Lead Inventors:
Simha Sethumadhavan PhD,
Adam Waksman
Microprocessors Rish Security Threats to Data and Intellectual Property through Hardware Backdoor
Microprocessors can be compromised during their design and manufacturing, representing a serious security threat to both the data it can access and process and the intellectual property of the components on the device. This type of security threat is known as a hardware 'backdoor' or 'Trojan'. It is implemented as a virtually invisible modification to an integrated circuit (IC). It is triggered by signals it receives or by measuring time and can theoretically evade validation testing by the manufacturer during fabrication. Therefore, a Trojan IC could be widely distributed or end up in a security-sensitive device. Mitigating or eliminating this risk is highly complex and potentially very expensive. Because of the prevalence of microprocessors, the security threat of an undetectable hardware backdoor that could not be disabled is significant and ominous.
Hardware Backdoor Disabled with Remote Power Resets and Simple Cryptography
This technology introduces a method for disabling all backdoor triggers when the microprocessor powers on and begins operation (aka ""at run-time"") and is therefore more effective and less expensive than the alternatives. This technology uses a previously known method for power resets and simple cryptography implemented at the microprocessor's clock cycle level.
Applications:
-- This technology can enable recoverable data from an enemy captured device
-- This technology allows for technical fingerprints enabling system reverse-engineering
-- This technology can enable remote disabling of active devices.
-- This technology would be vitally important to maintaining security in the following sectors:
~ Military and Government
~ Transportation
~ Finance
~ Telecom
~ Water systems
~ Energy grids
Advantages:
-- There are currently no commercially marketed solutions or publicly known implemented techniques in production for disabling a Trojan IC at run-time only; this technology solves this.
-- More effective than current alternatives to disable Trojan ICs
-- Less expensive than current alternatives to disable Trojan ICs
Patent Information:
Patent Issued
Licensing Status: Available for Sponsored Research Support