Component Design

This knowledge unit introduces the principles that underlie both design and implementation. The first five are restrictiveness principles, the next three are simplicity principles, and the rest are methodology principles.

Topics

  1. Component design security:  This topic covers threats to the security of component design artifacts (e.g., schematics, netlists, and masks) such as hardware Trojans, intellectual property piracy, reverse engineering, tampering, side-channel analysis and counterfeiting. It also introduces techniques for protecting components from unauthorized access and use.
  2. Principles of secure component design: This topic covers principles such as establishing a sound security policy, treating security as an integral part of system design, trusted computing platforms, chain of trust, reducing risk, layered security, simplicity of design, minimizing system elements to be trusted, and avoiding unnecessary security mechanisms.
  3. Component identification: This topic covers techniques such as watermarking, fingerprinting, metering, encrypted IDs, and physical unclonable functions for protecting components against intellectual property theft and ensuring component authenticity.
  4. Anti-reverse engineering techniques: This topic covers techniques such as design obfuscation and camouflaging for making component designs and implementations difficult to reverse engineer.
  5. Side-channel attack mitigation: This topic covers techniques for defending against side-channel attacks primarily targeted at cryptographic algorithms. Defensive techniques include leakage reduction, noise injection, frequent key updates, physical random functions, and secure scan chains.
  6.  Anti-tamper technologies: This topic covers techniques for making components resistant to physical and electronic attacks including physical protection techniques, tamper evident systems and tamper responding systems.

Suggestions Accepted for consideration for the next Edition:

Please provide your suggestions about this knowledge unit. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.

Leave a Reply

Your email address will not be published. Required fields are marked *