Detecting malicious modifications of data in third-party intellectual property cores

Jeyavijayan Rajendran, VivekAnanda Vedula, Ramesh Karri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Globalization of the system-on-chIP (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corruption of critical data such as secret key. Our approach develops properties to identify corruption of critical registers. Furthermore, we describe two attacks where computations can be performed on corrupted data without corrupting the critical register. We develop additional properties to detect such attacks. We validate our technique using Trojans in 8051 and RISC processors and AES designs from Trust-Hub.

Original languageEnglish (US)
Title of host publication2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Volume2015-July
ISBN (Print)9781450335201
DOIs
StatePublished - Jul 24 2015
Event52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015 - San Francisco, United States
Duration: Jun 8 2015Jun 12 2015

Other

Other52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015
CountryUnited States
CitySan Francisco
Period6/8/156/12/15

Fingerprint

Intellectual Property
Attack
Reduced instruction set computing
Globalization
Intellectual property
Hardware
Verify
Networks (circuits)
Industry
Design
Intellectual property core
System-on-chip

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering
  • Modeling and Simulation

Cite this

Rajendran, J., Vedula, V., & Karri, R. (2015). Detecting malicious modifications of data in third-party intellectual property cores. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015 (Vol. 2015-July). [7167297] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1145/2744769.2744823

Detecting malicious modifications of data in third-party intellectual property cores. / Rajendran, Jeyavijayan; Vedula, VivekAnanda; Karri, Ramesh.

2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015. Vol. 2015-July Institute of Electrical and Electronics Engineers Inc., 2015. 7167297.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rajendran, J, Vedula, V & Karri, R 2015, Detecting malicious modifications of data in third-party intellectual property cores. in 2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015. vol. 2015-July, 7167297, Institute of Electrical and Electronics Engineers Inc., 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015, San Francisco, United States, 6/8/15. https://doi.org/10.1145/2744769.2744823
Rajendran J, Vedula V, Karri R. Detecting malicious modifications of data in third-party intellectual property cores. In 2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015. Vol. 2015-July. Institute of Electrical and Electronics Engineers Inc. 2015. 7167297 https://doi.org/10.1145/2744769.2744823
Rajendran, Jeyavijayan ; Vedula, VivekAnanda ; Karri, Ramesh. / Detecting malicious modifications of data in third-party intellectual property cores. 2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015. Vol. 2015-July Institute of Electrical and Electronics Engineers Inc., 2015.
@inproceedings{2c41d6bd1cde4d76b0ca54e726ccdb3c,
title = "Detecting malicious modifications of data in third-party intellectual property cores",
abstract = "Globalization of the system-on-chIP (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corruption of critical data such as secret key. Our approach develops properties to identify corruption of critical registers. Furthermore, we describe two attacks where computations can be performed on corrupted data without corrupting the critical register. We develop additional properties to detect such attacks. We validate our technique using Trojans in 8051 and RISC processors and AES designs from Trust-Hub.",
author = "Jeyavijayan Rajendran and VivekAnanda Vedula and Ramesh Karri",
year = "2015",
month = "7",
day = "24",
doi = "10.1145/2744769.2744823",
language = "English (US)",
isbn = "9781450335201",
volume = "2015-July",
booktitle = "2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Detecting malicious modifications of data in third-party intellectual property cores

AU - Rajendran, Jeyavijayan

AU - Vedula, VivekAnanda

AU - Karri, Ramesh

PY - 2015/7/24

Y1 - 2015/7/24

N2 - Globalization of the system-on-chIP (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corruption of critical data such as secret key. Our approach develops properties to identify corruption of critical registers. Furthermore, we describe two attacks where computations can be performed on corrupted data without corrupting the critical register. We develop additional properties to detect such attacks. We validate our technique using Trojans in 8051 and RISC processors and AES designs from Trust-Hub.

AB - Globalization of the system-on-chIP (SoC) design flow has created opportunities for rogue elements in the intellectual property (IP) vendor companies to insert malicious circuits (a.k.a. hardware Trojans) into their IPs. We propose to formally verify third party IPs (3PIPs) for unauthorized corruption of critical data such as secret key. Our approach develops properties to identify corruption of critical registers. Furthermore, we describe two attacks where computations can be performed on corrupted data without corrupting the critical register. We develop additional properties to detect such attacks. We validate our technique using Trojans in 8051 and RISC processors and AES designs from Trust-Hub.

UR - http://www.scopus.com/inward/record.url?scp=84944111585&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84944111585&partnerID=8YFLogxK

U2 - 10.1145/2744769.2744823

DO - 10.1145/2744769.2744823

M3 - Conference contribution

SN - 9781450335201

VL - 2015-July

BT - 2015 52nd ACM/EDAC/IEEE Design Automation Conference, DAC 2015

PB - Institute of Electrical and Electronics Engineers Inc.

ER -