Trusted Hardware: Can It Be Trustworthy?

Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important consideration during hardware design and fabrication. For instance, devices are increasingly required to store confidential information. This includes data such as cryptographic keys, personal information, and the intellectual property (IP) in the device's design. Furthermore, computing systems in critical applications must work as specified. Therefore it is important that hardware be designed and fabricated to be trustworthy. Many potential attacks can be used to exploit a computing device. Physical attacks, that monitor power, timing, electromagnetic radiation, etc. can be used to steal confidential information from the system. A "malicious" foundry can perform a number of devious activities including stealing the mask, reverse engineering IP, subverting the hardware through back doors and time bombs, and overproducing counterfeit chips. Design tools can be subverted to insert malicious circuitry, and chip packagers can modify selected devices with their own that provide similar functionality, in addition to underhanded behavior, e.g. stealing information or malfunctioning at critical junctures. The notions of trust and trustworthiness are presented. Although major challenges still confront secure software system development, there has been substantial progress.Techniques that have been useful in the context of software systems are described and their relevance to the hardware domain is discussed. Challenges to trusted hardware development are then explored.

[1]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[2]  Robert Lindell,et al.  The Intel 80/spl times/86 processor architecture: pitfalls for secure systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[3]  Cynthia E. Irvine,et al.  Subversion as a Threat in Information Warfare , 2004 .

[4]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[5]  Ruby B. Lee,et al.  Covert and Side Channels Due to Processor Architecture , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[6]  William H. Mangione-Smith,et al.  Deep packet filter with dedicated logic and read only memories , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.

[7]  Gang Wang,et al.  Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[8]  D. Buell High-Performance Reconfigurable Computing , 2007 .

[9]  P. A. Karger,et al.  Multics security evaluation: vulnerability analysis , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..

[10]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .

[11]  K. Thompson Reflections on trusting trust , 1984, CACM.

[12]  Henry M. Levy,et al.  Capability-Based Computer Systems , 1984 .

[13]  Ruby B. Lee,et al.  Architecture for protecting critical secrets in microprocessors , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).

[14]  S ECURITY A RCHITECTURE FOR E MBEDDED S YSTEMS Reconfigurable Security Architecture for Embedded Systems , 2005 .

[15]  Tarek A. El-Ghazawi,et al.  Guest Editors' Introduction: High-Performance Reconfigurable Computing , 2007, Computer.

[16]  Richard R. Linde,et al.  Operating system penetration , 1975, AFIPS '75.

[17]  Timothy Sherwood,et al.  Bit-split string-matching engines for intrusion detection and prevention , 2006, TACO.

[18]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[19]  Alok N. Choudhary,et al.  A reconfigurable architecture for network intrusion detection using principal component analysis , 2006, FPGA '06.

[20]  Ryan Kastner,et al.  Policy-Driven Memory Protection for Reconfigurable Hardware , 2006, ESORICS.

[21]  Alok N. Choudhary,et al.  High-Performance Software Protection Using Reconfigurable Architectures , 2006, Proceedings of the IEEE.

[22]  Terry V. Benzel,et al.  Design Principles for Security , 2005 .