skip to main content
10.1145/3658644.3691378acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users

Published: 09 December 2024 Publication History

Abstract

Due to the globalization of the semiconductor supply chain, chip fabrication now involves multiple parties, including intellectual property (IP) vendors and Electronic Design Automation (EDA) tool vendors. Involving multiple entities and valuable IP naturally raises security and privacy concerns. Various frameworks and tools, such as the IEEE 1735 standard for IP protection, have been developed to mitigate the risk of theft. However, existing solutions fail to address all the threats envisioned by the zero-trust model. We propose a novel zero-trust formal verification framework that requires only two essential parties: IP users and IP vendors. This framework leverages secure multiparty computation to ensure the security and privacy of the hardware verification process. Our proposed solution allows IP users and IP vendors to independently convert the hardware design and assertions into conjunctive normal form (CNF), and then apply privacy-preserving SAT solving to verify the conformance of the design to the specification. This paper introduces a domain-specific secure decision procedure, hw-ppSAT, designed to overcome the scalability challenges of using SAT solving in hardware design verification. Our approach also leverages property-based hardware optimizations and domain-specific heuristics to enhance the verification process. We showcase the framework's effectiveness through its application to several open-source benchmarks.

References

[1]
Jianhui Chen and Fei He. 2018. Control flow-guided SMT solving for program verification. In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. 351--361.
[2]
Martin Davis, George Logemann, and Donald Loveland. 1962. A Machine Program for Theorem-Proving. Commun. ACM, Vol. 5, 7 (1962), 394--397.
[3]
Martin Davis and Hilary Putnam. 1960. A Computing Procedure for Quantification Theory. Journal of the ACM (JACM), Vol. 7, 3 (1960), 201--215.
[4]
Mohammad Hashemi, Steffi Roy, Fatemeh Ganji, and Domenic Forte. 2022. Garbled EDA: Privacy Preserving Electronic Design Automation. In 2022 IEEE/ACM International Conference On Computer Aided Design (ICCAD '22). 1--9. To appear.
[5]
Mark Tehranipoor Hassan Salmani. [n.,d.]. Trusthub. https://www.trust-hub.org/.
[6]
Andrew B Kahng and et al. 2001. Constraint-based Watermarking Techniques for Design IP Protection. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 20, 10 (2001), 1236--1252.
[7]
Hadi Mardani Kamali, Kimia Zamiri Azar, Farimah Farahmandi, and Mark Tehranipoor. 2022. Advances in Logic Locking: Past, Present, and Prospects. IACR Cryptol. ePrint Arch. (2022).
[8]
Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, and Xiao Wang. 2022. ppSAT: Towards Two-Party Private SAT Solving. In 31st USENIX Security Symposium (USENIX Security 22). 2983--3000.
[9]
Dimitris Mouris and Nektarios Georgios Tsoutsos. 2020. Pythia: Intellectual Property Verification in Zero-Knowledge. In 2020 57th ACM/IEEE Design Automation Conference (DAC '20). 1--6. https://doi.org/10.1109/DAC18072.2020.9218639
[10]
Rajdeep Mukherjee, Michael Tautschnig, and Daniel Kroening. 2016. v2c -- A Verilog to C Translator Tool. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS '16). Springer, 580--586.
[11]
Shinya Takamaeda-Yamazaki. 2015. Pyverilog: A Python-based Hardware Design Processing Toolkit for Verilog HDL. In Applied Reconfigurable Computing: 11th International Symposium, ARC 2015, Bochum, Germany, April 13--17, 2015, Proceedings 11. Springer, 451--460.
[12]
Various Contributors. 2021. OpenCores.org.
[13]
Debby Wu. 2020. Engineers Found Guilty of Stealing Micron Secrets for China. Bloomberg.

Index Terms

  1. Poster: BlindMarket: A Trustworthy Chip Designs Marketplace for IP Vendors and Users

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security
    December 2024
    5188 pages
    ISBN:9798400706363
    DOI:10.1145/3658644
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 December 2024

    Check for updates

    Author Tags

    1. hardware security & piracy
    2. ip verification
    3. secure multiparty computation

    Qualifiers

    • Poster

    Funding Sources

    Conference

    CCS '24
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 64
      Total Downloads
    • Downloads (Last 12 months)64
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media

    pFad - Phonifier reborn

    Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

    Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


    Alternative Proxies:

    Alternative Proxy

    pFad Proxy

    pFad v3 Proxy

    pFad v4 Proxy