Tutorial T2: Validation and Debug of Security and Trust Issues in Embedded Systems

P. Mishra, S. Bhunia, S. Ravi
{"title":"Tutorial T2: Validation and Debug of Security and Trust Issues in Embedded Systems","authors":"P. Mishra, S. Bhunia, S. Ravi","doi":"10.1109/VLSID.2015.110","DOIUrl":null,"url":null,"abstract":"Summary form only given. Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. However, growing reliance on reusable pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, cloning, counterfeiting, as well as malicious hardware modifications. The global electronic piracy market is growing rapidly and is now estimated to be $1B/day, of which a significant part is related to hardware IPs. Furthermore, use of untrusted foundry in a fabless business model greatly aggravates the SoC security threats by introducing vulnerability of malicious modifications or piracy during SoC fabrication. Due to ever-growing computing demands, modern SoCs tend to include many heterogeneous processing cores, scalable communication network, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities in SoC design cycle - IP vendors, CAD tool developers, and foundries - and develop low-cost effective countermeasures. These countermeasures would encompass encryption, obfuscation, watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of SoC to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. The tutorial also covers the security and debug trade-offs in modern SoCs e.g., more observability is beneficial for debug whereas limited observability is better for security. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow for secure SoC systems. The tutorial presenters (one industry expert and two faculty members) will be able to provide unique perspectives on both academic research and industrial practices. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of five parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various security attacks and countermeasures. Part III covers both formal methods and simulation-based approaches for security and trust validation. Part IV presents the conflicting requirements between security and debug during SoC development and ways to address them. Part V covers real-life examples of security failures and successful countermeasures in industry. Finally, Part VI concludes this tutorial with discussion on emerging issues and future directions.","PeriodicalId":123635,"journal":{"name":"2015 28th International Conference on VLSI Design","volume":"19 1 Pt 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 28th International Conference on VLSI Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VLSID.2015.110","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Summary form only given. Reusable hardware intellectual property (IP) based System-on-Chip (SoC) design has emerged as a pervasive design practice in the industry to dramatically reduce design/verification cost while meeting aggressive time-to-market constraints. However, growing reliance on reusable pre-verified hardware IPs and wide array of CAD tools during SoC design - often gathered from untrusted 3rd party vendors - severely affects the security and trustworthiness of SoC computing platforms. Major security issues in the hardware IPs at different stages of SoC life cycle include piracy during IP evaluation, reverse engineering, cloning, counterfeiting, as well as malicious hardware modifications. The global electronic piracy market is growing rapidly and is now estimated to be $1B/day, of which a significant part is related to hardware IPs. Furthermore, use of untrusted foundry in a fabless business model greatly aggravates the SoC security threats by introducing vulnerability of malicious modifications or piracy during SoC fabrication. Due to ever-growing computing demands, modern SoCs tend to include many heterogeneous processing cores, scalable communication network, together with reconfigurable cores e.g. embedded FPGA in order to incorporate logic that is likely to change as standards and requirements evolve. Such design practices greatly increase the number of untrusted components in the SoC design flow and make the overall system security a pressing concern. There is a critical need to analyze the SoC security issues and attack models due to involvement of multiple untrusted entities in SoC design cycle - IP vendors, CAD tool developers, and foundries - and develop low-cost effective countermeasures. These countermeasures would encompass encryption, obfuscation, watermarking and fingerprinting, and certain analytic methods derived from the behavioral aspects of SoC to enable trusted operation with untrusted components. In this tutorial, we plan to provide a comprehensive coverage of both fundamental concepts and recent advances in validation of security and trust of hardware IPs. The tutorial also covers the security and debug trade-offs in modern SoCs e.g., more observability is beneficial for debug whereas limited observability is better for security. It examines the state-of-the-art in research in this challenging area as well as industrial practice, and points to important gaps that need to be filled in order to develop a validation and debug flow for secure SoC systems. The tutorial presenters (one industry expert and two faculty members) will be able to provide unique perspectives on both academic research and industrial practices. The selection of topics covers a broad spectrum and will be of interest to a wide audience including design, validation, security, and debug engineers. The proposed tutorial consists of five parts. The first part introduces security vulnerabilities and various challenges associated with trust validation for hardware IPs. Part II covers various security attacks and countermeasures. Part III covers both formal methods and simulation-based approaches for security and trust validation. Part IV presents the conflicting requirements between security and debug during SoC development and ways to address them. Part V covers real-life examples of security failures and successful countermeasures in industry. Finally, Part VI concludes this tutorial with discussion on emerging issues and future directions.
教程T2:嵌入式系统中安全性和信任问题的验证和调试
只提供摘要形式。基于可重用硬件知识产权(IP)的片上系统(SoC)设计已经成为行业中普遍存在的设计实践,可以显著降低设计/验证成本,同时满足严格的上市时间限制。然而,在SoC设计过程中,越来越多地依赖于可重用的预验证硬件ip和各种CAD工具(通常来自不受信任的第三方供应商),严重影响了SoC计算平台的安全性和可信度。在SoC生命周期的不同阶段,硬件IP的主要安全问题包括IP评估期间的盗版、逆向工程、克隆、伪造以及恶意硬件修改。全球电子盗版市场正在迅速增长,目前估计每天的规模为10亿美元,其中很大一部分与硬件ip有关。此外,在无晶圆厂业务模式中使用不可信的代工厂,在SoC制造过程中引入恶意修改或盗版漏洞,大大加剧了SoC的安全威胁。由于不断增长的计算需求,现代soc倾向于包括许多异构处理核心,可扩展的通信网络,以及可重构的核心,例如嵌入式FPGA,以便结合可能随着标准和需求的发展而变化的逻辑。这样的设计实践大大增加了SoC设计流程中不可信组件的数量,使整个系统的安全性成为一个紧迫的问题。由于SoC设计周期中涉及多个不受信任的实体(IP供应商、CAD工具开发商和代工厂),因此迫切需要分析SoC的安全问题和攻击模型,并制定低成本的有效对策。这些对策将包括加密、混淆、水印和指纹识别,以及从SoC行为方面派生的某些分析方法,以实现对不可信组件的可信操作。在本教程中,我们计划全面介绍硬件ip安全性和信任验证的基本概念和最新进展。本教程还涵盖了现代soc中的安全性和调试权衡,例如,更多的可观察性有利于调试,而有限的可观察性则有利于安全性。它检查了这一具有挑战性的领域的最新研究以及工业实践,并指出了需要填补的重要空白,以便为安全的SoC系统开发验证和调试流程。课程主讲人(一名行业专家和两名教员)将能够就学术研究和行业实践提供独特的观点。主题的选择涵盖了广泛的范围,并且将引起包括设计、验证、安全性和调试工程师在内的广泛受众的兴趣。建议的教程由五个部分组成。第一部分介绍了与硬件ip信任验证相关的安全漏洞和各种挑战。第2部分介绍了各种安全攻击和对策。第3部分涵盖了用于安全性和信任验证的形式化方法和基于仿真的方法。第四部分介绍了SoC开发过程中安全性和调试之间的冲突需求以及解决这些需求的方法。第五部分介绍了工业中安全故障的实际例子和成功的对策。最后,第六部分总结了本教程,讨论了新出现的问题和未来的方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信