Skip to main content

2018 | OriginalPaper | Buchkapitel

Secure Outsourcing of Cryptographic Circuits Manufacturing

verfasst von : Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi

Erschienen in: Provable Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The fabrication process of integrated circuits (ICs) is complex and requires the use of off-shore foundries to lower the costs and to have access to leading-edge manufacturing facilities. Such an outsourcing trend leaves the possibility of inserting malicious circuitry (a.k.a. hardware Trojans) during the fabrication process, causing serious security concerns. Hardware Trojans are very hard and expensive to detect and can disrupt the entire circuit or covertly leak sensitive information via a subliminal channel.
In this paper, we propose a formal model for assessing the security of ICs whose fabrication has been outsourced to an untrusted off-shore manufacturer. Our model captures that the IC specification and design are trusted but the fabrication facility(ies) may be malicious. Our objective is to investigate security in an ideal sense and follows a simulation based approach that ensures that Trojans cannot release any sensitive information to the outside. It follows that the Trojans’ impact in the overall IC operation, in case they exist, will be negligible up to simulation.
We then establish that such level of security is in fact achievable for the case of a single and of multiple outsourcing facilities. We present two compilers for ICs for the single outsourcing facility case relying on verifiable computation (VC) schemes, and another two compilers for the multiple outsourcing facilities case, one relying on multi-server VC schemes, and the other relying on secure multiparty computation (MPC) protocols with certain suitable properties that are attainable by existing schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
3.
Zurück zum Zitat Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes. In: ACM CCS, pp. 364–375 (2015) Ateniese, G., Magri, B., Venturi, D.: Subversion-resilient signature schemes. In: ACM CCS, pp. 364–375 (2015)
4.
Zurück zum Zitat Babai, L., Fortnow, L., Levin, L.A., Szegedy, M.: Checking computations in polylogarithmic time. In: ACM STOC, pp. 21–31 (1991) Babai, L., Fortnow, L., Levin, L.A., Szegedy, M.: Checking computations in polylogarithmic time. In: ACM STOC, pp. 21–31 (1991)
6.
Zurück zum Zitat Beaumont, M., Hopkins, B., Newby, T.: Hardware Trojans—Prevention, detection, countermeasures (a literature review). Technical report. Australian Government Department of Defence, July 2011 Beaumont, M., Hopkins, B., Newby, T.: Hardware Trojans—Prevention, detection, countermeasures (a literature review). Technical report. Australian Government Department of Defence, July 2011
7.
Zurück zum Zitat Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware Trojans: extended version. J. Cryptogr. Eng. 4(1), 19–31 (2014)CrossRef Becker, G.T., Regazzoni, F., Paar, C., Burleson, W.P.: Stealthy dopant-level hardware Trojans: extended version. J. Cryptogr. Eng. 4(1), 19–31 (2014)CrossRef
9.
Zurück zum Zitat Bhasin, S., Regazzoni, F.: A survey on hardware Trojan detection techniques. In: IEEE ISCAS, pp. 2021–2024 (2015) Bhasin, S., Regazzoni, F.: A survey on hardware Trojan detection techniques. In: IEEE ISCAS, pp. 2021–2024 (2015)
10.
Zurück zum Zitat Costello, C., et al.: Geppetto: Versatile verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 253–270 (2015) Costello, C., et al.: Geppetto: Versatile verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 253–270 (2015)
14.
Zurück zum Zitat Dziembowski, S., Faust, S., Standaert, F.-X.: Private circuits III: hardware Trojan-Resilience via testing amplification. In: ACM CCS, pp. 142–153 (2016) Dziembowski, S., Faust, S., Standaert, F.-X.: Private circuits III: hardware Trojan-Resilience via testing amplification. In: ACM CCS, pp. 142–153 (2016)
15.
Zurück zum Zitat Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM CCS, pp. 844–855 (2014) Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM CCS, pp. 844–855 (2014)
17.
Zurück zum Zitat Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: ACM STOC, pp. 218–229 (1987) Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: ACM STOC, pp. 218–229 (1987)
18.
Zurück zum Zitat Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014) Greenwald, G.: No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books, New York (2014)
19.
Zurück zum Zitat Hamburg, M., Kocher, P., Marson, M.: Analysis of Intel’s Ivy Bridge digital random number generator. Technical report. Cryptography Research Inc., March 2012 Hamburg, M., Kocher, P., Marson, M.: Analysis of Intel’s Ivy Bridge digital random number generator. Technical report. Cryptography Research Inc., March 2012
20.
Zurück zum Zitat Imeson, F., Emtenan, A., Garg, S., Tripunitara, M.V.: Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation. In: USENIX Security Symposium, pp. 495–510 (2013) Imeson, F., Emtenan, A., Garg, S., Tripunitara, M.V.: Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation. In: USENIX Security Symposium, pp. 495–510 (2013)
24.
Zurück zum Zitat Love, E., Jin, Y., Makris, Y.: Enhancing security via provably trustworthy hardware intellectual property. In: IEEE HOST, pp. 12–17 (2011) Love, E., Jin, Y., Makris, Y.: Enhancing security via provably trustworthy hardware intellectual property. In: IEEE HOST, pp. 12–17 (2011)
25.
Zurück zum Zitat Mak, M.A.: Trusted defense microelectronics: future access and capabilities are uncertain. Technical report. United States Government Accountability Office, October 2015 Mak, M.A.: Trusted defense microelectronics: future access and capabilities are uncertain. Technical report. United States Government Accountability Office, October 2015
26.
Zurück zum Zitat Mavroudis, V., Cerulli, A., Svenda, P., Cvrcek, D., Klinec, D., Danezis, G.: A touch of evil: high-assurance cryptographic hardware from untrusted components. In: ACM CCS, pp. 1583–1600 (2017) Mavroudis, V., Cerulli, A., Svenda, P., Cvrcek, D., Klinec, D., Danezis, G.: A touch of evil: high-assurance cryptographic hardware from untrusted components. In: ACM CCS, pp. 1583–1600 (2017)
27.
Zurück zum Zitat McIntyre, D.R., Wolff, F.G., Papachristou, C.A., Bhunia, S.: Dynamic evaluation of hardware trust. In: IEEE HOST, pp. 108–111 (2009) McIntyre, D.R., Wolff, F.G., Papachristou, C.A., Bhunia, S.: Dynamic evaluation of hardware trust. In: IEEE HOST, pp. 108–111 (2009)
28.
Zurück zum Zitat Otto, M.: Fault attacks and countermeasures. Ph.D. thesis. University of Paderborn, Germany (2006) Otto, M.: Fault attacks and countermeasures. Ph.D. thesis. University of Paderborn, Germany (2006)
29.
Zurück zum Zitat Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 238–252 (2013) Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: nearly practical verifiable computation. In: IEEE Symposium on Security and Privacy, pp. 238–252 (2013)
30.
Zurück zum Zitat Potkonjak, M.: Synthesis of trustable ICs using untrusted CAD tools. In: DAC, pp. 633–634 (2010) Potkonjak, M.: Synthesis of trustable ICs using untrusted CAD tools. In: DAC, pp. 633–634 (2010)
31.
Zurück zum Zitat Seifert, J.-P., Bayer, C.: Trojan-resilient circuits, Chap. 14. In: Pathan, A.-S.K. (ed.) Securing Cyber-Physical Systems, pp. 349–370. CRC Press, Boca Raton, London, New York (2015)CrossRef Seifert, J.-P., Bayer, C.: Trojan-resilient circuits, Chap. 14. In: Pathan, A.-S.K. (ed.) Securing Cyber-Physical Systems, pp. 349–370. CRC Press, Boca Raton, London, New York (2015)CrossRef
32.
Zurück zum Zitat Sharkey, B.: Trust in integrated circuits program. Technical report. DARPA, March 2007 Sharkey, B.: Trust in integrated circuits program. Technical report. DARPA, March 2007
33.
Zurück zum Zitat Wahby, R.S., Howald, M., Garg, S.J., Shelat, A., Walfish, M.: Verifiable ASICs. In: IEEE S&P, pp. 759–778 (2016) Wahby, R.S., Howald, M., Garg, S.J., Shelat, A., Walfish, M.: Verifiable ASICs. In: IEEE S&P, pp. 759–778 (2016)
34.
Zurück zum Zitat Waksman, A., Sethumadhavan, S.: Silencing hardware backdoors. In: IEEE Symposium on Security and Privacy, pp. 49–63 (2011) Waksman, A., Sethumadhavan, S.: Silencing hardware backdoors. In: IEEE Symposium on Security and Privacy, pp. 49–63 (2011)
35.
Zurück zum Zitat Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)CrossRef Walfish, M., Blumberg, A.J.: Verifying computations without reexecuting them. Commun. ACM 58(2), 74–84 (2015)CrossRef
36.
Zurück zum Zitat Wang, X., Ranellucci, S., Katz, J.: Global-scale secure multiparty computation. In: ACM CCS (2017) Wang, X., Ranellucci, S., Katz, J.: Global-scale secure multiparty computation. In: ACM CCS (2017)
Metadaten
Titel
Secure Outsourcing of Cryptographic Circuits Manufacturing
verfasst von
Giuseppe Ateniese
Aggelos Kiayias
Bernardo Magri
Yiannis Tselekounis
Daniele Venturi
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_5