Skip to main content
Erschienen in:
Buchtitelbild

2021 | OriginalPaper | Buchkapitel

1. Blockchain-Enabled Electronics Supply Chain Assurance

verfasst von : Fahim Rahman, Mark Tehranipoor

Erschienen in: Emerging Topics in Hardware Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives as well as in critical infrastructures such as power grid, satellite communication, and public transportation. In the past few decades, the software running on these systems has received quite a bit of attention regarding security. Hardware has been assumed to be trustworthy and reliable “by default” without really analyzing the vulnerabilities in the electronics supply chain. With the rapid globalization of the semiconductor industry, it has become challenging to ensure the integrity and security of hardware. In this chapter, we discuss the integrity concerns associated with a globalized electronics supply chain. We divide the supply chain into distinct participants and entities and analyze the vulnerabilities and threats associated with each stage. To address the concerns of the supply chain integrity, we analyze the prospect of a blockchain-based certificate authority framework that can be used to manage critical chip information such as electronic chip identification (ECID), chip grade, transaction time, etc. The decentralized nature of the data-centric verification framework can mitigate most threats of electronics supply chain, such as recycling, remarking, cloning, and overproduction.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat X. Xu, F. Rahman, B. Shakya, A. Vassilev, D. Forte, M. Tehranipoor, Electronics supply chain integrity enabled by blockchain. ACM Trans. Des. Autom. Electron. Syst. 24(3), 1–25 (2019)CrossRef X. Xu, F. Rahman, B. Shakya, A. Vassilev, D. Forte, M. Tehranipoor, Electronics supply chain integrity enabled by blockchain. ACM Trans. Des. Autom. Electron. Syst. 24(3), 1–25 (2019)CrossRef
2.
Zurück zum Zitat G.E. Moore et al., Cramming more components onto integrated circuits. Proc. IEEE 86(1), 82–85 (1998)CrossRef G.E. Moore et al., Cramming more components onto integrated circuits. Proc. IEEE 86(1), 82–85 (1998)CrossRef
3.
Zurück zum Zitat Defense Science Board, Defense science board task force on high performance microchip supply. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (2005) Defense Science Board, Defense science board task force on high performance microchip supply. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (2005)
4.
Zurück zum Zitat M.M. Tehranipoor, U. Guin, D. Forte, Counterfeit integrated circuits, in Counterfeit Integrated Circuits (Springer, Berlin, 2015), pp. 15–36 M.M. Tehranipoor, U. Guin, D. Forte, Counterfeit integrated circuits, in Counterfeit Integrated Circuits (Springer, Berlin, 2015), pp. 15–36
5.
Zurück zum Zitat M.M. Tehranipoor, U. Guin, S. Bhunia, Invasion of the hardware snatchers. IEEE Spectr. 54(5), 36–41 (2017)CrossRef M.M. Tehranipoor, U. Guin, S. Bhunia, Invasion of the hardware snatchers. IEEE Spectr. 54(5), 36–41 (2017)CrossRef
6.
Zurück zum Zitat X. Zhang, M. Tehranipoor, Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Trans. Very Large Scale Integr. Syst. 22(5), 1016–1029 (2013)CrossRef X. Zhang, M. Tehranipoor, Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Trans. Very Large Scale Integr. Syst. 22(5), 1016–1029 (2013)CrossRef
7.
Zurück zum Zitat U. Guin, X. Zhang, D. Forte, M. Tehranipoor, Low-cost on-chip structures for combating die and IC recycling, in 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC) (2014) U. Guin, X. Zhang, D. Forte, M. Tehranipoor, Low-cost on-chip structures for combating die and IC recycling, in 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC) (2014)
8.
Zurück zum Zitat M. Tehranipoor, H. Salmani, X. Zhang, Integrated Circuit Authentication (Springer, Cham., 2014)CrossRef M. Tehranipoor, H. Salmani, X. Zhang, Integrated Circuit Authentication (Springer, Cham., 2014)CrossRef
9.
Zurück zum Zitat N. Kae-Nune, S. Pesseguier, Qualification and testing process to implement anti-counterfeiting technologies into IC packages, in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013 (IEEE, Piscataway, 2013), pp. 1131–1136 N. Kae-Nune, S. Pesseguier, Qualification and testing process to implement anti-counterfeiting technologies into IC packages, in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013 (IEEE, Piscataway, 2013), pp. 1131–1136
10.
Zurück zum Zitat X. Zhang, M. Tehranipoor, Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Trans. Very Large Scale Integr. Syst. 22(5), 1016–1029 (2014)CrossRef X. Zhang, M. Tehranipoor, Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Trans. Very Large Scale Integr. Syst. 22(5), 1016–1029 (2014)CrossRef
11.
Zurück zum Zitat F. Koushanfar, G. Qu, Hardware metering, in Proceedings of the 38th Annual Design Automation Conference (ACM, New York, 2001), pp. 490–493 F. Koushanfar, G. Qu, Hardware metering, in Proceedings of the 38th Annual Design Automation Conference (ACM, New York, 2001), pp. 490–493
12.
Zurück zum Zitat J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in 2004 Symposium on VLSI Circuits, 2004. Digest of Technical Papers (IEEE, Piscataway, 2004), pp. 176–179 J.W. Lee, D. Lim, B. Gassend, G.E. Suh, M. Van Dijk, S. Devadas, A technique to build a secret key in integrated circuits for identification and authentication applications, in 2004 Symposium on VLSI Circuits, 2004. Digest of Technical Papers (IEEE, Piscataway, 2004), pp. 176–179
13.
Zurück zum Zitat G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th Annual Design Automation Conference (ACM, New York, 2007), pp. 9–14 G.E. Suh, S. Devadas, Physical unclonable functions for device authentication and secret key generation, in Proceedings of the 44th Annual Design Automation Conference (ACM, New York, 2007), pp. 9–14
14.
Zurück zum Zitat R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002)CrossRef R. Pappu, B. Recht, J. Taylor, N. Gershenfeld, Physical one-way functions. Science 297(5589), 2026–2030 (2002)CrossRef
15.
Zurück zum Zitat G.K. Contreras, M.T. Rahman, M. Tehranipoor, Secure split-test for preventing IC piracy by untrusted foundry and assembly, in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (IEEE, Piscataway, 2013), pp. 196–203 G.K. Contreras, M.T. Rahman, M. Tehranipoor, Secure split-test for preventing IC piracy by untrusted foundry and assembly, in 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (IEEE, Piscataway, 2013), pp. 196–203
16.
Zurück zum Zitat X. Wang, D. Zhang, M. He, D. Su, M. Tehranipoor, Secure scan and test using obfuscation throughout supply chain. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(6), 1867–1880 (2017) X. Wang, D. Zhang, M. He, D. Su, M. Tehranipoor, Secure scan and test using obfuscation throughout supply chain. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(6), 1867–1880 (2017)
17.
Zurück zum Zitat M.T. Rahman, D. Forte, Q. Shi, G.K. Contreras, M. Tehranipoor, CSST: preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly, in IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (2014), pp. 46–51 M.T. Rahman, D. Forte, Q. Shi, G.K. Contreras, M. Tehranipoor, CSST: preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly, in IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (2014), pp. 46–51
18.
Zurück zum Zitat D. Zhang, M. He, X. Wang, M. Tehranipoor, Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain, in IEEE 35th VLSI Test Symposium (VTS), 2017 D. Zhang, M. He, X. Wang, M. Tehranipoor, Dynamically obfuscated scan for protecting IPs against scan-based attacks throughout supply chain, in IEEE 35th VLSI Test Symposium (VTS), 2017
19.
Zurück zum Zitat C. Lamech, R.M. Rad, M. Tehranipoor, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. IEEE Trans. Inf. Forensics Secur. 6(3), 1170–1179 (2011)CrossRef C. Lamech, R.M. Rad, M. Tehranipoor, J. Plusquellic, An experimental analysis of power and delay signal-to-noise requirements for detecting Trojans and methods for achieving the required detection sensitivities. IEEE Trans. Inf. Forensics Secur. 6(3), 1170–1179 (2011)CrossRef
20.
Zurück zum Zitat M.T.M. Li, A. Davoodi, A sensor-assisted self-authentication framework for hardware Trojan detection, in Design, Automation & Test in Europe Conference & Exhibition (DATE) (2012), pp. 1331–1336 M.T.M. Li, A. Davoodi, A sensor-assisted self-authentication framework for hardware Trojan detection, in Design, Automation & Test in Europe Conference & Exhibition (DATE) (2012), pp. 1331–1336
21.
Zurück zum Zitat K. Xiao, D. Forte, M. Tehranipoor, Efficient and secure split manufacturing via obfuscated built-in self-authentication, in IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2015), pp. 14–19 K. Xiao, D. Forte, M. Tehranipoor, Efficient and secure split manufacturing via obfuscated built-in self-authentication, in IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (2015), pp. 14–19
22.
Zurück zum Zitat M. Pilkington, Blockchain technology: principles and applications. Browser Download This Paper (2015) M. Pilkington, Blockchain technology: principles and applications. Browser Download This Paper (2015)
23.
Zurück zum Zitat N. Subramanian, A. Chaudhuri, Y. Kayıkcı, Blockchain and Supply Chain Logistics: Evolutionary Case Studies (Springer, Berlin, 2020)CrossRef N. Subramanian, A. Chaudhuri, Y. Kayıkcı, Blockchain and Supply Chain Logistics: Evolutionary Case Studies (Springer, Berlin, 2020)CrossRef
24.
Zurück zum Zitat Y. Lu, Blockchain: a survey on functions, applications and open issues. J. Ind. Integr. Manag. 3(4), 1850015 (2018) Y. Lu, Blockchain: a survey on functions, applications and open issues. J. Ind. Integr. Manag. 3(4), 1850015 (2018)
25.
Zurück zum Zitat N. Tuzzio, K. Xiao, X. Zhang, M. Tehranipoor, A zero-overhead IC identification technique using clock sweeping and path delay analysis, in Proceedings of the Great Lakes Symposium on VLSI (2012), pp. 95–98 N. Tuzzio, K. Xiao, X. Zhang, M. Tehranipoor, A zero-overhead IC identification technique using clock sweeping and path delay analysis, in Proceedings of the Great Lakes Symposium on VLSI (2012), pp. 95–98
26.
Zurück zum Zitat N. Asadizanjani, M. Tehranipoor, D. Forte, PCB reverse engineering using nondestructive x-ray tomography and advanced image processing. IEEE Trans. Compon. Packag. Manuf. Technol. 7(2), 292–299 (2017) N. Asadizanjani, M. Tehranipoor, D. Forte, PCB reverse engineering using nondestructive x-ray tomography and advanced image processing. IEEE Trans. Compon. Packag. Manuf. Technol. 7(2), 292–299 (2017)
27.
Zurück zum Zitat N. Asadizanjani, M. Tehranipoor, D. Forte, Counterfeit electronics detection using image processing and machine learning, in Journal of Physics: Conference Series, vol. 787(1) (IOP Publishing, Bristol, 2017), p. 012023 N. Asadizanjani, M. Tehranipoor, D. Forte, Counterfeit electronics detection using image processing and machine learning, in Journal of Physics: Conference Series, vol. 787(1) (IOP Publishing, Bristol, 2017), p. 012023
28.
Zurück zum Zitat K. Huang, J.M. Carulli, Y. Makris, Parametric counterfeit IC detection via support vector machines, in 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (IEEE, Piscataway, 2012), pp. 7–12 K. Huang, J.M. Carulli, Y. Makris, Parametric counterfeit IC detection via support vector machines, in 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT) (IEEE, Piscataway, 2012), pp. 7–12
29.
Zurück zum Zitat M.H. Tehranipour, N. Ahmed, M. Nourani, Testing SOC interconnects for signal integrity using boundary scan, in Proceedings. 21st VLSI Test Symposium (IEEE, Piscataway, 2003), pp. 158–163 M.H. Tehranipour, N. Ahmed, M. Nourani, Testing SOC interconnects for signal integrity using boundary scan, in Proceedings. 21st VLSI Test Symposium (IEEE, Piscataway, 2003), pp. 158–163
30.
Zurück zum Zitat M. Yilmaz, K. Chakrabarty, M. Tehranipoor, Test-pattern selection for screening small-delay defects in very-deep submicrometer integrated circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 29(5), 760–773 (2010)CrossRef M. Yilmaz, K. Chakrabarty, M. Tehranipoor, Test-pattern selection for screening small-delay defects in very-deep submicrometer integrated circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 29(5), 760–773 (2010)CrossRef
31.
Zurück zum Zitat E. Castillo, U. Meyer-Baese, A. García, L. Parrilla, A. Lloris, IPP@ HDL: efficient intellectual property protection scheme for IP cores. IEEE Trans. Very Large Scale Integr. Syst. 15(5), 578–591 (2007)CrossRef E. Castillo, U. Meyer-Baese, A. García, L. Parrilla, A. Lloris, IPP@ HDL: efficient intellectual property protection scheme for IP cores. IEEE Trans. Very Large Scale Integr. Syst. 15(5), 578–591 (2007)CrossRef
32.
Zurück zum Zitat J.J. Rajendran, O. Sinanoglu, R. Karri, Is split manufacturing secure? in Proceedings of the Conference on Design, Automation and Test in Europe (EDA Consortium, San Jose, 2013), pp. 1259–1264 J.J. Rajendran, O. Sinanoglu, R. Karri, Is split manufacturing secure? in Proceedings of the Conference on Design, Automation and Test in Europe (EDA Consortium, San Jose, 2013), pp. 1259–1264
33.
Zurück zum Zitat M. Miller, J. Meraglia, J. Hayward, Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts, SAE Technical Paper, Tech. Rep., 2012 M. Miller, J. Meraglia, J. Hayward, Traceability in the age of globalization: a proposal for a marking protocol to assure authenticity of electronic parts, SAE Technical Paper, Tech. Rep., 2012
34.
Zurück zum Zitat C. Kuemin, L. Nowack, L. Bozano, n.d. Spencer, H. Wolf, Oriented assembly of gold nanorods on the single-particle level. Adv. Funct. Mater. 22(4), 702–708 (2012) C. Kuemin, L. Nowack, L. Bozano, n.d. Spencer, H. Wolf, Oriented assembly of gold nanorods on the single-particle level. Adv. Funct. Mater. 22(4), 702–708 (2012)
35.
Zurück zum Zitat M.T. Rahman, F. Rahman, D. Forte, M. Tehranipoor, An aging-resistant RO-PUF for reliable key generation. IEEE Transactions on Emerging Topics in Computing 4(3), 335–348 (2015) M.T. Rahman, F. Rahman, D. Forte, M. Tehranipoor, An aging-resistant RO-PUF for reliable key generation. IEEE Transactions on Emerging Topics in Computing 4(3), 335–348 (2015)
36.
Zurück zum Zitat U. Guin, K. Huang, D. DiMase, J.M. Carulli, M. Tehranipoor, Y. Makris, Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)CrossRef U. Guin, K. Huang, D. DiMase, J.M. Carulli, M. Tehranipoor, Y. Makris, Counterfeit integrated circuits: a rising threat in the global semiconductor supply chain. Proc. IEEE 102(8), 1207–1228 (2014)CrossRef
37.
Zurück zum Zitat S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system (2008) S. Nakamoto, Bitcoin: a peer-to-peer electronic cash system (2008)
38.
Zurück zum Zitat E. Staff, Blockchains: the great chain of being sure about things. Economist. Retrieved 18 (2016) E. Staff, Blockchains: the great chain of being sure about things. Economist. Retrieved 18 (2016)
39.
Zurück zum Zitat A.M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies (O’Reilly Media, Newton, 2014) A.M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies (O’Reilly Media, Newton, 2014)
40.
Zurück zum Zitat F. Casino, T.K. Dasaklis, C. Patsakis, A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform. 36, 55–81 (2019)CrossRef F. Casino, T.K. Dasaklis, C. Patsakis, A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform. 36, 55–81 (2019)CrossRef
41.
Zurück zum Zitat M.J. Dworkin, SHA-3 standard: permutation-based hash and extendable-output functions. Tech. Rep., 2015 M.J. Dworkin, SHA-3 standard: permutation-based hash and extendable-output functions. Tech. Rep., 2015
42.
Zurück zum Zitat K.S. Nash, IBM pushes blockchain into the supply chain. Wall Street J. (2016) K.S. Nash, IBM pushes blockchain into the supply chain. Wall Street J. (2016)
48.
Zurück zum Zitat R.C. Merkle, Method of providing digital signatures. Jan. 5 1982, U.S. Patent 4,309,569 R.C. Merkle, Method of providing digital signatures. Jan. 5 1982, U.S. Patent 4,309,569
Metadaten
Titel
Blockchain-Enabled Electronics Supply Chain Assurance
verfasst von
Fahim Rahman
Mark Tehranipoor
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-64448-2_1

Neuer Inhalt