Abstract
Electronic systems are ubiquitous today, playing an irreplaceable role in our personal lives, as well as in critical infrastructures such as power grids, satellite communications, and public transportation. In the past few decades, the security of software running on these systems has received significant attention. However, hardware has been assumed to be trustworthy and reliable “by default” without really analyzing the vulnerabilities in the electronics supply chain. With the rapid globalization of the semiconductor industry, it has become challenging to ensure the integrity and security of hardware. In this article, we discuss the integrity concerns associated with a globalized electronics supply chain. More specifically, we divide the supply chain into six distinct entities: IP owner/foundry (OCM), distributor, assembler, integrator, end user, and electronics recycler, and analyze the vulnerabilities and threats associated with each stage. To address the concerns of the supply chain integrity, we propose a blockchain-based certificate authority framework that can be used to manage critical chip information such as electronic chip identification, chip grade, and transaction time. The decentralized nature of the proposed framework can mitigate most threats of the electronics supply chain, such as recycling, remarking, cloning, and overproduction.
- Andreas M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Inc. Google ScholarDigital Library
- Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte. 2017. Counterfeit electronics detection using image processing and machine learning. In Journal of Physics: Conference Series, Vol. 787. IOP Publishing.Google Scholar
- Navid Asadizanjani, Mark Tehranipoor, and Domenic Forte. 2017. PCB reverse engineering using nondestructive x-ray tomography and advanced image processing. IEEE Transactions on Components, Packaging and Manufacturing Technology 7, 2 (2017), 292--299.Google Scholar
- Kerry Bernstein. 2014. Supply Chain Hardware Integrity for Electronics Defense (SHIELD). DARPA.Google Scholar
- Michael Bushnell and Vishwani Agrawal. 2004. Essentials of Electronic Testing for Digital, Memory and Mixed-Signal VLSI Circuits. Vol. 17. Springer Science 8 Business Media. Google ScholarDigital Library
- Encarnacin Castillo, Uwe Meyer-Baese, Antonio García, Luis Parrilla, and Antonio Lloris. 2007. IPP@ HDL: Efficient intellectual property protection scheme for IP cores. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 15, 5 (2007), 578--591. Google ScholarDigital Library
- Edoardo Charbon. 1998. Hierarchical watermarking in IC design. In Proceedings of the 1998 IEEE Custom Integrated Circuits Conference. IEEE, Los Alamitos, CA, 295--298.Google ScholarCross Ref
- Gustavo K. Contreras, Md. Tauhidur Rahman, and Mohammad Tehranipoor. 2013. Secure split-test for preventing IC piracy by untrusted foundry and assembly. In Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT’13). IEEE, Los Alamitos, CA, 196--203.Google ScholarCross Ref
- Defense Science Board. 2005. Defense Science Board Task Force on High Performance Microchip Supply. Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics.Google Scholar
- J. Delvaux and I. Verbauwhede. 2014. Key-recovery attacks on various RO PUF constructions via helper data manipulation. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE’14). 1--6. Google ScholarDigital Library
- Swaroop Ghosh, Abhishek Basak, and Swarup Bhunia. 2015. How secure are printed circuit boards against Trojan attacks? IEEE Design and Test 32, 2 (2015), 7--16.Google ScholarCross Ref
- Guardtime and Intrinsic ID. 2017. Internet of Things Authentication: A Blockchain Solution Using SRAM Physical Unclonable Functions. Retrieved March 5, 2019 from https://www.intrinsic-id.com/wp-content/uploads/2017/05/gt_KSI-PUF-web-1611.pdf.Google Scholar
- Ujjwal Guin, Pinchen Cui, and Anthony Skjellum. 2018. Ensuring proof-of-authenticity of IoT edge devices using blockchain technology. In Proceedings of the 2018 IEEE International Conference on Blockchain.Google ScholarCross Ref
- Ujjwal Guin, Ke Huang, Daniel DiMase, John M. Carulli, Mohammad Tehranipoor, and Yiorgos Makris. 2014. Counterfeit integrated circuits: A rising threat in the global semiconductor supply chain. Proceedings of the IEEE 102, 8 (2014), 1207--1228.Google ScholarCross Ref
- Zimu Guo, Md. Tauhidur Rahman, Mark M. Tehranipoor, and Domenic Forte. 2016. A zero-cost approach to detect recycled SoC chips using embedded SRAM. In Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST’16). IEEE, Los Alamitos, CA, 191--196.Google ScholarCross Ref
- Z. Guo, X. Xu, M. Tehranipoor, and D. Forte. 2017. FFD: A framework for fake flash detection. In Proceedings of the 54nd Annual Design Automation Conference. ACM, New York, NY. Google ScholarDigital Library
- D. Holcomb, W. P. Burleson, and K. Fu. 2007. Initial SRAM state as a fingerprint and source of true random numbers for RFID tags. In Proceedings of the Conference on RFID Security.Google Scholar
- Md. Nazmul Islam, Vinay C. Patii, and Sandip Kundu. 2018. On IC traceability via blockchain. In Proceedings of the 2018 International Symposium on VLSI Design, Automation, and Test (VLSI-DAT’18). IEEE, Los Alamitos, CA, 1--4.Google ScholarCross Ref
- Huckabee James and Troxtell Cles. 2002. Standard Linear and Logic Semiconductor Marking Guidelines. Retrieved March 5, 2019 from http://www.ti.com/lit/an/szza020c/szza020c.pdf.Google Scholar
- Nathalie Kae-Nune and Stephanie Pesseguier. 2013. Qualification and testing process to implement anti-counterfeiting technologies into IC packages. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE’13). IEEE, Los Alamitos, CA, 1131--1136. Google ScholarDigital Library
- Andrew B. Kahng, John Lach, William H. Mangione-Smith, Stefanus Mantik, Igor L. Markov, Miodrag Potkonjak, Paul Tucker, et al. 2001. Constraint-based watermarking techniques for design IP protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 20, 10 (2001), 1236--1252. Google ScholarDigital Library
- Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak, and Jason Cong. 2006. Protecting combinational logic synthesis solutions. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 25, 12 (2006), 2687--2696. Google ScholarDigital Library
- Farinaz Koushanfar and Gang Qu. 2001. Hardware metering. In Proceedings of the 38th Annual Design Automation Conference. ACM, New York, NY, 490--493. Google ScholarDigital Library
- Farinaz Koushanfar, Gang Qu, and Miodrag Potkonjak. 2001. Intellectual property metering. In Information Hiding. Springer, 81--95. Google ScholarDigital Library
- Cyrill Kuemin, Lea Nowack, Luisa Bozano, Nicholas D. Spencer, and Heiko Wolf. 2012. Oriented assembly of gold nanorods on the single-particle level. Advanced Functional Materials 22, 4 (2012), 702--708.Google ScholarCross Ref
- John Lach, William H. Mangione-Smith, and Miodrag Potkonjak. 2001. Fingerprinting techniques for field-programmable gate array intellectual property protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 20, 10 (2001), 1253--1261. Google ScholarDigital Library
- ESCS 9120 Information Source. 2009. Learn to Know the Difference With AS5553. Available at https://escs9120.wordpress.com/.Google Scholar
- Jae W. Lee, Daihyun Lim, Blaise Gassend, G. Edward Suh, Marten Van Dijk, and Srinivas Devadas. 2004. A technique to build a secret key in integrated circuits for identification and authentication applications. In Proceedings of the 2004 Symposium on VLSI Circuits (Digest of Technical Papers). IEEE, Los Alamitos, CA, 176--179.Google ScholarCross Ref
- Ralph C. Merkle. 1982. Method of providing digital signatures. US Patent 4,309,569.Google Scholar
- Mitchell Miller, Janice Meraglia, and James Hayward. 2012. Traceability in the Age of Globalization: A Proposal for a Marking Protocol to Assure Authenticity of Electronic Parts. Technical Report. SAE.Google Scholar
- Gordon E. Moore. 1998. Cramming more components onto integrated circuits. Proceedings of the IEEE 86, 1 (1998), 82--85.Google ScholarCross Ref
- David Z. Morris. 2016. Leaderless, blockchain-based venture capital fund raises $100 million, and counting. Fortune (Magazine) May 23, 2016.Google Scholar
- Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved March 5, 2019 from https://bitcoin.org/en/bitcoin-paper.Google Scholar
- Kim S. Nash. 2016. “IBM Pushes Blockchain Into the Supply Chain.” Wall Street Journal.Google Scholar
- Kim S. Nash. 2016. “Wal-Mart Readies Blockchain Pilot for Tracking U.S Produce, China Pork.” Wall Street Journal.Google Scholar
- George F. Nelson and William F. Boggs. 1975. Parametric tests meet challenge of high-density ICS. Electronics 48, 25 (1975), 108--111.Google Scholar
- Ravikanth Pappu, Ben Recht, Jason Taylor, and Neil Gershenfeld. 2002. Physical one-way functions. Science 297, 5589 (2002), 2026--2030.Google Scholar
- Marc Pilkington. 2015. Blockchain Technology: Principles and Applications. Retrieved March 5, 2019 from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2662660.Google Scholar
- Jeyavijayan Rajendran, Michael Sam, Ozgur Sinanoglu, and Ramesh Karri. 2013. Security analysis of integrated circuit camouflaging. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 709--720. Google ScholarDigital Library
- Jeyavijayan J. V. Rajendran, Ozgur Sinanoglu, and Ramesh Karri. 2013. Is split manufacturing secure? In Proceedings of the Conference on Design, Automation, and Test in Europe. 1259--1264. Google ScholarDigital Library
- Siraj Raval. 2016. Decentralized Applications: Harnessing Bitcoin’s Blockchain Technology. O’Reilly Media, Inc. Google ScholarDigital Library
- Jarrod A. Roy, Farinaz Koushanfar, and Igor L. Markov. 2010. Ending piracy of integrated circuits. Computer 43, 10 (2010), 30--38. Google ScholarDigital Library
- U. Rührmair, J. Sölter, F. Sehnke, X. Xu, A. Mahmoud, V. Stoyanova, G. Dror, et al. 2013. PUF modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security 8, 11, 1876--1891. Google ScholarDigital Library
- Sauriks. 2009. ECID—The iPhone Wiki. Retrieved March 5, 2019 from https://www.theiphonewiki.com/wiki/ECID.Google Scholar
- Economist Staff. 2016. Blockchains: The great chain of being sure about things. The Economist.Google Scholar
- G. Edward Suh and Srinivas Devadas. 2007. Physical unclonable functions for device authentication and secret key generation. In Proceedings of the 44th Annual Design Automation Conference. ACM, New York, NY, 9--14. Google ScholarDigital Library
- Don Tapscott and Alex Tapscott. 2016. Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World. Penguin. Google ScholarDigital Library
- Mohammad Tehranipoor and Cliff Wang. 2011. Introduction to Hardware Security and Trust. Springer Science 8 Business Media. Google ScholarDigital Library
- Mark Mohammad Tehranipoor, Ujjwal Guin, and Domenic Forte. 2015. Counterfeit integrated circuits. In Counterfeit Integrated Circuits. Springer, 15--36.Google Scholar
- Lingxiao Wei, Chaosheng Song, Yannan Liu, Jie Zhang, Feng Yuan, and Qiang Xu. 2015. Boardpuf: Physical unclonable functions for printed circuit board authentication. In Proceedings of the 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD’15). IEEE, Los Alamitos, CA, 152--158. Google ScholarDigital Library
- Xiaolin Xu, Wayne Burleson, and Daniel E. Holcomb. 2016. Using statistical models to improve the reliability of delay-based PUFs. In Proceedings of the 2016 IEEE Computer Society Annual Symposium on VLSI (ISVLSI’16). IEEE, Los Alamitos, CA, 547--552.Google Scholar
- Xuehui Zhang and Mohammad Tehranipoor. 2014. Design of on-chip lightweight sensors for effective detection of recycled ICs. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 22, 5 (2014), 1016--1029.Google ScholarCross Ref
- Xuehui Zhang, Nicholas Tuzzio, and Mohammad Tehranipoor. 2012. Identification of recovered ICs using fingerprints from a light-weight on-chip sensor. In Proceedings of the 49th Annual Design Automation Conference. ACM, New York, NY, 703--708. Google ScholarDigital Library
Index Terms
- Electronics Supply Chain Integrity Enabled by Blockchain
Recommendations
Blockchain-enabled supply chain: An experimental study
Highlights- There is a lack of studies in the field of blockchain applied to supply chains.
AbstractDespite Information and Communication Technologies (ICT) have reduced the information asymmetry and increased the degree of interorganizational collaboration, the companies participating a supply chain are less inclined to share data ...
Blockchain-Enabled Deep-Tier Supply Chain Finance
Problem definition: For many supply chains, deep-tier suppliers, due to their small size and lack of access to capital, are most vulnerable to disruptions. We study the use of advance payment (AP) as a financing instrument in a multitier supply chain to ...
An integrated framework for blockchain-enabled supply chain trust management towards smart manufacturing
AbstractWith the development of a new generation of information technology, smart manufacturing has put forward higher requirements for supply chain. It is necessary to ensure the synchronization of the supply chain operation and maintain the ...
Comments