CALCE – A PHM Solution for Zero-Trust Hardware

When:
July 14, 2020 @ 8:00 am – 9:00 am
2020-07-14T08:00:00-07:00
2020-07-14T09:00:00-07:00
Where:
webinar

https://umd.webex.com/mw3300/mywebex/default.do?nomenu=true&siteurl=umd&service=6&rnd=0.09981439158192684&main_url=https%3A%2F%2Fumd.webex.com%2Fec3300%2Feventcenter%2Fevent%2FeventAction.do%3FtheAction%3Ddetail%26%26%26EMK%3D4832534b000000049eb0ca21e7d9ed85e3e702e1a65bb23e81afee730d45598814f206fdcafdde4a%26siteurl%3Dumd%26confViewID%3D164848766236524842%26encryptTicket%3DSDJTSwAAAASwhdEGephNQN54sKX0A5IXI81ggH_aczdZdj5NVs1e5w2%26

By Varun Khemani

Software attacks are becoming more frequent across a wide range of industries. However, not all attacks on a system are caused by or related to software; the physical components of a system can also be compromised and in some cases may create anomalies that could appear as a cyber-attack. This is especially a concern because, for most systems produced today, components, manufacturing, and assembly are often outsourced to offshore facilities. The result is that anomalous behavior can be due to defective components, counterfeit components, or Trojan horses, where there is a malicious insertion of a Trojan that can be triggered. Process reliability Trojans are a new class of Trojans that alter neither the circuitry nor functionality of an Integrated Circuit (IC), but they negatively impact IC reliability through acceleration of wearout mechanisms for transistors. Process reliability Trojans are introduced through malicious modifications of IC fabrication process steps and can result in ICs with a much shorter lifetime. These modifications are extremely difficult to detect, as they are made at the wafer level and only manifest as shortened lifetimes of infected ICs. Manufacturing at trusted foundries is a safe, although expensive option and hence, there is growing interest to move away from trusted foundries towards operation and development in zero-trust environments. Zero-Trust Architecture is a concept that helps prevent successful data breaches by eliminating the concept of trust from an organization’s network architecture and is designed to protect digital environments. To extend the concept of Zero-Trust Architecture from the network to the hardware domain, this paper lays out a deep-learning based approach to detect anomalous behavior in integrated circuits, that further distinguishes anomalous behavior into component faults or process reliability Trojans. This approach ensures that infected hardware is detected during manufacturing testing or during field usage, thus negating the necessity of relying on trusted foundries.

Comments are closed.

Powered by WordPress. Designed by WooThemes