. 24/7 Space News .
CYBER WARS
Cybersecurity researchers design a chip that checks for sabotage
by Staff Writers
Brooklyn NY (SPX) Aug 26, 2016


Siddharth Garg, assistant professor of electrical and computer engineering.

With the outsourcing of microchip design and fabrication worldwide, a $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. These "Trojan horses" look harmless but can allow attackers to sabotage healthcare devices; public infrastructure; and financial, military, or government electronics.

Siddharth Garg, an assistant professor of electrical and computer engineering at the NYU Tandon School of Engineering, and fellow researchers are developing a unique solution: a chip with both an embedded module that proves that its calculations are correct and an external module that validates the first module's proofs.

While software viruses are easy to spot and fix with downloadable patches, deliberately inserted hardware defects are invisible and act surreptitiously. For example, a secretly inserted "back door" function could allow attackers to alter or take over a device or system at a specific time. Garg's configuration, an example of an approach called "verifiable computing" (VC), keeps tabs on a chip's performance and can spot telltale signs of Trojans.

The ability to verify has become vital in an electronics age without trust: Gone are the days when a company could design, prototype, and manufacture its own chips. Manufacturing costs are now so high that designs are sent to offshore foundries, where security cannot always be assured.

But under the system proposed by Garg and his colleagues, the verifying processor can be fabricated separately from the chip. "Employing an external verification unit made by a trusted fabricator means that I can go to an untrusted foundry to produce a chip that has not only the circuitry-performing computations, but also a module that presents proofs of correctness," said Garg.

The chip designer then turns to a trusted foundry to build a separate, less complex module: an ASIC (application-specific integrated circuit), whose sole job is to validate the proofs of correctness generated by the internal module of the untrusted chip.

Garg said that this arrangement provides a safety net for the chip maker and the end user. "Under the current system, I can get a chip back from a foundry with an embedded Trojan. It might not show up during post-fabrication testing, so I'll send it to the customer," said Garg.

"But two years down the line it could begin misbehaving. The nice thing about our solution is that I don't have to trust the chip because every time I give it a new input, it produces the output and the proofs of correctness, and the external module lets me continuously validate those proofs."

An added advantage is that the chip built by the external foundry is smaller, faster, and more power-efficient than the trusted ASIC, sometimes by orders of magnitude. The VC setup can therefore potentially reduce the time, energy, and chip area needed to generate proofs.

"For certain types of computations, it can even outperform the alternative: performing the computation directly on a trusted chip," Garg said.

The researchers next plan to investigate techniques to reduce both the overhead that generating and verifying proofs imposes on a system and the bandwidth required between the prover and verifier chips. "And because with hardware, the proof is always in the pudding, we plan to prototype our ideas with real silicon chips," said Garg.

To pursue the promise of verifiable ASICs, Garg, abhi shelat* of the University of Virginia, Rosario Gennaro of the City University of New York, Mariana Raykova of Yale University, and Michael Taylor of the University of California, San Diego, will share a five-year National Science Foundation Large Grant of $3 million.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
NYU Tandon School of Engineering
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Raytheon debuts Cyber and Electromagnetic Battle Management system
Augusta, Ga. (UPI) Aug 22, 2016
Raytheon has unveiled its Cyber and Electromagnetic Battle Management tool at the U.S. Army's Cyber Quest event, the company announced Monday. The Army event informs cybersecurity requirements and priorities, Raytheon said in a statement. The battle management tool integrates cyber and electromagnetic spectrum awareness capabilities into the service's Electronic Warfare Program M ... read more


CYBER WARS
Space tourists eye $150mln Soyuz lunar flyby

Roscosmos to spend $7.5Mln studying issues of manned lunar missions

Lockheed Martin, NASA Ink Deal for SkyFire Infrared Lunar Discovery Satellite

As dry as the moon

CYBER WARS
NASA Awards Launch Services Contract for Mars 2020 Rover Mission

Year-long simulation of humans living on Mars ends in Hawaii

Boredom was hardest part of yearlong dome isolation

Test for damp ground at Mars' seasonal streaks finds none

CYBER WARS
Grandpa astronaut breaks US space record

35 years later Voyager's legacy continues at Saturn

Chinese sci-fi prepares to master the universe

China opens longest glass bottom bridge in world

CYBER WARS
China Sends Country's Largest Carrier Rocket to Launch Base

China unveils Mars probe, rover for ambitious 2020 mission

China Ends Preparatory Work on Long March 5 Next-Generation Rocket Engine

China launches hi-res SAR imaging satellite

CYBER WARS
Space Station's orbit adjusted Wednesday

Astronauts Relaxing Before Pair of Spaceships Leave

'New port of call' installed at space station

US astronauts prepare spacewalk to install new docking port

CYBER WARS
Russian Carrier Rocket for Sea Launches Will Replace Ukraine's Zenit

SpaceX's Dragon cargo ship splashes down in Pacific

Intelsat "doubles down" with Arianespace for an Ariane 5 dual success

Kourou busy with upcoming Arianespace missions

CYBER WARS
Rocky planet found orbiting habitable zone of nearest star

A new Goldilocks for habitable planets

Venus-like Exoplanet Might Have Oxygen Atmosphere, but Not Life

Brown dwarfs reveal exoplanets' secrets

CYBER WARS
Why an uncanny crystal change could laser design

NIST's compact gyroscope may turn heads

New 10-foot dish will connnect ASU researchers directly with satellites

Northrop Grumman to Provide Navigation System for German Satellite









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.