Case study: Detecting hardware Trojans in third-party digital IP cores

Author(s):  
Xuehui Zhang ◽  
Mohammad Tehranipoor
Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5165
Author(s):  
Chen Dong ◽  
Yi Xu ◽  
Ximeng Liu ◽  
Fan Zhang ◽  
Guorong He ◽  
...  

Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a change of functionality, leakage of information, even a denial of services (DoS), and so on. In this paper, a survey of HTs is presented, which shows the threatens of chips, and the state-of-the-art preventing and detecting techniques. Starting from the introduction of HT structures, the recent researches in the academic community about HTs is compiled and comprehensive classification of HTs is proposed. The state-of-the-art HT protection techniques with their advantages and disadvantages are further analyzed. Finally, the development trends in hardware security are highlighted.


Author(s):  
Travis Meade ◽  
Shaojie Zhang ◽  
Yier Jin ◽  
Zheng Zhao ◽  
David Pan

Abstract Reliance on third-party resources, including thirdparty IP cores and fabrication foundries, as well as wide usage of commercial-off-the-shelf (COTS) components has raised concerns that backdoors and/or hardware Trojans may be inserted into fabricated chips. Defending against hardware backdoors and/or Trojans has primarily focused on detection at various stages in the supply chain. Netlist reverse engineering tools have been investigated as an alternative to existing chip-level reverse engineering methods which can help recover functional netlists from fabricated chips, but fall short of detecting malicious logic or recovering high-level functionality. In this work, we develop a netlist reverse engineering tool-set which recovers high-level functionality from the netlist, thereby aiding malicious logic detection. The tool-set performs state register identification, control logic recovery and datapath tracking, which facilitates validation of encrypted/obfuscated hardware IP cores. Relying on 3-SAT algorithms and topology-based computational methods, we demonstrate that the developed tool-set can handle netlists of various complexities.


Buildings ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 260
Author(s):  
James Ellis ◽  
David John Edwards ◽  
Wellington Didibhuku Thwala ◽  
Obuks Ejohwomu ◽  
Ernest Effah Ameyaw ◽  
...  

This research explores the failure of competitively tendered projects in the UK construction industry to procure the most suited contractor(s) to conduct the works. Such work may have equal relevance for other developed nations globally. This research seeks to teach clients and their representatives that “lowest price” does not mean “best value”, by presenting a case study of a successfully negotiated tender undertaken by a small-to-medium enterprise (SME) contractor; SME studies are relatively scant in academic literature. By applying the “lessons learnt” principle, this study seeks to improve future practice through the development of a novel alternative procurement option (i.e., negotiation). A mixed philosophical stance combining interpretivism and pragmatism was used—interpretivism to critically review literature in order to form the basis of inductive research to discuss negotiation as a viable procurement route, and pragmatism to analyse perceptions of tendering and procurement. The methods used follow a three-stage waterfall process including: (1) literature review and pilot study; (2) quantitative analysis of case study data; and (3) qualitative data collection via a focus group. Our research underscores the need to advise clients and their representatives of the importance of understanding the scope of works allowed within a tender submission before discounting it based solely on price. In addition, we highlight the failings of competitive tendering, which results in increased costs and project duration once the works commence on site. These findings provide new contemporary insight into procurement and tendering in the construction industry, with emphasis on SME contractors, existing relationships, and open-book negotiation. This research illustrates the adverse effects of early cost estimates produced without first securing a true understanding of project buildability and programming. Our work concludes with a novel insight into an alternative procurement option that involves early SME contractor involvement in an open-book environment, without the need for a third-party cost control.


2020 ◽  
Vol 13 (1) ◽  
pp. 210
Author(s):  
Carlos Martin-Rios ◽  
Anastasia Hofmann ◽  
Naomi Mackenzie

Food is essential to our survival, yet the Food and Agriculture Organization of the United Nations (FAO) estimates that about 820 million people were undernourished in 2018. In this context, food waste generation is a particularly salient issue. Wasting food means missing opportunities to feed the growing world population and consuming scarce resources, such as land, water and energy used in the production, processing, distribution and consumption of food. Firms in HORECA (hospitality, restaurant and catering) represent a considerable share of total food waste and, more importantly, are characterized by an overall low sense of awareness about the sustainability-oriented innovation opportunities and challenges of minimizing food waste. This article draws on an in-depth case study to explore the use of technological advancements in downstream value chain. This case study draws on a tech startup providing services for HORECA companies to address a new way for companies to solve the food waste challenge. Adopting technological innovations to quantify and minimize wastage via collaborations with third-party companies can be a strategic and cost-effective way to supplement a company’s open innovation activities.


Author(s):  
Brian Sternthal ◽  
Prashant Malaviya

The case traces the development of the Under Armour (UA) brand, product, and market growth under CEO and founder Kevin Plank from its inception in 1996 through 2016. UA provides a cohesive case study of how to launch and sustain a consumer brand even in the face of its third-party manufacturing approach, which gives its apparel no patentable design or fabric technologies. The case uses UA's brand and advertising development as a backdrop for the current pivotal issue of how to target women to sustain growth. UA's stated goal is to build a $1.9 billion women's business by 2019. In laying out UA's growth and competitive moves, the case lets students analyze broadcast, social media, and other digital advertising campaigns in view of the company's brand development and strategic targeting. The case also highlights the importance of leveraging brand heritage and historical differentiation while respecting key nuances when extending into new markets (i.e., moving from a predominantly male-driven audience to female). It also allows an exploration of how to use consumer insight and broader cultural attitudes and trends to support extending a position into new markets.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Daniel Jung Yue Chun ◽  
Wahid Abdul Nabsiah ◽  
Cheng Ling Tan

Purpose This paper aims to discover why such a public partnership project had been successful with a non-profit third-party alliance such as a smart city consortium (SCC) promoting smart city development. Design/methodology/approach This descriptive case study is primarily based on analysing data collected from various texts, public statements, media interviews and three semi-structured interviews with key members involved in the Covid-19 dashboard project. Findings The data and analysis reviews that both interpersonal and interorganisational trust, dedication and proactiveness of the leaders at SCC were major contributing factors to why SCC was able to partner with the Hong Kong Government in the Covid-19 dashboard in the first place and that the success was also a direct outcome of effective mass collaborative knowledge management activities. Research limitations/implications The research in leadership attributes and activities in the non-profit alliance has been few and this collaborative partnership between the alliance and the government is an example of the importance of further research in smart city leadership. Practical implications In deploying projects for mass collaboration and knowledge sharing in smart city development (which is multi-disciplinary in nature). there are still many new and evolving organisational practices and leadership matters that many business leaders and city managers can learn from. Social implications Smart city development projects involve the notion of sharing data in an open environment enabled by software and mediating tools. Successful projects such as this Hong Kong Covid-19 dashboard which serves a diverse audience can further promote the importance of an open data policy regime for the benefit of the public. Originality/value This case study covers a highly original and unique case study with the leaders at the SCC and representatives from the Hong Kong Government.


2018 ◽  
Vol 10 (9) ◽  
pp. 3272 ◽  
Author(s):  
Elena-Teodora Miron ◽  
Anca Purcarea ◽  
Olivia Negoita

Third-party innovators, i.e., complementors, in platform enterprises develop and commercialize add-on products which are one of the main attraction points for customers. To ensure a sustainable evolution of the enterprise, the platform owner needs to attract and retain high-quality third-party innovators. We posit that the transaction costs incurred upon joining the enterprise as well as the controls imposed by the platform owner throughout the development and commercialization process shape the innovator’s perceived risk and influence his decision on whether to join or not. Based on a literature review, the paper at hand proposes a conceptual model for complementors to assess their perceived risk and subsequently evaluates the model in a case study of a platform enterprise for IT-based modelling tools. While some of the propositions are validated, i.e., that informational controls decrease the perceived environmental uncertainty and implicitly the perceived risks, other propositions, such as the fact that asset specificity is a deterrent to entering the platform enterprise could not be validated. Further case studies are necessary to provide a conclusive proof of the proposed model.


Sign in / Sign up

Export Citation Format

Share Document