOR J, et al. Physical one-way func- tions[J]. Science, 2002, 297(5589) : 2026 -2030.
  • 4BULENS P, STANDAERT F X, QUISQUATER J J. How to strong- ly link data and its medium: the paper case[ J]. IET Information Se- curity, 2010,4(3) : 125 -136.
  • 5HAMMOURI G, DANA A, SUNAR B. CDs have fingerprints too [C]//CHES 2009: Proceedings of the llth International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 5747. Berlin: Springer, 2009:348 - 362.
  • 6DELVAUS J, VERBAUWHEDE I. Side channel modeling attacks on 65 nm arbiter PUFs exploiting CMOS device noise[ C]// HOST 2013: Proceedings of the 6th Annual IEEE International Symposium on Hardware-Oriented Security and Trust. Piscataway: IEEE, 2013:137 - 142.
  • 7SUH G E, DEVADAS S. Physical unclonable functions for device authentication and secret key generation[ C]//ACM 2007: Proceed- ings of the 44th Annual Design Automation Conference. New York: ACM, 2007:9 - 14.
  • 8GASSEND B L P. Physical random functions [ D]. Cambridge: Massachusetts Institute of Technology, 2003:13 -81.
  • 9GARG A, KIM T T. Design of SRAM PUF with improved uniform- ity and reliability utilizing device aging effect[ C]// ISCAS 2014:Proceedings of the 2014 IEEE International Symposium on Circuits and Systems. Piscataway: IEEE, 2014:1941 - 1944.
  • 10GUAJARDO J, KUMAR S S, SCHRIJEN G, et al. FPGA Intrinsic PUFs and their use for IP protection[ C]// CHES 2007: Proceed- ings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727. Berlin: Springer, 2007:63 - 80.

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部