FOundations of Secure and TrustEd HardwaRe (FOSTER) Workshop
安全和可信硬件基础 (FOSTER) 研讨会
基本信息
- 批准号:1749175
- 负责人:
- 金额:$ 4.5万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2017
- 资助国家:美国
- 起止时间:2017-09-01 至 2018-08-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
Semiconductor microchips are the brains inside all of the electronic devices that pervade our society. To control costs, microchips are often designed and even manufactured off-shore. Outsourcing the design and fabrication of semiconductor microchips comes at the expense of their security. For one, an off-shore microchip foundry can copy or steal the chip's blueprint, and sell copies of the chip in the black market. Perhaps worse, the foundry can also modify the chip's blueprint in stealthy ways, such that modifications go undetected and the chip misbehaves in harmful ways. The vulnerabilities affect the bottom-lines of commercial U.S. chip design companies, but perhaps more critically, threaten the integrity of electronic components used in defense equipment and critical infrastructure. There has been more than a decade of fruitful academic and industry research on solutions to counteract these threats to the design, manufacturing, and supply of electronic components. However, there is still no common consensus on questions of critical importance. For instance, what are the most pernicious attack vectors, in the near and far term? And, how can we quantitatively compare different defense mechanisms in terms of the security they offer? The time is ripe to bring together experts from government, industry and academia to lay the foundations for the next phase of hardware security research and reach a broad consensus on the most critical challenges, identify promising defense mechanisms and establish methodologies to evaluate solutions. The FOSTER Workshop is aimed at meeting this challenge. The format of the workshop will encourage deep and open discussion between key stakeholders, and its outcome will be a comprehensive report that lays out a roadmap for research and transitioning research outcomes to practice.Globalization of the IC design flow has reduced design complexity and fabrication cost, but has introduced several security vulnerabilities. A rogue agent anywhere in the IC supply chain can perform the following attacks: reverse engineering, hardware Trojans insertion, counterfeiting (specifically, recycled ICs), and IP piracy. These attacks cost the semiconductor industry billions of dollars annually, undermine national security and put critical infrastructure in danger. Despite the severity of this problem, current commercial IC design tools, for the most part, do not consider security as a first-class design metric. More than a decade of hardware security research has been instrumental in identifying and analyzing the key problems in this area and proposing a diverse array of solutions that address different attack surfaces. As hardware security research moves to a new phase of maturity, there is an urgent need to synthesize multiple threads of research into a synergistic security-aware EDA tool-flow that will enable the next generation of trusted hardware platforms.The FOSTER Workshop aims to address this need. The workshop will bring together leading experts from industry and academia to address the following foundational topics: (1) characterizing the hardware security attack surface; (2) identifying formal, quantitative metrics to evaluate and benchmark security solutions; (3) identifying the most promising defense mechanisms and understand how different solutions can work synergistically. The outcomes of the workshop will be of interest to EDA tool developers, fabless semiconductor design companies, silicon foundries, test companies, embedded system companies, computer and communication security companies, and US government agencies, and will eventually benefit trustworthy electronics for healthcare, defense, finance, transportation, and automotive applications.
半导体微芯片是弥漫在我们社会中的所有电子设备的大脑。为了控制成本,微芯片通常是在海外设计甚至制造的。将半导体微芯片的设计和制造外包是以牺牲其安全性为代价的。首先,离岸微芯片代工厂可以复制或窃取芯片的蓝图,然后在黑市上出售芯片的复制品。也许更糟糕的是,代工厂还可以以秘密的方式修改芯片的蓝图,这样修改就不会被发现,芯片就会以有害的方式行为不当。这些漏洞影响到美国商业芯片设计公司的底线,但或许更严重的是,它们威胁到了用于国防设备和关键基础设施的电子元件的完整性。十多年来,学术界和业界对解决方案进行了卓有成效的研究,以对抗这些对电子零部件设计、制造和供应的威胁。然而,在至关重要的问题上仍然没有达成共同的共识。例如,在近期和远期内,最有害的攻击媒介是什么?而且,我们如何才能量化地比较不同的防御机制提供的安全性?召集政府、行业和学术界的专家为下一阶段的硬件安全研究奠定基础,并就最关键的挑战达成广泛共识,确定有前景的防御机制,并建立评估解决方案的方法,时机已经成熟。福斯特研讨会旨在迎接这一挑战。研讨会的形式将鼓励关键利益相关者之间进行深入和开放的讨论,其结果将是一份全面的报告,其中列出了研究和将研究成果转化为实践的路线图。IC设计流程的全球化降低了设计复杂性和制造成本,但也引入了几个安全漏洞。IC供应链中任何地方的流氓代理都可以执行以下攻击:反向工程、硬件特洛伊木马插入、假冒(特别是回收IC)和IP盗版。这些攻击每年给半导体行业造成数十亿美元的损失,破坏国家安全,并将关键基础设施置于危险之中。尽管这个问题很严重,但目前的商业IC设计工具在很大程度上并没有将安全性作为一流的设计指标。十多年的硬件安全研究有助于识别和分析该领域的关键问题,并提出一系列解决方案,以应对不同的攻击面。随着硬件安全研究进入一个新的成熟阶段,迫切需要将多个研究线程综合到一个协同的安全感知EDA工具流中,以支持下一代可信硬件平台。福斯特研讨会旨在满足这一需求。研讨会将汇集业界和学术界的顶尖专家,讨论以下基本主题:(1)确定硬件安全攻击面的特征;(2)确定正式的量化指标,以评估和基准安全解决方案;(3)确定最有希望的防御机制,并了解不同的解决方案如何协同工作。研讨会的成果将使EDA工具开发商、无工厂半导体设计公司、硅铸造厂、测试公司、嵌入式系统公司、计算机和通信安全公司以及美国政府机构感兴趣,并最终将使医疗保健、国防、金融、交通和汽车应用领域的值得信赖的电子产品受益。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Siddharth Garg其他文献
Suitable triggering algorithms for detecting strong ground motions using MEMS accelerometers
- DOI:
10.1007/s11803-015-0004-7 - 发表时间:
2015-02-20 - 期刊:
- 影响因子:3.300
- 作者:
Ravi Sankar Jakka;Siddharth Garg - 通讯作者:
Siddharth Garg
Manipulation Attacks on Learned Image Compression
对学习图像压缩的操纵攻击
- DOI:
- 发表时间:
2024 - 期刊:
- 影响因子:0
- 作者:
Kang Liu;Di Wu;Yangyu Wu;Yiru Wang;Dan Feng;Benjamin Tan;Siddharth Garg - 通讯作者:
Siddharth Garg
Feature Compression for Rate Constrained Object Detection on the Edge
用于边缘速率受限对象检测的特征压缩
- DOI:
- 发表时间:
2022 - 期刊:
- 影响因子:0
- 作者:
Yuan, Zhongzheng;Samyak Rawlekar;Siddharth Garg;Elza Erkip;Yao Wang - 通讯作者:
Yao Wang
On the Limitation of Backdoor Detection Methods
论后门检测方法的局限性
- DOI:
- 发表时间:
- 期刊:
- 影响因子:0
- 作者:
Georg Pichler;Marco Romanelli;Divya Prakash Manivannan;P. Krishnamurthy;F. Khorrami;Siddharth Garg;TU Wien - 通讯作者:
TU Wien
Left parasternal approach for Bentall procedure in a patient of Marfan syndrome with severe pectus excavatum
- DOI:
10.1007/s12055-017-0611-1 - 发表时间:
2017-11-11 - 期刊:
- 影响因子:0.600
- 作者:
Pankaj Aggarwal;Sachin Mahajan;Siddharth Garg - 通讯作者:
Siddharth Garg
Siddharth Garg的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Siddharth Garg', 18)}}的其他基金
MLWiNS: Resource Constrained Mobile Data Analytics Assisted by the Wireless Edge
MLWiNS:无线边缘协助的资源受限移动数据分析
- 批准号:
2003182 - 财政年份:2020
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
SaTC: CORE: Medium: Collaborative: Towards Trustworthy Deep Neural Network Based AI: A Systems Approach
SaTC:核心:媒介:协作:迈向基于可信深度神经网络的人工智能:一种系统方法
- 批准号:
1801495 - 财政年份:2018
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
TWC: Large: Collaborative: Verifiable Hardware: Chips that Prove their Own Correctness
TWC:大型:协作:可验证的硬件:证明自身正确性的芯片
- 批准号:
1565396 - 财政年份:2016
- 资助金额:
$ 4.5万 - 项目类别:
Continuing Grant
CAREER: Re-thinking Electronic Design Automation Algorithms for Secure Outsourced Integrated Circuit Fabrication
职业:重新思考安全外包集成电路制造的电子设计自动化算法
- 批准号:
1553419 - 财政年份:2016
- 资助金额:
$ 4.5万 - 项目类别:
Continuing Grant
STARSS: Small: New Attack Vectors and Formal Security Analysis for Integrated Circuit Logic Obfuscation
STARSS:小型:集成电路逻辑混淆的新攻击向量和形式安全分析
- 批准号:
1527072 - 财政年份:2015
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
相似海外基金
Secure, Privacy-aware, and Trusted Data Share in Smart Mobility
智能移动中的安全、隐私意识和可信数据共享
- 批准号:
EP/Y002946/1 - 财政年份:2024
- 资助金额:
$ 4.5万 - 项目类别:
Research Grant
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE Development
值得信赖:安全软件开发的安全摘要
- 批准号:
EP/X03688X/1 - 财政年份:2023
- 资助金额:
$ 4.5万 - 项目类别:
Research Grant
TRUSTED: SecuriTy SummaRies for SecUre SofTwarE Development
值得信赖:安全软件开发的安全摘要
- 批准号:
EP/X037274/1 - 财政年份:2023
- 资助金额:
$ 4.5万 - 项目类别:
Research Grant
Collaborative Research: Conference: 2023 Workshop for Aspiring PIs in Secure and Trusted Cyberspace
协作研究:会议:2023 年安全可信网络空间中有抱负的 PI 研讨会
- 批准号:
2247405 - 财政年份:2023
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
Collaborative Research: Conference: 2023 Workshop for Aspiring PIs in Secure and Trusted Cyberspace
协作研究:会议:2023 年安全可信网络空间中有抱负的 PI 研讨会
- 批准号:
2247404 - 财政年份:2023
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
Trustd: Highly-secure, trusted and decentralised digital assets custodial solution
Trustd:高度安全、可信、去中心化的数字资产托管解决方案
- 批准号:
10031884 - 财政年份:2022
- 资助金额:
$ 4.5万 - 项目类别:
Feasibility Studies
Collaborative Research: SaTC: CORE: Medium: Hybridizing Trusted Execution Environments and Secure Multiparty Computation
协作研究:SaTC:核心:中:混合可信执行环境和安全多方计算
- 批准号:
2112726 - 财政年份:2021
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
Collaborative Research: SaTC: CORE: Medium: Hybridizing Trusted Execution Environments and Secure Multiparty Computation
协作研究:SaTC:核心:中:混合可信执行环境和安全多方计算
- 批准号:
2112751 - 财政年份:2021
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
EAGER: SARE: Collaborative: Low Energy Secure Wireless Transceiversfor IoT Trusted Communications
EAGER:SARE:协作:用于物联网可信通信的低能耗安全无线收发器
- 批准号:
2029407 - 财政年份:2020
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant
EAGER: SARE: Collaborative: Low Energy Secure Wireless Transceivers for IoT Trusted Communications
EAGER:SARE:协作:用于物联网可信通信的低能耗安全无线收发器
- 批准号:
2029461 - 财政年份:2020
- 资助金额:
$ 4.5万 - 项目类别:
Standard Grant














{{item.name}}会员




