Light-Weight Security Protocol and Data Model for Chip-to-Chip Zero-Trust

被引:2
作者
Ahmed, Ashfaq [1 ]
Shoufan, Abdulhadi [1 ,2 ]
Belwafi, Kais [1 ]
机构
[1] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept Elect Engn & Comp Sci, Abu Dhabi, U Arab Emirates
关键词
Secure protocol and data model (SPDM); automatic verification of internet security protocols and applications (AVISPA); secure protocol animator (SPAN); formal verification (FV); AUTHENTICATION; DESIGN;
D O I
10.1109/ACCESS.2023.3285630
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The semiconductor supply chain is vulnerable to multiple security attacks, such as hardware Trojan injection, intellectual property theft, and overproduction. The notion of zero-trust (ZT) - never trust, always verify - offers a promising opportunity for chip security by authenticating integrated circuits (ICs) when they are connected to critical computing systems. Before exchanging any data, the system establishes trust with the chip using industry security protocols. In this paper, we propose using the secure protocol and data model (SPDM) to establish chip-to-chip (C2C)-ZT communications. Furthermore, we present formal models for this solution and verify these models using state-of-the-art formal verification tools. The results show that the SPDM meets the requirements of the ZT architecture and can be used as a foundation for secure C2C interconnection.
引用
收藏
页码:60335 / 60348
页数:14
相关论文
共 40 条
[1]   Securing hard drives with the Security Protocol and Data Model (SPDM) [J].
Alves, Renan C. A. ;
Albertini, Bruno C. ;
Simplicio, Marcos A., Jr. .
2022 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2022), 2022, :446-447
[2]  
[Anonymous], 2022, 121 DMTF
[3]  
[Anonymous], 2022, PCI EXPR 7 0 SPEC PC
[4]   SAT-based model-checking for security protocols analysis [J].
Armando, Alessandro ;
Compagna, Luca .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (01) :3-32
[5]   Formal verification of security protocol implementations: a survey [J].
Avalle, Matteo ;
Pironti, Alfredo ;
Sisto, Riccardo .
FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) :99-123
[6]  
Basin D., 2005, Int. J. Inf. Secur, V4, P181, DOI [DOI 10.1007/S10207-004-0055-7, 10.1007/s10207-004-0055-7]
[7]  
Bicakci Kemal, 2021, 2021 International Conference on Information Security and Cryptology (ISCTURKEY), P28, DOI 10.1109/ISCTURKEY53027.2021.9654298
[8]  
Boichut Y., 2022, PROC INT WS AUTOMATE, P1
[9]   A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture [J].
Chen, Baozhan ;
Qiao, Siyuan ;
Zhao, Jie ;
Liu, Dongqing ;
Shi, Xiaobing ;
Lyu, Minzhao ;
Chen, Haotian ;
Lu, Huimin ;
Zhai, Yunkai .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10248-10263
[10]  
Chen X., 2022, arXiv, DOI DOI 10.48550/ARXIV.2203.07716