Validation and Debug of Security and Trust Issues in Embedded Systems

被引:4
|
作者
Mishra, Prabhat [1 ]
Bhunia, Swarup [2 ]
Ravi, Srivaths [3 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn CISE, Gainesville, FL 32611 USA
[2] Case Western Reserve Univ, Elect Engn & Comp Sci, Cleveland, OH 44106 USA
[3] Texas Instruments Bangalore, Bangalore, Karnataka, India
来源
2015 28TH INTERNATIONAL CONFERENCE ON VLSI DESIGN (VLSID) | 2015年
关键词
D O I
10.1109/VLSID.2015.110
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. However, growing reliance on reusable pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, cloning, counterfeiting, as well as malicious hardware modifications. The global electronic piracy market is growing rapidly and is now estimated to be $ 1B/day, of which a significant part is related to hardware IPs. Furthermore, use of untrusted foundry in a fabless business model greatly aggravates the SoC security threats by introducing vulnerability of malicious modifications or piracy during SoC fabrication. Due to ever-growing computing demands, modern SoCs tend to include many heterogeneous processing cores, scalable communication network, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities in SoC design cycle - IP vendors, CAD tool developers, and foundries - and develop low-cost effective countermeasures. These countermeasures would encompass encryption, obfuscation, watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of SoC to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. The tutorial also covers the security and debug trade-offs in modern SoCs e.g., more observability is beneficial for debug whereas limited observability is better for security. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow for secure SoC systems. The tutorial presenters (one industry expert and two faculty members) will be able to provide unique perspectives on both academic research and industrial practices. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of five parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various security attacks and countermeasures. Part III covers both formal methods and simulation-based approaches for security and trust validation. Part IV presents the conflicting requirements between security and debug during SoC development and ways to address them. Part V covers real- life examples of security failures and successful countermeasures in industry. Finally, Part VI concludes this tutorial with discussion on emerging issues and future directions.
引用
收藏
页码:3 / 5
页数:3
相关论文
共 50 条
  • [31] Embedded systems security—an overview
    Sri Parameswaran
    Tilman Wolf
    Design Automation for Embedded Systems, 2008, 12 : 173 - 183
  • [32] Security vulnerability in embedded systems
    Martin, Patricia
    Martin, Sergio
    Diaz, Gabriel
    Castro-Gil, Manuel
    DYNA, 2016, 91 (05): : 488 - 488
  • [33] Study on the Security and Trust Issues of E-commerce
    Wen, Xiaosen
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 191 - 194
  • [34] HotSpot: Hot Issues in Security Principles and Trust 2020
    Guttman, Joshua
    Modersheim, Sebastian
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, Institute of Electrical and Electronics Engineers Inc. : 260 - 260
  • [35] SECURITY ISSUES IN VOIP SYSTEMS
    Tarasinca, Camelia Mariana
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 119 - 122
  • [36] Adding security and trust to multiagent systems
    Wong, HC
    Sycara, K
    APPLIED ARTIFICIAL INTELLIGENCE, 2000, 14 (09) : 927 - 941
  • [37] Trust metrics for survivable security systems
    Daskapan, S
    Vree, WG
    Eldin, AA
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3128 - 3135
  • [38] Verification and Validation Issues in Systems of Systems
    Honour, Eric
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2013, (133): : 2 - 7
  • [39] Trust in Man/Machine Security Systems
    Schneier, Bruce
    IEEE SECURITY & PRIVACY, 2013, 11 (05) : 96 - 96
  • [40] An Innovative Fault Injection Method in Embedded Systems via Background Debug Mode
    Asghari, Seyyed Amir
    Khademi, Mohammad
    Ansarinia, Morteza
    Zarandi, Hamid Reza
    Pedram, Hossein
    2009 14TH INTERNATIONAL COMPUTER CONFERENCE, 2009, : 110 - +