Validation and Debug of Security and Trust Issues in Embedded Systems

被引:4
|
作者
Mishra, Prabhat [1 ]
Bhunia, Swarup [2 ]
Ravi, Srivaths [3 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn CISE, Gainesville, FL 32611 USA
[2] Case Western Reserve Univ, Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[3] Texas Instruments Bangalore, Bangalore, Karnataka, India
来源
2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID) | 2015年
关键词
D O I
10.1109/VLSID.2015.110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. However, growing reliance on reusable pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, cloning, counterfeiting, as well as malicious hardware modifications. The global electronic piracy market is growing rapidly and is now estimated to be $ 1B/day, of which a significant part is related to hardware IPs. Furthermore, use of untrusted foundry in a fabless business model greatly aggravates the SoC security threats by introducing vulnerability of malicious modifications or piracy during SoC fabrication. Due to ever-growing computing demands, modern SoCs tend to include many heterogeneous processing cores, scalable communication network, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities in SoC design cycle - IP vendors, CAD tool developers, and foundries - and develop low-cost effective countermeasures. These countermeasures would encompass encryption, obfuscation, watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of SoC to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. The tutorial also covers the security and debug trade-offs in modern SoCs e.g., more observability is beneficial for debug whereas limited observability is better for security. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow for secure SoC systems. The tutorial presenters (one industry expert and two faculty members) will be able to provide unique perspectives on both academic research and industrial practices. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of five parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various security attacks and countermeasures. Part III covers both formal methods and simulation-based approaches for security and trust validation. Part IV presents the conflicting requirements between security and debug during SoC development and ways to address them. Part V covers real- life examples of security failures and successful countermeasures in industry. Finally, Part VI concludes this tutorial with discussion on emerging issues and future directions.
引用
收藏
页码:3 / 5
页数:3
相关论文
共 50 条
  • [1] Tiered Trust for Useful Embedded Systems Security
    Ayers, Hudson
    Dutta, Prabal
    Levis, Philip
    Levy, Amit
    Pannuto, Pat
    Van Why, Johnathan
    Watson, Jean-Luc
    PROCEEDINGS OF THE 15TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 22), 2022, : 15 - 21
  • [2] On security issues in embedded systems: Challenges and solutions
    Khelladi, Lyes
    Challal, Yacine
    Bouabdallah, Abdelmadjid
    Badache, Nadjib
    International Journal of Information and Computer Security, 2008, 2 (02) : 140 - 174
  • [3] Functional debug techniques for embedded systems
    Vermeulen, Bart
    IEEE DESIGN & TEST OF COMPUTERS, 2008, 25 (03): : 208 - 215
  • [4] Trust and Security of Embedded Smart Devices in Advanced Logistics Systems
    VanYe, Christopher M.
    Li, Beatrice E.
    Koch, Andrew T.
    Luu, Mai N.
    Adekunle, Rahman O.
    Moghadasi, Negin
    Collier, Zachary A.
    Polmateer, Thomas L.
    Barnes, David
    Slutzky, David
    Manasco, Mark C.
    Lambert, James H.
    2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021), 2021, : 204 - 209
  • [5] Fuzzing Embedded Systems using Debug Interfaces
    Eisele, Max
    Ebert, Daniel
    Huth, Christopher
    Zeller, Andreas
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 1031 - 1042
  • [6] Efficient Security Monitoring with the Core Debug Interface in an Embedded Processor
    Lee, Jinyong
    Heo, Ingoo
    Lee, Yongje
    Paek, Yunheung
    ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, 2016, 22 (01)
  • [7] Guest editors' introdution: Security and trust in embedded-systems design
    Schaumont, Patrick
    Raghunathan, Anand
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 518 - 520
  • [8] Online Analysis of Debug Trace Data or Embedded Systems
    Decker, Normann
    Dreyer, Boris
    Gottsehling, Philip
    Hoehberger, Christian
    Lange, Alexander
    Leucker, Martin
    Scheffel, Torben
    Wegener, Simon
    Weiss, Alexander
    PROCEEDINGS OF THE 2018 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2018, : 851 - 856
  • [9] Debug-tool for embedded real time systems
    Langer, J
    Koppenberger, K
    Sulzbachner, C
    Nestler, T
    EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, 2005, : 599 - 602
  • [10] Security and Trust Issues in BYOD Networks
    Safdar, Ghazanfar Ali
    Mansour, Ali
    IT PROFESSIONAL, 2023, 25 (04) : 45 - 51