{"title":"Trusting the open latent IC backdoors","authors":"F. Koushanfar","doi":"10.1145/2046582.2046584","DOIUrl":null,"url":null,"abstract":"Since the Integrated Circuits (ICs) form the core computing and communication kernels for the personal computing, industries, governments and defense in the modern era, ensuring IC trust -- in the presence of untrusted third-party foundries and unidentified supply chains -- has become a major challenge. The prohibitive cost of manufacturing state-of-the-art ICs in nano-meter scales has made the use of contract foundries and third party Intellectual Property (IP) the dominant microelectronics business practice. The hidden backdoors into the chips are a double-edge sword. On one hand, the clandestine backdoors embedded by the reliable designers or trusted supply chain providers enable tracking or having post-fabrication control of the ICs on the production line and while in-use. On the other hand, the latent backdoors (a.k.a., Trojans) implanted by the untrusted third-party manufacturer or unknown supply chain entities enable the potential external adversaries to control, monitor, or to spy the chip software/data contents and communications.\n In this talk, we question the contemporary IC backdoor research model directed by interested organizations, primarily defense and government. The talk then suggests better understanding of the hidden backdoor disclosure models to improve the quality and impact of the IC Trust research.","PeriodicalId":401412,"journal":{"name":"Scalable Trusted Computing","volume":"198 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Scalable Trusted Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2046582.2046584","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Since the Integrated Circuits (ICs) form the core computing and communication kernels for the personal computing, industries, governments and defense in the modern era, ensuring IC trust -- in the presence of untrusted third-party foundries and unidentified supply chains -- has become a major challenge. The prohibitive cost of manufacturing state-of-the-art ICs in nano-meter scales has made the use of contract foundries and third party Intellectual Property (IP) the dominant microelectronics business practice. The hidden backdoors into the chips are a double-edge sword. On one hand, the clandestine backdoors embedded by the reliable designers or trusted supply chain providers enable tracking or having post-fabrication control of the ICs on the production line and while in-use. On the other hand, the latent backdoors (a.k.a., Trojans) implanted by the untrusted third-party manufacturer or unknown supply chain entities enable the potential external adversaries to control, monitor, or to spy the chip software/data contents and communications.
In this talk, we question the contemporary IC backdoor research model directed by interested organizations, primarily defense and government. The talk then suggests better understanding of the hidden backdoor disclosure models to improve the quality and impact of the IC Trust research.