Award Abstract # 1603483
SaTC: STARSS: Collaborative: IPTrust: A Comprehensive Framework for IP Integrity Validation

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF FLORIDA
Initial Amendment Date: January 27, 2016
Latest Amendment Date: August 1, 2019
Award Number: 1603483
Award Instrument: Standard Grant
Program Manager: Sandip Kundu
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: September 1, 2015
End Date: September 30, 2020 (Estimated)
Total Intended Award Amount: $190,969.00
Total Awarded Amount to Date: $198,969.00
Funds Obligated to Date: FY 2014 = $190,969.00
FY 2019 = $8,000.00
History of Investigator:
  • Swarup Bhunia (Principal Investigator)
    swarup@ece.ufl.edu
Recipient Sponsored Research Office: University of Florida
1523 UNION RD RM 207
GAINESVILLE
FL  US  32611-1941
(352)392-3516
Sponsor Congressional District: 03
Primary Place of Performance: University of Florida
FL  US  32611-2002
Primary Place of Performance
Congressional District:
03
Unique Entity Identifier (UEI): NNFQH1JAPEP3
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 021Z, 025Z, 7434, 8225, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

To reduce production cost while meeting time-to-market constraints, semiconductor companies usually design hardware systems with reusable hardware modules, popularly known as Intellectual Property (IP) blocks. Growing reliance on these hardware IPs, often gathered from untrusted third-party vendors, severely affects the security and trustworthiness of the final system. The hardware IPs acquired from external sources may come with deliberate malicious implants, undocumented interfaces working as hidden backdoor, or other integrity issues. Tampered hardware IPs can lead to security and privacy concerns (e.g., when used in handheld devices) as well as life-threatening consequences (e.g., when used in safety-critical systems). It is extremely difficult to verify the integrity and trustworthiness of hardware IPs due to incomplete functional specifications and lack of golden reference models. To address this critical need, in this project, we develop a comprehensive and scalable framework for IP trust analysis and verification. We evaluate IPs of diverse types and forms and develop threat models, taxonomy and instances of IP trust/integrity issues. We investigate an integrative IP trust validation framework that combines the complementary abilities of functional, structural and parametric verification. We employ both statistical as well as judicious directed tests to sensitize rarely triggered malicious changes and observe their effects. The unified validation framework is flexible to detect diverse tampering efforts, scalable to large designs, and eliminates the need for a golden model. A platform for IP trust validation, threat analysis, and trust metrics would provide enabling technology to future designers to implement secure and trusted systems for diverse applications.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 22)
Alif Ahmed and Prabhat Mishra "QUEBS: Qualifying Event Based Search in Concolic Testing for Validation of RTL Models" IEEE International Conference on Computer Design (ICCD) , 2017
Farimah Farahmandi and Prabhat Mishra "Automated Debugging of Arithmetic Circuits using Incremental Gröbner Basis Reduction" IEEE International Conference on Computer Design (ICCD) , 2017
Farimah Farahmandi and Prabhat Mishra "FSM Anomaly Detection using Formal Analysis" IEEE International Conference on Computer Design (ICCD) , 2017
Farimah Farahmandi, Yuanwen Huang and Prabhat Mishra "Trojan Localization using Symbolic Algebra" Asia and South Pacific Design Automation Conference (ASPDAC) , 2017
Jonathan Cruz, Farimah Farahmandi, Alif Ahmed and Prabhat Mishra "Hardware Trojan Detection using ATPG andModel Checking" International Conference on VLSI Design , 2018
Jonathan Cruz, Yuanwen Huang, Prabhat Mishra, Swarup Bhunia "An automated configurable Trojan insertion framework for dynamic trust benchmarks" Design Automation and Test in Europe Conference , 2018 10.23919/DATE.2018.8342270
Kamran Rahmani, Sandip Ray and Prabhat Mishra "Post-silicon Trace Signal Selection Using Machine Learning Techniques" IEEE Transactions on Very Large Scale Integration (VLSI) Systems (TVLSI) , v.25 , 2017
Prabhat Mishra, Debdeep Mukhopadhyay, and Swarup Bhunia "Guest Editorial: Special Section on Autonomous Intelligence for Security and Privacy Analytics" IEEE Transacations on VLSI (TVLSI) , v.27 , 2019 10.1109/TVLSI.2019.2951850
Sanchita Mal-Sarkar, Robert Karam, Seetharam Narasimhan, Anandaroop Ghosh, Aswin Raghav Krishna, and Swarup Bhunia "Design and Validation for FPGA Trust under Hardware Trojan Attacks" IEEE Transactions on Multi-Scale Computing Systems (TMSCS) , v.PP , 2016 , p.1 2332-7766
Sandip Ray, Jongsun Park, and Swarup Bhunia "Wearables, Implants, and Internet of Things: Towards Unifying Technologies to Support Diverse Paradigms" IEEE Transactions on Multi-Scale Computing Systems (TMSCS) , v.2 , 2016 , p.123 10.1109/TMSCS.2016.2553026
Sandip Ray, Mark M. Tehranipoor, Eric Peeters, and Swarup Bhunia "System-on-Chip Platform Security Assurance: Architecture and Validation" Proceedings of the IEEE (PIEEE) , v.PP , 2017 , p.1 10.1109/JPROC.2017.2714641
(Showing: 1 - 10 of 22)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

Primary goals of this NSF research project were to analyze the major hardware security issues related to third-party intellectual property blocks (3PIPs), which are increasingly used in modern system on chip (SoC) designs and then investigate an integrative approach to trust verification of these IP blocks. Modern SoC designs involve integration of a large number of IP blocks, many of which are acquired from untrusted third-party vendors. This project greatly enhances our understanding of the related threat space, trust metrics to quantify level of assurance, and effective solutions for trust verification or trusted system operation with untrusted IP blocks.

The major intellectual contributions of the project are described next in detail.

The need to secure hardware devices in the untrusted supply chain ecosystem has instigated a wide body of research. However, newer attacks are developed that are capable of bypassing the known methods, thus creating an arms race commonly observed in software security research. Detection of malicious circuits in broader categories of microelectronic components and emerging technologies provide an interesting avenue for future research. We have explored combination of design for test (DFT) and trust verification solutions could be explored to combat these new challenges.

Quantifying the degree to which a device can be trusted is also challenging problem. We have developed a suite of trust metrics that quantify the presence of a specific vulnerability in the hardware or the coverage of a solution against a particular vulnerability. Logic testing based Trojan detection methods can benefit from trigger coverage and Trojan coverage metric to represent the ability of generated test patterns in triggering and detecting a large number of hard-to-activate Trojans. Hardware Trojans are likely to be formed utilizing the rarely switching nets of the design. Even when they are triggered, their malicious impact may not be observable at the output. Test vectors with high trigger coverage are expected to switch those nets to their rare values; thus, increasing the probability of triggering potential Trojans.

We have developed novel countermeasures that apply to COTS-based manufacturing processes used in consumer, commercial and military products is an interesting avenue for exploration. Trust verification of COTS components using logic testing would require efficient test generation using only high-level specification of the suspect component. Application of side-channel analysis (SCA) based verification has been studied as well by leveraging self-referencing techniques that can utilize the side-channel signature of an untrusted component as a reference.

An IP containing a security vulnerability—whether inadvertent or malicious—may compromise the trustworthiness of the entire SoC, e.g., by leaking sensitive information or causing execution failures at key points. Existing functional validation approaches, post-manufacturing tests, and IP trust verification techniques are inadequate to accomplish comprehensive system-level security assurance in the presence of untrusted IPs. In this work, we have also analyzed the security issues at the SoC level caused by untrusted IPs. We have developed a novel, resilient SoC security architecture to ensure trusted SoC operation with untrusted IPs. Our architecture realizes fine-grained IP-trust aware security policies in an efficient security policy checker that enables runtime monitoring of security issues arising from untrusted IPs. We have demonstrated the effectiveness of this framework for system protection using several illustrative practical use cases. 

Outreach

We have pursued diverse outreach activities in this project. Besides publishing and presenting technical articles, organizing special sessions or tutorials in conferences, guest-editing special issues in journal, we have also developed the CAD for Assurance Website, supported by the Hardware Security Community: https://cadforassurance.org/

The CAD for Trust and Assurance website is an academic dissemination effort by researchers in the field of hardware security. The goal is to assemble information on all CAD for trust/assurance activities in academia and industry in one place and share them with the broader community of researchers and practitioners in a timely manner, with an easy-to-search and easy-to-access interface. We’ve included information on many major CAD tools the research community have developed over the past decade, including open-source license-free or ready-for-licensing tools, associated metrics, relevant publications and video-demos.

Future Directions:

The research findings and educational efforts undertaken in this project are expected to create pathways for many future explorations and development.

(1) Exploration of new attack modalities and further enhancing the threat space for third-party IP blocks of various types, including analog and mixed-signal IP blocks, which this project  

(2)   Future work on hardware IP protection will involve extension of the functional and machine learning based trust verification of large intellectual property blocks and SoCs and development of new metrics and evaluation on industrial designs.

(3)   Future work on hardware Trojan detection will involve application of advanced statistical analysis as well as machine learning techniques to improve the detection accuracy and the confidence level.


Last Modified: 02/03/2021
Modified by: Swarup K Bhunia

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page