CAD-Base: An Attack Vector into the Electronics Supply Chain. Basu, K., Saeed, S. M., Pilato, C., Ashraf, M., Nabeel, M. T., Chakrabarty, K., & Karri, R. ACM Transactions on Design Automation of Electronic Systems, 24(4):38:1–38:30, April, 2019.
Paper doi abstract bibtex Fabless semiconductor companies design system-on-chips (SoC) by using third-party intellectual property (IP) cores and fabricate them in offshore, potentially untrustworthy foundries. Owing to the globally distributed electronics supply chain, security has emerged as a serious concern. In this article, we explore electronics computer-aided design (CAD) software as a threat vector that can be exploited to introduce vulnerabilities into the SoC. We show that all electronics CAD tools—high-level synthesis, logic synthesis, physical design, verification, test, and post-silicon validation—are potential threat vectors to different degrees. We have demonstrated CAD-based attacks on several benchmarks, including the commercial ARM Cortex M0 processor [1].
@article{basu_cad-base_2019,
title = {{CAD}-{Base}: {An} {Attack} {Vector} into the {Electronics} {Supply} {Chain}},
volume = {24},
issn = {1084-4309},
shorttitle = {{CAD}-{Base}},
url = {https://doi.org/10.1145/3315574},
doi = {10.1145/3315574},
abstract = {Fabless semiconductor companies design system-on-chips (SoC) by using third-party intellectual property (IP) cores and fabricate them in offshore, potentially untrustworthy foundries. Owing to the globally distributed electronics supply chain, security has emerged as a serious concern. In this article, we explore electronics computer-aided design (CAD) software as a threat vector that can be exploited to introduce vulnerabilities into the SoC. We show that all electronics CAD tools—high-level synthesis, logic synthesis, physical design, verification, test, and post-silicon validation—are potential threat vectors to different degrees. We have demonstrated CAD-based attacks on several benchmarks, including the commercial ARM Cortex M0 processor [1].},
number = {4},
urldate = {2021-05-03},
journal = {ACM Transactions on Design Automation of Electronic Systems},
author = {Basu, Kanad and Saeed, Samah Mohamed and Pilato, Christian and Ashraf, Mohammed and Nabeel, Mohammed Thari and Chakrabarty, Krishnendu and Karri, Ramesh},
month = apr,
year = {2019},
keywords = {Electronic design automation, computer-aided design, hardware security},
pages = {38:1--38:30},
}
Downloads: 0
{"_id":"EBmRY92ajcTovQuaQ","bibbaseid":"basu-saeed-pilato-ashraf-nabeel-chakrabarty-karri-cadbaseanattackvectorintotheelectronicssupplychain-2019","author_short":["Basu, K.","Saeed, S. M.","Pilato, C.","Ashraf, M.","Nabeel, M. T.","Chakrabarty, K.","Karri, R."],"bibdata":{"bibtype":"article","type":"article","title":"CAD-Base: An Attack Vector into the Electronics Supply Chain","volume":"24","issn":"1084-4309","shorttitle":"CAD-Base","url":"https://doi.org/10.1145/3315574","doi":"10.1145/3315574","abstract":"Fabless semiconductor companies design system-on-chips (SoC) by using third-party intellectual property (IP) cores and fabricate them in offshore, potentially untrustworthy foundries. Owing to the globally distributed electronics supply chain, security has emerged as a serious concern. In this article, we explore electronics computer-aided design (CAD) software as a threat vector that can be exploited to introduce vulnerabilities into the SoC. We show that all electronics CAD tools—high-level synthesis, logic synthesis, physical design, verification, test, and post-silicon validation—are potential threat vectors to different degrees. We have demonstrated CAD-based attacks on several benchmarks, including the commercial ARM Cortex M0 processor [1].","number":"4","urldate":"2021-05-03","journal":"ACM Transactions on Design Automation of Electronic Systems","author":[{"propositions":[],"lastnames":["Basu"],"firstnames":["Kanad"],"suffixes":[]},{"propositions":[],"lastnames":["Saeed"],"firstnames":["Samah","Mohamed"],"suffixes":[]},{"propositions":[],"lastnames":["Pilato"],"firstnames":["Christian"],"suffixes":[]},{"propositions":[],"lastnames":["Ashraf"],"firstnames":["Mohammed"],"suffixes":[]},{"propositions":[],"lastnames":["Nabeel"],"firstnames":["Mohammed","Thari"],"suffixes":[]},{"propositions":[],"lastnames":["Chakrabarty"],"firstnames":["Krishnendu"],"suffixes":[]},{"propositions":[],"lastnames":["Karri"],"firstnames":["Ramesh"],"suffixes":[]}],"month":"April","year":"2019","keywords":"Electronic design automation, computer-aided design, hardware security","pages":"38:1–38:30","bibtex":"@article{basu_cad-base_2019,\n\ttitle = {{CAD}-{Base}: {An} {Attack} {Vector} into the {Electronics} {Supply} {Chain}},\n\tvolume = {24},\n\tissn = {1084-4309},\n\tshorttitle = {{CAD}-{Base}},\n\turl = {https://doi.org/10.1145/3315574},\n\tdoi = {10.1145/3315574},\n\tabstract = {Fabless semiconductor companies design system-on-chips (SoC) by using third-party intellectual property (IP) cores and fabricate them in offshore, potentially untrustworthy foundries. Owing to the globally distributed electronics supply chain, security has emerged as a serious concern. In this article, we explore electronics computer-aided design (CAD) software as a threat vector that can be exploited to introduce vulnerabilities into the SoC. We show that all electronics CAD tools—high-level synthesis, logic synthesis, physical design, verification, test, and post-silicon validation—are potential threat vectors to different degrees. We have demonstrated CAD-based attacks on several benchmarks, including the commercial ARM Cortex M0 processor [1].},\n\tnumber = {4},\n\turldate = {2021-05-03},\n\tjournal = {ACM Transactions on Design Automation of Electronic Systems},\n\tauthor = {Basu, Kanad and Saeed, Samah Mohamed and Pilato, Christian and Ashraf, Mohammed and Nabeel, Mohammed Thari and Chakrabarty, Krishnendu and Karri, Ramesh},\n\tmonth = apr,\n\tyear = {2019},\n\tkeywords = {Electronic design automation, computer-aided design, hardware security},\n\tpages = {38:1--38:30},\n}\n\n","author_short":["Basu, K.","Saeed, S. M.","Pilato, C.","Ashraf, M.","Nabeel, M. T.","Chakrabarty, K.","Karri, R."],"key":"basu_cad-base_2019","id":"basu_cad-base_2019","bibbaseid":"basu-saeed-pilato-ashraf-nabeel-chakrabarty-karri-cadbaseanattackvectorintotheelectronicssupplychain-2019","role":"author","urls":{"Paper":"https://doi.org/10.1145/3315574"},"keyword":["Electronic design automation","computer-aided design","hardware security"],"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/bxt101","dataSources":["K9SRKdiQNw6WZkhae","Wsv2bQ4jPuc7qme8R"],"keywords":["electronic design automation","computer-aided design","hardware security"],"search_terms":["cad","base","attack","vector","electronics","supply","chain","basu","saeed","pilato","ashraf","nabeel","chakrabarty","karri"],"title":"CAD-Base: An Attack Vector into the Electronics Supply Chain","year":2019}