High-Level Approaches to Hardware Security: A Tutorial

07/21/2022
by   Hammond Pearce, et al.
0

Designers use third-party intellectual property (IP) cores and outsource various steps in the integrated circuit (IC) design and manufacturing flow. As a result, security vulnerabilities have been rising. This is forcing IC designers and end users to re-evaluate their trust in ICs. If attackers get hold of an unprotected IC, they can reverse engineer the IC and pirate the IP. Similarly, if attackers get hold of a design, they can insert malicious circuits or take advantage of "backdoors" in a design. Unintended design bugs can also result in security weaknesses. This tutorial paper provides an introduction to the domain of hardware security through two pedagogical examples of hardware security problems. The first is a walk-through of the scan chain-based side channel attack. The second is a walk-through of logic locking of digital designs. The tutorial material is accompanied by open access digital resources that are linked in this article.

READ FULL TEXT
research
06/11/2020

Benchmarking at the Frontier of Hardware Security: Lessons from Logic Locking

Integrated circuits (ICs) are the foundation of all computing systems. T...
research
08/21/2023

Unlocking Hardware Security Assurance: The Potential of LLMs

System-on-Chips (SoCs) form the crux of modern computing systems. SoCs e...
research
04/03/2020

Hardware Trojan with Frequency Modulation

The use of third-party IP cores in implementing applications in FPGAs ha...
research
08/19/2022

A Pragmatic Methodology for Blind Hardware Trojan Insertion in Finalized Layouts

A potential vulnerability for integrated circuits (ICs) is the insertion...
research
10/29/2020

Scalable Attack-Resistant Obfuscation of Logic Circuits

Hardware IP protection has been one of the most critical areas of resear...
research
11/29/2019

Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design

Binary analysis is traditionally used in the realm of malware detection....
research
02/13/2023

Lightweight Encryption and Anonymous Routing in NoC based SoCs

Advances in manufacturing technologies have enabled System-on-Chip (SoC)...

Please sign up or login with your details

Forgot password? Click here to reset