Validation and Debug of Security and Trust Issues in Embedded Systems

被引:4
|
作者
Mishra, Prabhat [1 ]
Bhunia, Swarup [2 ]
Ravi, Srivaths [3 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn CISE, Gainesville, FL 32611 USA
[2] Case Western Reserve Univ, Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[3] Texas Instruments Bangalore, Bangalore, Karnataka, India
来源
2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID) | 2015年
关键词
D O I
10.1109/VLSID.2015.110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. However, growing reliance on reusable pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, cloning, counterfeiting, as well as malicious hardware modifications. The global electronic piracy market is growing rapidly and is now estimated to be $ 1B/day, of which a significant part is related to hardware IPs. Furthermore, use of untrusted foundry in a fabless business model greatly aggravates the SoC security threats by introducing vulnerability of malicious modifications or piracy during SoC fabrication. Due to ever-growing computing demands, modern SoCs tend to include many heterogeneous processing cores, scalable communication network, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities in SoC design cycle - IP vendors, CAD tool developers, and foundries - and develop low-cost effective countermeasures. These countermeasures would encompass encryption, obfuscation, watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of SoC to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. The tutorial also covers the security and debug trade-offs in modern SoCs e.g., more observability is beneficial for debug whereas limited observability is better for security. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow for secure SoC systems. The tutorial presenters (one industry expert and two faculty members) will be able to provide unique perspectives on both academic research and industrial practices. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of five parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various security attacks and countermeasures. Part III covers both formal methods and simulation-based approaches for security and trust validation. Part IV presents the conflicting requirements between security and debug during SoC development and ways to address them. Part V covers real- life examples of security failures and successful countermeasures in industry. Finally, Part VI concludes this tutorial with discussion on emerging issues and future directions.
引用
收藏
页码:3 / 5
页数:3
相关论文
共 50 条
  • [11] Embedded systems security
    Department of Electrical Engineering, COMSATS Institute of Information Technology, Lahore, Pakistan
    不详
    Cyber Secty. Std., Practices and Indust. Applic.: Syst. and Methodologies, (179-198):
  • [12] Embedded systems security
    Claudia Eckert
    Datenschutz und Datensicherheit - DuD, 2012, 36 (12) : 861 - 861
  • [13] Embedded Tutorial: Regaining Hardware Security and Trust
    Sinanoglu, Ozgur
    2013 14TH IEEE LATIN-AMERICAN TEST WORKSHOP (LATW2013), 2013,
  • [14] On-chip debug support for embedded systems-on-chip
    Maier, KD
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL V: BIO-MEDICAL CIRCUITS & SYSTEMS, VLSI SYSTEMS & APPLICATIONS, NEURAL NETWORKS & SYSTEMS, 2003, : 565 - 568
  • [15] DEBUGGING EMBEDDED SYSTEMS - EMERGING TOOLS HELP DESIGNERS DEBUG 32-BIT EMBEDDED SYSTEMS
    WEISS, R
    COMPUTER DESIGN, 1995, 34 (07): : 69 - &
  • [16] Editorial: Security of Embedded Systems and Cyber Irons-Embedded Systems for Security
    Shukla, Sandeep K.
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2016, 15 (04)
  • [17] A Novel Security Validation in Embedded System
    Wang, Xiang
    Xu, Bin
    Wang, Weike
    Li, Lin
    Du, Pei
    Zhou, Cheng
    Li, Mingzhe
    Xia, Tongsheng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 632 - 635
  • [18] Security and trust issues in Fog computing: A survey
    Zhang, PeiYun
    Zhou, MengChu
    Fortino, Giancarlo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 88 : 16 - 27
  • [19] Security and Trust Issues on Digital Supply Chain
    Zhang, Haibo
    Nakamura, Toru
    Sakurai, Kouichi
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 338 - 343
  • [20] Security and trust in ubiquitous systems
    Samia Bouzefrane
    Jenny Gabriela Torres Olmedo
    Gongxuan Zhang
    Nicolas Puech
    Annals of Telecommunications, 2021, 76 : 117 - 118