Engineering faculty-researcher awarded grant to decrease computer chip vulnerabilities
Michael Zuzak leads framework to ensure chip designs are not pirated or counterfeited
Michael Zuzak, a faculty-researcher at Rochester Institute of Technology, is one of a growing field of engineers looking to improve computer chip security during manufacturing. Current solutions focus on securing specific regions of the chip design. This leaves the larger architecture vulnerable to compromise. Zuzak’s work to secure the entire chip could prevent piracy and help protect intellectual property.
“To get chips fabricated, you have to send the entire design to the manufacturer. Ultimately what we want to protect is what the company considers high value. We want to allocate security to more sensitive, unique parts of the system. The hope is that we will have the ability to prevent intellectual property theft during the entire semiconductor fabrication,” said Zuzak, an assistant professor of computer engineering in RIT’s Kate Gleason College of Engineering.
Zuzak received a two-year National Science Foundation grant to use the developmental practice of logic obfuscation to enable system-wide security during the manufacturing and testing of integrated circuits, also referred to as computer chips.
Global manufacturing companies mass produce integrated circuits. For fabrication, these companies are given extensive design files that can be counterfeited, pirated, or modified. This threatens “high-trust” applications such as healthcare and defense. Logic obfuscation was developed to mitigate threats. The proposed project will develop a design space modeling framework to automatically identify obfuscation configurations capable of system-wide security.
Zuzak is an expert in hardware security and methods to design and manufacture secure and reliable electronic systems. Hiding functionality during the production process is a way to ensure that the design cannot be modified or counterfeited.
“We’ve gotten very good at locking specific parts of the chip. What I am looking at is how we distribute obfuscation optimally throughout the full system to secure it as a whole rather than just specific modules within the chip,” said Zuzak, who is developing AI-driven algorithms to perform security assessments of the physical design that are resistant to reverse engineering attacks. Logic obfuscation makes some portion of the design dependent on a withheld value, a number or secret key. Making the design dependent on that key would allow the manufacturer to produce the computer chip, but not have information about its functionality.
Already Zuzak and his team have developed mathematical models for computer chips capable of predicting the effectiveness of security solutions with over 95 percent accuracy. These models can be customized for new chip design after sampling less than 1 percent of possible security configurations.
In the coming months, Zuzak will use these models to automatically distribute security resources in computer chips to optimize the protection of any intellectual property within them, he explained.
The work is not without challenges, and Zuzak is trying to build a solution that can secure a computer chip but also recognize that different devices require different system components.
“The biggest challenge is that every system is fundamentally different. In my work, I look at this from a mathematical and a design space modeling perspective. It is used a lot in architecture where you design systems; I am looking at it and asking how do you design secure systems? And how do you targert security rather than just architecture.”
By architecture, Zuzak means the structural aspects of a computing system and the interconnected components’ functionality. Designing computer chips is complex and labor intensive. Companies make substantial investments in intellectual property to produce a chip design for specific electronic device systems.
“People see this in the news, right? It is covered like crazy now, and when we talk to our industry advisory board, they light up when they hear security. It’s an exciting time,” said Zuzak.