4.7 Article

A Primer on Hardware Security: Models, Methods, and Metrics

Journal

PROCEEDINGS OF THE IEEE
Volume 102, Issue 8, Pages 1283-1295

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2014.2335155

Keywords

Counterfeiting; hardware Trojans; IP piracy; reverse engineering; side-channel attacks

Funding

  1. U.S. Office of Naval Research (ONR) [R17460]
  2. National Science Foundation (NSF) [CNS-1059416, CNS-1059328, CCF-1319841]
  3. NYU/NYU-AD Center for Research in Information Security Studies and Privacy (CRISSP)
  4. ARO [W911NF-13-1-0272]
  5. Direct For Computer & Info Scie & Enginr
  6. Division Of Computer and Network Systems [1059416] Funding Source: National Science Foundation
  7. Division Of Computer and Network Systems
  8. Direct For Computer & Info Scie & Enginr [0958405] Funding Source: National Science Foundation

Ask authors/readers for more resources

The multinational, distributed, and multistep nature of integrated circuit (IC) production supply chain has introduced hardware-based vulnerabilities. Existing literature in hardware security assumes ad hoc threat models, defenses, and metrics for evaluation, making it difficult to analyze and compare alternate solutions. This paper systematizes the current knowledge in this emerging field, including a classification of threat models, state-of-the-art defenses, and evaluation metrics for important hardware-based attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Hardware & Architecture

How Secure Are Checkpoint-Based Defenses in Digital Microfluidic Biochips?

Mohammed Shayan, Sukanta Bhattacharjee, Robert Wille, Krishnendu Chakrabarty, Ramesh Karri

Summary: A digital microfluidic biochip (DMFB) is a miniaturized laboratory capable of implementing biochemical protocols, with a network connection, commonly used in medical diagnosis, drug development, and personalized medicine. Ensuring the security of DMFB CPS is crucial for their successful deployment, and recent research has focused on developing defense mechanisms such as checkpoints to enhance security.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning

Mojan Javaheripi, Mohammad Samragh, Bita Darvish Rouhani, Tara Javidi, Farinaz Koushanfar

Summary: CuRTAIL is a novel end-to-end computing framework designed to prevent adversarial attacks and has shown effectiveness against adversarial samples. The framework employs an unsupervised approach to validate the legitimacy of input samples, ensuring effective defense against generic attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

The Fusion of Secure Function Evaluation and Logic Synthesis

Siam U. Hussain, M. Sadegh Riazi, Farinaz Koushanfar

Summary: Designing custom secure function evaluation compilers has been a popular research area, yet integrated circuit synthesis tools with intelligent adaptation outperform them. It is time for custom compilers to adopt this trend.

IEEE SECURITY & PRIVACY (2021)

Article Computer Science, Information Systems

A Taxonomy of Attacks on Federated Learning

Malhar Jere, Tyler Farnan, Farinaz Koushanfar

Summary: Federated learning is a privacy-focused framework for training deep neural networks from decentralized data sources, but it is vulnerable to numerous attacks. A more robust threat modeling is needed to enhance security in federated learning environments.

IEEE SECURITY & PRIVACY (2021)

Article Engineering, Electrical & Electronic

A Survey of Cybersecurity of Digital Manufacturing

Priyanka Mahesh, Akash Tiwari, Chenglu Jin, Panganamala R. Kumar, A. L. Narasimha Reddy, Satish T. S. Bukkapatanam, Nikhil Gupta, Ramesh Karri

Summary: The Industry 4.0 concept advocates a digital manufacturing paradigm to enhance production efficiency and quality through the integration of various manufacturing technologies and systems.

PROCEEDINGS OF THE IEEE (2021)

Article Computer Science, Hardware & Architecture

Security Against Data-Sniffing and Alteration Attacks in IJTAG

Rana Elnaggar, Ramesh Karri, Krishnendu Chakrabarty

Summary: The study introduces two security architectures for protecting IJTAG, one providing protection against data alteration but not against data-sniffing attacks, and the other addressing both data alteration and data-sniffing attacks at the cost of timing overhead.

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (2021)

Article Engineering, Electrical & Electronic

Causative Cyberattacks on Online Learning-Based Automated Demand Response Systems

Samrat Acharya, Yury Dvorkin, Ramesh Karri

Summary: Power utilities and third-party aggregators are using AI to learn energy usage patterns of consumers and design optimal DR incentives, but this approach is vulnerable to data integrity attacks.

IEEE TRANSACTIONS ON SMART GRID (2021)

Article Computer Science, Hardware & Architecture

Trojan Detection in Embedded Systems With FinFET Technology

Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Joerg Henkel, Ramesh Karri, Farshad Khorrami

Summary: This study explores a non-destructive method for detecting Trojans in circuits using FinFET technology. The method utilizes short-term aging effects and circuit overclocking to induce bit errors at the circuit outputs, while employing Machine Learning tools to learn Trojan-free behavior. The results demonstrate the effectiveness of the method in FinFET technology, with robust Trojan detection capabilities across different chips.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Engineering, Electrical & Electronic

Cyber Insurance Against Cyberattacks on Electric Vehicle Charging Stations

Samrat Acharya, Robert Mieth, Charalambos Konstantinou, Ramesh Karri, Yury Dvorkin

Summary: This paper proposes cyber insurance for public Electric Vehicle Charging Stations (EVCSs) to hedge the economic loss caused by cyberattacks and develops a data-driven model to determine the optimal insurance premium. The study emphasizes the importance of risk assessment in designing insurance premiums and suggests deploying state-of-the-art defense mechanisms to reduce insurance costs.

IEEE TRANSACTIONS ON SMART GRID (2022)

Article Computer Science, Hardware & Architecture

AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks

Mojan Javaheripi, Jung-Woo Chang, Farinaz Koushanfar

Summary: AccHashtag is the first framework for high-accuracy detection of fault-injection attacks on DNNs with provable bounds on detection performance. It extracts a unique signature from the benign DNN prior to deployment to validate the model's integrity and verify the inference output on the fly. AccHashtag identifies the most vulnerable DNN layers to the fault-injection attack using a novel sensitivity analysis.

ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

AdaTest: Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

Huili Chen, Xinqiao Zhang, Ke Huang, Farinaz Koushanfar

Summary: This paper proposes AdaTest, a novel adaptive test pattern generation framework for efficient and reliable Hardware Trojan (HT) detection. AdaTest improves the scalability and accuracy of HT detection techniques, especially for small Trojans in the presence of noise and variations. It leverages Reinforcement Learning (RL) for high trigger coverage and employs adaptive sampling to prioritize test samples that provide more information for HT detection. AdaTest's optimized on-chip architecture minimizes hardware overhead and achieves significant speedup and test set size reduction compared to prior works, while maintaining a high Trojan detection rate.

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS (2023)

Article Computer Science, Theory & Methods

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Andre Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Ruehrmair, Jakub Szefer

Summary: This paper details a new attack method that exploits the decay properties of off-the-shelf DRAM modules to spy on the temperature in the vicinity of the IoT device. It shows that this attack can be performed remotely and purely digitally by compromising the device's software. The presented attack works even in devices without a dedicated temperature sensor onboard.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Proceedings Paper Computer Science, Information Systems

FLAME: Taming Backdoors in Federated Learning

Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Moellering, Hossein Fereidooni, Samuel Marchal, Markus Miedinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider

Summary: Federated Learning (FL) allows collaborative model training without sharing private data, but is vulnerable to backdoor attacks. Existing defenses either focus on specific attacker models or degrade model performance. FLAME introduces a defense framework that estimates noise injection to eliminate backdoors while maintaining benign performance. Evaluation on various datasets demonstrates FLAME's effectiveness with minimal impact on model performance.

PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM (2022)

Proceedings Paper Computer Science, Artificial Intelligence

Cross-modal Adversarial Reprogramming

Paarth Neekhara, Shehzeen Hussain, Jinglong Du, Shlomo Dubnov, Farinaz Koushanfar, Julian McAuley

Summary: With adversarial reprogramming, pre-trained image classification networks can be repurposed for Natural Language Processing (NLP) and other sequence classification tasks without modifying the network architecture or parameters.

2022 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

Special Session: Machine Learning for Semiconductor Test and Reliability

Hussam Amrouch, Animesh Basak Chowdhury, Wentian Jin, Ramesh Karri, Farshad Khorrami, Prashanth Krishnamurthy, Ilia Polian, Victor M. van Santen, Benjamin Tan, Sheldon X-D Tan

Summary: With technology scaling to atomic levels, IC test and diagnosis of complex SoCs are becoming increasingly challenging. Machine learning plays a crucial role in IC test and reliability, addressing issues such as transistor aging and self-heating effects, and aiding in the development of emerging technologies.

2021 IEEE 39TH VLSI TEST SYMPOSIUM (VTS) (2021)

No Data Available