{"id":21679,"date":"2017-08-24T12:41:26","date_gmt":"2017-08-24T16:41:26","guid":{"rendered":"https:\/\/www.tun.com\/blog\/?p=21679"},"modified":"2019-03-12T12:35:31","modified_gmt":"2019-03-12T16:35:31","slug":"nyu-abu-dhabi-unhackable-computer-chip-technology","status":"publish","type":"post","link":"https:\/\/www.tun.com\/blog\/nyu-abu-dhabi-unhackable-computer-chip-technology\/","title":{"rendered":"NYU Abu Dhabi Researchers Develop New \u2018Logic-Locked\u2019 Unhackable Computer Chip Technology"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Researchers at New York University Abu Dhabi\u2019s (NYUAD) Design for Excellence (Dfx) lab have <\/span><a href=\"http:\/\/nyuad.nyu.edu\/content\/nyuad\/en\/home\/news\/press-room\/press-releases\/researchers-at-nyu-abu-dhabi-develop-breakthrough-computer-chip.html\"><span style=\"font-weight: 400;\">developed <\/span><\/a><span style=\"font-weight: 400;\">a new unhackable computer chip technology with security features implemented at the hardware level. Chips that are \u201clogic-locked\u201d are not vulnerable to hacking, and cannot be copied. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber security attacks have become rampant over the past 20 years. In the digital age, computer chips are everywhere. They are in phones, cars, medical devices, and airplanes, and are applicable in nearly every industry. Logic-locking technology can be used in any digital chip, so it could potentially make all electronics trustworthy. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">To further understand the implications of this revolutionary technology, The University Network spoke with <\/span><a href=\"http:\/\/nyuad.nyu.edu\/en\/academics\/faculty\/ozgur-sinanoglu.html\"><span style=\"font-weight: 400;\">Ozgur Sinanoglu<\/span><\/a><span style=\"font-weight: 400;\">, NYUAD\u2019s Associate Dean of Engineering for Academic Affairs, Associate Professor of Electrical and Computer Engineering, and Head of Dfx.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cThis is the first working prototype of a chip that has security features (i.e., locks) implemented as part of its hardware design,\u201d said Sinanoglu.<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400;\">For the first time, a chip is protected from hardware-level threats.<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400;\">Until now, technology security methods have only been used at the software or system levels. This is problematic because there is no way to recover or fix software \u00a0if the hardware is infiltrated, thus making software security methods pointless. This new technology locks the hardware and only permits access to those who know the \u201csecret key.\u201d <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cWithout the secret key, the chips cannot be made functional,\u201d Sinanoglu said. \u201cSomeone who reverse-engineers the chip to obtain the hardware design details to, say, copy\/clone it, will not be able to retrieve all the design information as the locks in the design serve obfuscation purposes as well. Depending on the secret key, the chip could be implementing one of billions of different functionalities. The functionality of chip (what it does, how it does it, etc) can only be known if the secret key is known.\u201d<\/span><\/p>\n<p><iframe title=\"Computer Chip Can&#039;t Be Hacked\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/lK9K7Hwbaig?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p><span style=\"font-weight: 400;\">Dfx lab researchers have spent the past seven years searching for a remedy to hardware level threats. They have developed various solutions over the years, but decided to take logic-locking all the way to a proof-of-concept testing due to its simplicity and accessibility.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cFor the prototype, we designed a microcontroller chip that mainly consists of an Arm Cortex M0 processor,\u201d Sinanoglu explained. \u201cWe received the high level design architecture of the microprocessor from ARM, a UK-based microprocessor design company. We made changes to the design by utilizing our logic locking software to add security features, i.e., locks at the hardware level. We then had the chips manufactured in Singapore facilities of GlobalFoundries by using the 65nm technology node.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From the technology standpoint, logic-locking is ready to be deployed. Because this technology is so universally applicable, the team will eventually be able to market to any chip design company to develop unhackable chips. The only barrier holding back marketability is the chip design industry\u2019s lack of knowledge surrounding hardware-level threats. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although these threats are becoming increasingly prominent, many companies are still unaware of their destructiveness. Sinanoglu and his team are striving to increase awareness, but expect earlier adoption in certain industries that are more security-critical, such as defense applications. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cDefense agencies are seriously concerned with hardware-level threats,\u201d Sinanoglu said. \u201cWe expect the hardware-level threats to be more pressing in the near future, necessitating most industries, even consumer electronics, to adopt solutions such as ours.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The full paper containing NYUAD\u2019s Dfx team\u2019s research will be displayed in November at the ACM Conference on Computer and Communications Security. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at New York University Abu Dhabi\u2019s (NYUAD) Design for Excellence (Dfx) lab have developed a new unhackable computer chip technology with security features implemented at the hardware level. Chips that are \u201clogic-locked\u201d are not vulnerable to hacking, and cannot be copied. Cyber security attacks have become rampant over the past 20 years. In the [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":21681,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[231,232,633,629,230,229],"tags":[],"class_list":["post-21679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-campus-news","category-technology","category-hackathon","category-security","category-news","category-lead-stories"],"aioseo_notices":[],"uagb_featured_image_src":{"full":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png",830,533,false],"thumbnail":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip-224x144.png",224,144,true],"medium":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip-300x193.png",300,193,true],"medium_large":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png",830,533,false],"large":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png",830,533,false],"1536x1536":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png",830,533,false],"2048x2048":["https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png",830,533,false]},"uagb_author_info":{"display_name":"Jackson Schroeder","author_link":"https:\/\/www.tun.com\/blog\/author\/jackson-schroeder\/"},"uagb_comment_info":0,"uagb_excerpt":"Researchers at New York University Abu Dhabi\u2019s (NYUAD) Design for Excellence (Dfx) lab have developed a new unhackable computer chip technology with security features implemented at the hardware level. Chips that are \u201clogic-locked\u201d are not vulnerable to hacking, and cannot be copied. Cyber security attacks have become rampant over the past 20 years. In the&hellip;","featured_media_src_url":"https:\/\/www.tun.com\/blog\/wp-content\/uploads\/2017\/08\/NYU-computer-chip.png","_links":{"self":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts\/21679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/comments?post=21679"}],"version-history":[{"count":0,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/posts\/21679\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/media\/21681"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/media?parent=21679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/categories?post=21679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/blog\/wp-json\/wp\/v2\/tags?post=21679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}