Mudassir Ejaz, Ishaq Unwala, Jiang Lu, Xiaokun Yang
{"title":"Securing Hardware Development Process using Blockchain","authors":"Mudassir Ejaz, Ishaq Unwala, Jiang Lu, Xiaokun Yang","doi":"10.1109/GreenTech52845.2022.9772029","DOIUrl":null,"url":null,"abstract":"Modern microprocessors contain millions of gates and finding a small hidden malicious hardware trojan (HT) is difficult. Additionally, these HTs may not need any additional external input pins to activate. Many solutions have been proposed to find these HTs, but none of the solutions gives promising result due to their limitations. Moreover, pre-silicon verification and post-silicon testing also don't address the issue of HTs. In this paper we present methodology to limit the possibily of inserting HTs based on blockchain technology. It is better to limit the opportunity for insertion of HT than finding them afterwards in the design and fabrication process. We proposed a solution for monitoring hardware development process files to maintain integrity and trustful relationship using encryption and smart contracts in a blockchain network.","PeriodicalId":319119,"journal":{"name":"2022 IEEE Green Technologies Conference (GreenTech)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Green Technologies Conference (GreenTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GreenTech52845.2022.9772029","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Modern microprocessors contain millions of gates and finding a small hidden malicious hardware trojan (HT) is difficult. Additionally, these HTs may not need any additional external input pins to activate. Many solutions have been proposed to find these HTs, but none of the solutions gives promising result due to their limitations. Moreover, pre-silicon verification and post-silicon testing also don't address the issue of HTs. In this paper we present methodology to limit the possibily of inserting HTs based on blockchain technology. It is better to limit the opportunity for insertion of HT than finding them afterwards in the design and fabrication process. We proposed a solution for monitoring hardware development process files to maintain integrity and trustful relationship using encryption and smart contracts in a blockchain network.