A Hardware Root-of-Trust Design for Low-Power SoC Edge Devices

被引:3
作者
Ehret, Alan [1 ]
Del Rosario, Eliakin [1 ]
Gettings, Karen [2 ]
Kinsy, Michel A. [1 ]
机构
[1] Texas A&M Univ, ECE Dept, Adapt & Secure Comp Syst ASCS Lab, College Stn, TX 77843 USA
[2] MIT, Lincoln Lab, 244 Wood St, Lexington, MA 02173 USA
来源
2020 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC) | 2020年
关键词
Hardware Security; System-on-Chip; Low-Power;
D O I
10.1109/hpec43674.2020.9286164
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we introduce a hardware root-of-trust architecture for low-power edge devices. An accelerator-based SoC design that includes the hardware root-of-trust architecture is developed. An example application for the device is presented. We examine attacks based on physical access given the significant threat they pose to unattended edge systems. The hardware root-of-trust provides security features to ensure the integrity of the SoC execution environment when deployed in uncontrolled, unattended locations. E-fused boot memory ensures the boot code and other security critical software is not compromised after deployment. Digitally signed programmable instruction memory prevents execution of code from untrusted sources. A programmable finite state machine is used to enforce access policies to device resources even if the application software on the device is compromised. Access policies isolate the execution states of application and security-critical software. The hardware root-of-trust architecture saves energy with a lower hardware overhead than a separate secure enclave while eliminating software attack surfaces for access control policies.
引用
收藏
页数:6
相关论文
共 11 条
  • [1] Bandara S., P 2019 INT S FIELD P
  • [2] Bhunia S., 2018, Hardware Security, DOI DOI 10.1016/B978-0-12-812477-2.00015-0
  • [3] Ehret A, 2019, IEEE HIGH PERF EXTR
  • [4] Hill M. D., 2019, CoRR
  • [5] Survey of Attacks and Defenses on Edge-Deployed Neural Networks
    Isakov, Mihailo
    Gadepally, Vijay
    Gettings, Karen M.
    Kinsy, Michel A.
    [J]. 2019 IEEE HIGH PERFORMANCE EXTREME COMPUTING CONFERENCE (HPEC), 2019,
  • [6] Always-On 12-nW Acoustic Sensing and Object Recognition Microsystem for Unattended Ground Sensor Nodes
    Jeong, Seokhyeon
    Chen, Yu
    Jang, Taekwang
    Tsai, Julius Ming-Lin
    Blaauw, David
    Kim, Hun-Seok
    Sylvester, Dennis
    [J]. IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2018, 53 (01) : 261 - 274
  • [7] The Elliptic Curve Digital Signature Algorithm (ECDSA)
    Don Johnson
    Alfred Menezes
    Scott Vanstone
    [J]. International Journal of Information Security, 2001, 1 (1) : 36 - 63
  • [8] Spectre Attacks: Exploiting Speculative Execution
    Kocher, Paul
    Horn, Jann
    Fogh, Anders
    Genkin, Daniel
    Gruss, Daniel
    Haas, Werner
    Hamburg, Mike
    Lipp, Moritz
    Mangard, Stefan
    Prescher, Thomas
    Schwarz, Michael
    Yarom, Yuval
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1 - 19
  • [9] Electrically programmable fuse (eFUSE) using electromigration in silicides
    Kothandaraman, C
    Iyer, SK
    Iyer, SS
    [J]. IEEE ELECTRON DEVICE LETTERS, 2002, 23 (09) : 523 - 525
  • [10] The Promise of Edge Computing
    Shi, Weisong
    Dustdar, Schahram
    [J]. COMPUTER, 2016, 49 (05) : 78 - 81