TY - GEN
T1 - Can the SHIELD protect our integrated circuits?
AU - Koushanfar, Farinaz
AU - Karri, Ramesh
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/9/23
Y1 - 2014/9/23
N2 - Mass production of Integrated Circuits (ICs) from a single blueprint (mask) renders inherent identification of the individual parts a challenge. Indelible marking of the ICs can enable fingerprinting, identification, authentication, metering, and tracing of components along the unascertained semiconductor supply chain. To enable these important objectives, DARPA is soliciting innovative proposals for a SHIELD that enables advanced supply chain hardware authentication capability. The envisioned SHIELD is intended to be a minuscule electronic chip that is physically and inseparably attached to the host electronic component. The desiderata for the SHIELD include providing an ineradicable hardware root-of-trust for cryptographic key storage and encryption, a compact structure encapsulating the keys, a physically-fragile but electrically-robust SHIELD dielet that self-destructs upon adversarial acts, an RF communication and remote charging interface, and sensors for recording the potential attack attempts. We discuss the SHIELD threat model and its potential for addressing a number of standing challenges in this area. We emphasize the dire need for open evaluation and thorough security analysis of SHIELD.
AB - Mass production of Integrated Circuits (ICs) from a single blueprint (mask) renders inherent identification of the individual parts a challenge. Indelible marking of the ICs can enable fingerprinting, identification, authentication, metering, and tracing of components along the unascertained semiconductor supply chain. To enable these important objectives, DARPA is soliciting innovative proposals for a SHIELD that enables advanced supply chain hardware authentication capability. The envisioned SHIELD is intended to be a minuscule electronic chip that is physically and inseparably attached to the host electronic component. The desiderata for the SHIELD include providing an ineradicable hardware root-of-trust for cryptographic key storage and encryption, a compact structure encapsulating the keys, a physically-fragile but electrically-robust SHIELD dielet that self-destructs upon adversarial acts, an RF communication and remote charging interface, and sensors for recording the potential attack attempts. We discuss the SHIELD threat model and its potential for addressing a number of standing challenges in this area. We emphasize the dire need for open evaluation and thorough security analysis of SHIELD.
UR - http://www.scopus.com/inward/record.url?scp=84908494579&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84908494579&partnerID=8YFLogxK
U2 - 10.1109/MWSCAS.2014.6908424
DO - 10.1109/MWSCAS.2014.6908424
M3 - Conference contribution
AN - SCOPUS:84908494579
T3 - Midwest Symposium on Circuits and Systems
SP - 350
EP - 353
BT - 2014 IEEE 57th International Midwest Symposium on Circuits and Systems, MWSCAS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE 57th International Midwest Symposium on Circuits and Systems, MWSCAS 2014
Y2 - 3 August 2014 through 6 August 2014
ER -