Hardware/Software Implementation of a Chip-to-Chip Communication Protocol Based on SPDM

被引:0
作者
Belwafi, Kais [1 ]
Shoufan, Abdulhadi [2 ]
Alsafi, Mariam [2 ]
Ahmed, Ashfaq [2 ]
Han, Kyusuk [3 ]
机构
[1] Univ Sharjah, Comp Engn Dept, CCI, Sharjah, U Arab Emirates
[2] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi, U Arab Emirates
[3] Technol & Innovat Inst, Abu Dhabi, U Arab Emirates
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Security; Hardware; Protocols; Authentication; Computer architecture; Supply chains; Protection; Universal Serial Bus; Data models; Complexity theory; Zero-trust; chip authenticity; chip-to-chip communication; SPDM; hardware security;
D O I
10.1109/ACCESS.2024.3519385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero-Trust security has received significant attention because of its focus on the need to constantly verify rather than trust, especially as attackers use increasingly sophisticated methods. It is now critical to ensure the security and authenticity of Integrated Circuits (ICs), particularly in important systems like drones or Internet of Things devices. Since most ICs are manufactured in third-party foundries to cut costs and improve production efficiency, there are concerns about the theft of IC design intellectual property and the potential deployment of hardware-level trojans. To tackle these issues, this study suggests a zero-trust chip-to-chip (ZTC2C) security architecture that verifies the authenticity of any connected peripheral before its use, ensuring secure, trusted interactions and enabling robust chip-to-chip communication, even between components from different manufacturers. The proposed architecture consists of four key modules: a Zero-Trust Processor (ZTP) with an RV64 core, a Zero-Trust Management (ZTM) unit with an RV32 core featuring Certificate and Secret Storage (CSS) and a Certificate Management Unit (CMU). The ZTP interfaces with the connected peripherals, allowing the execution of the Security Protocol and Data Model (SPDM). SPDM is a reliable option for achieving zero-trust security on the hardware level. The proposed architecture is prototyped on an embedded platform based on the Genesys 2 board and then integrated into a drone flight controller based on the VCU118 board to protect it from unauthenticated plugged devices. It achieved a peak computational performance of 4 GFLOP/s (8 GFLOP/s) on the Genesys 2 (VCU118) platform, using only 32% (22%) of the available resources and consuming 80 mW (195 mW).
引用
收藏
页码:194962 / 194972
页数:11
相关论文
共 39 条
  • [1] Dipta D.R., Gulmezoglu B., MAD-EN: Microarchitectural attack detection through system-wide energy consumption, IEEE Trans. Inf. Forensics Security, 18, pp. 3006-3017, (2023)
  • [2] Fadiheh M.R., Wezel A., Muller J., Bormann J., Ray S., Fung J.M., Mitra S., Stoffel D., Kunz W., An exhaustive approach to detecting transient execution side channels in RTL designs of processors, IEEE Trans. Comput., 72, 1, pp. 222-235, (2023)
  • [3] Skorobogatov S., Woods C., Breakthrough silicon scanning discovers backdoor in military chip, Cryptographic Hardware and Embedded Systems, pp. 23-40, (2012)
  • [4] Tehranipoor M., Koushanfar F., Asurvey of hardware trojan taxonomy and detection, IEEE Des. Test Comput., 27, 1, pp. 10-25, (2010)
  • [5] Chakraborty R.S., Bhunia S., HARPOON: An obfuscation-based SoC design methodology for hardware protection, IEEE Trans. Comput.-Aided Design Integr. Circuits Syst., 28, 10, pp. 1493-1502, (2009)
  • [6] Karmakar R., Jana S.S., Chattopadhyay S., A cellular automata guided finite-state-machine watermarking strategy for IP protection of sequential circuits, IEEE Trans. Emerg. Topics Comput., 10, 2, pp. 806-823, (2022)
  • [7] Roy J.A., Koushanfar F., Markov I.L., EPIC: Ending piracy of integrated circuits, Proc. Design, Autom. Test Eur. (DATE), pp. 1069-1074, (2008)
  • [8] Karageorgos I., Isgenc M.M., Pagliarini S., Pileggi L., Chipto-chip authentication method based on SRAM PUF and public key cryptography, J. Hardw. Syst. Secur., 3, 4, pp. 382-396, (2019)
  • [9] Aloseel A., He H., Shaw C., Khan M.A., Analytical review of cybersecurity for embedded systems, IEEE Access, 9, pp. 961-982, (2021)
  • [10] Embrey B., The top three factors driving zero trust adoption, Comput. Fraud Secur., 2020, 9, pp. 13-15, (2020)