Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically

Download Now Date Added: May 2010
Format: PDF

The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes have evolved, novel and potent hardware-based security threats are now possible. This paper presents a hybrid hardware/software approach to defending against malicious hardware. The authors propose BlueChip, a defensive strategy that has both a design-time component and a runtime component. During the design verification phase, BlueChip invokes a new technique, Unused Circuit Identification (UCI), to identify suspicious circuitry - those circuits not used or otherwise activated by any of the design verification tests.