37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales

Unlock the secrets of hardware security through this talk, exploring supply chain threats, hardware trojan detection, and the four pillars of making it work, with a focus on automation and collaboration.

Key takeaways
  • Hardware security is a significant concern as millions of digital ICs are deployed in various systems and devices.
  • Supply chain threats include active attackers weakening cryptographic primitives and adding spy ICs to PCBs.
  • Hardware trojans can be inserted during fabrication or packaging, leading to subtle modifications that are hard to detect.
  • The detection process involves aligning cell images, applying algorithms to detect manipulations, and recovering net lists.
  • The four pillars of making hardware security work are automation, training, cognition, and artefact mitigation.
  • The detection of hardware trojans in chips is a challenging task, requiring the development of effective algorithms and tools.
  • The study of hardware detection case studies shows that a template matching algorithm can detect manipulations effectively.
  • The focus should be on automating repetitive tasks and using accessible and intuitive tools for experts and non-experts alike.
  • The detection of hardware trojans in chips is a multidisciplinary task that requires collaboration between cognitive scientists, computer scientists, and engineers.
  • The blue team’s approach to detection involves iterative tuning of parameters to work well with algorithms.
  • The three pillars of making hardware detection work are human-computer interaction, cognition, and artefact.
  • The development of effective algorithms and tools for hardware detection is crucial for the creation of reliable and secure systems.
  • The study of hardware detection case studies reveals the need for practical applications and training resources.
  • The detection of hardware trojans in chips is a significant concern that requires the development of effective detection methods and tools.
  • The automation of repetitive tasks and the use of accessible and intuitive tools are essential for detecting hardware trojans in chips.
  • The blue team’s approach to detection involves using high-level descriptions of hardware to detect manipulations.
  • The detection of hardware trojans in chips is a multidisciplinary task that requires collaboration between cognitive scientists, computer scientists, and engineers.