Securing Hardware Development Process using Blockchain

Mudassir Ejaz, Ishaq Unwala, Jiang Lu, Xiaokun Yang
{"title":"Securing Hardware Development Process using Blockchain","authors":"Mudassir Ejaz, Ishaq Unwala, Jiang Lu, Xiaokun Yang","doi":"10.1109/GreenTech52845.2022.9772029","DOIUrl":null,"url":null,"abstract":"Modern microprocessors contain millions of gates and finding a small hidden malicious hardware trojan (HT) is difficult. Additionally, these HTs may not need any additional external input pins to activate. Many solutions have been proposed to find these HTs, but none of the solutions gives promising result due to their limitations. Moreover, pre-silicon verification and post-silicon testing also don't address the issue of HTs. In this paper we present methodology to limit the possibily of inserting HTs based on blockchain technology. It is better to limit the opportunity for insertion of HT than finding them afterwards in the design and fabrication process. We proposed a solution for monitoring hardware development process files to maintain integrity and trustful relationship using encryption and smart contracts in a blockchain network.","PeriodicalId":319119,"journal":{"name":"2022 IEEE Green Technologies Conference (GreenTech)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Green Technologies Conference (GreenTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GreenTech52845.2022.9772029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Modern microprocessors contain millions of gates and finding a small hidden malicious hardware trojan (HT) is difficult. Additionally, these HTs may not need any additional external input pins to activate. Many solutions have been proposed to find these HTs, but none of the solutions gives promising result due to their limitations. Moreover, pre-silicon verification and post-silicon testing also don't address the issue of HTs. In this paper we present methodology to limit the possibily of inserting HTs based on blockchain technology. It is better to limit the opportunity for insertion of HT than finding them afterwards in the design and fabrication process. We proposed a solution for monitoring hardware development process files to maintain integrity and trustful relationship using encryption and smart contracts in a blockchain network.
使用区块链保护硬件开发过程
现代微处理器包含数百万个门,发现一个隐藏的小型恶意硬件木马(HT)是很困难的。此外,这些ht可能不需要任何额外的外部输入引脚来激活。人们提出了许多方法来寻找这些高温超导,但由于它们的局限性,没有一种方法能给出令人满意的结果。此外,硅前验证和硅后测试也没有解决高温测试的问题。在本文中,我们提出了一种方法来限制基于区块链技术插入ht的可能性。最好限制插入HT的机会,而不是在设计和制造过程中发现它们。我们提出了一种在区块链网络中使用加密和智能合约来监控硬件开发过程文件以保持完整性和信任关系的解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信