Security Primitives for Reconfigurable Hardware-Based Systems

被引:4
|
作者
Huffmire, Ted [1 ]
Levin, Timothy [1 ]
Thuy Nguyen [1 ]
Irvine, Cynthia [1 ]
Brotherton, Brett [2 ]
Wang, Gang [4 ]
Sherwood, Timothy [3 ]
Kastner, Ryan [5 ]
机构
[1] USN, Postgrad Sch, Dept Comp Sci, Monterey, CA 93943 USA
[2] Special Technol Lab, Santa Barbara, CA 93111 USA
[3] Univ Calif Santa Barbara, Dept Comp Sci, Santa Barbara, CA 93106 USA
[4] Intuit, San Diego, CA 92122 USA
[5] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
基金
美国国家科学基金会;
关键词
Design; Security; Field Programmable Gate Arrays (FPGAs); Advanced Encryption Standard (AES); memory protection; separation; isolation; controlled sharing; hardware security; reference monitors; execution monitors; enforcement mechanisms; security policies; static analysis; security primitives; Systems-on-a-Chip (SoCs);
D O I
10.1145/1754386.1754391
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Computing systems designed using reconfigurable hardware are increasingly composed using a number of different Intellectual Property (IP) cores, which are often provided by third-party vendors that may have different levels of trust. Unlike traditional software where hardware resources are mediated using an operating system, IP cores have fine-grain control over the underlying reconfigurable hardware. To address this problem, the embedded systems community requires novel security primitives that address the realities of modern reconfigurable hardware. In this work, we propose security primitives using ideas centered around the notion of "moats and drawbridges." The primitives encompass four design properties: logical isolation, interconnect traceability, secure reconfigurable broadcast, and configuration scrubbing. Each of these is a fundamental operation with easily understood formal properties, yet they map cleanly and efficiently to a wide variety of reconfigurable devices. We carefully quantify the required overheads of the security techniques on modern FPGA architectures across a number of different applications.
引用
收藏
页数:35
相关论文
共 50 条
  • [1] Design, Implementation and Analysis of Efficient Hardware-based Security Primitives
    Anandakumar, N. Nalla
    Sanadhya, Somitra Kumar
    Hashmi, Mohammad S.
    2020 IFIP/IEEE 28TH INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2020, : 198 - 199
  • [2] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [3] A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems
    Mexis, Nico
    Anagnostopoulos, Nikolaos Athanasios
    Chen, Shuai
    Bambach, Jan
    Arul, Tolga
    Katzenbeisser, Stefan
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (03)
  • [4] Creating hardware-based primitives that facilitate the exposure of state information useful for security related monitoring
    Mott, Stephen
    Williams, Paul
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 163 - 170
  • [5] A dynamically reconfigurable hardware-based cipher chip
    Mitsuyama, Y
    Andales, Z
    Onoye, T
    Shirakawa, I
    PROCEEDINGS OF THE ASP-DAC 2001: ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE 2001, 2001, : 11 - 12
  • [6] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    ATP EDITION, 2012, (03): : 42 - 49
  • [7] Security by design: Hardware-based Security in Windows 8
    EMEA, United Kingdom
    Souren, J., 1600, Elsevier Ltd (2013):
  • [8] VLSI implementation of dynamically reconfigurable hardware-based cryptosystem
    Mitsuyama, Y
    Andales, Z
    Onoye, T
    Shirakawa, I
    2000 SYMPOSIUM ON VLSI CIRCUITS, DIGEST OF TECHNICAL PAPERS, 2000, : 204 - 205
  • [9] Privacy Enhancements for Hardware-Based Security Modules
    Pasupathinathan, Vijayakrishnan
    Pieprzyk, Josef
    Wang, Huaxiong
    E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
  • [10] A hardware-based software protection systems - Analysis of security dongles with time meters
    Jozwiak, Ireneusz J.
    Marczak, Krzysztof
    DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 254 - +