SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Managing Securities in FPGA-
Based Embedded Systems
Presenters:
Rajeev Verma
Pratheep Joe Siluvai Iruthayaraj
Why FPGA?
● Better performance.
○ Large number of bit level operations can be performed.
○ shifting, permutations are achieved ny just wiring.
○ extreme level of parallelism
○ low overheads
● Rapid time to market
● Flexible
● Truth tables or Lookup tables are used for hw acceleration.
● Applications
○ Face recognition systems, wireless networks, cryptographic
applications, supercomputers and many security applications.
Reconfigurable systems
● Cryptographic algorithms are generally implemented on
FPGA
● Encryption devices require strong isolation to segregate
plaintext(red) from ciphertext(black).
● Unencrypted data should be unavailable for black
network.
System Design!
● Shared resources in system
○ Shared DRAM, shared bus and
shared AES encryption core.
● Domain-1
○ MicroBlaze0, RS-232, Distinct
memory portion
● Domain-2
○ MicroBlaze1, an Ethernet interface,
another distinct partition of memory
Applications need separation of data
● Aviation field.
○ Uses Commercial off-the-shelf (COTS) FPGA components.
○ Sensitive and non-sensitive data is processed in same device.
○ This isolation of the sensitive and non-sensitive data is achieved in
modern FPGAs
● Intelligent video surveillance
○ FPGA provides deep computation pipelining and isolation.
○ Rely on 3 cores
■ Video interface for decoding
■ Encryption mechanism for processing the video
■ Network interface for sending data.
FPGA System Flow
● Cores can be generated by
hand or by software like
Xilinx Embedded
Development Kit (EDK).
● Bitstream is the final code
that goes to the core.
Reconfigurable Security Problems
● Design-tool subversion
● Composition
● Trusted Foundries
● Bitstream protection
Design-tool subversion
● Malicious design could destroy FPGA because of short circuit.
● Trusted tools should be used to develop trusted cores.
● Xilinx provide signed cores.
Composition problem
● As final design, we can trust the design as much as the least-trusted design path.
● Systems can be composed on
○ Device level
■ one or more IP cores resides on single chip
○ Board level
■ one or more chips on a single board
○ Network level
■ Multiple boards are connected through network
● Now, it is possible to copy the hardware from existing products.
● Protected IP could be a solution.
● a separate chip for each core can be used which can provide security advantage
Security issues with COTS
● COTS : Commercial off-the-shelf
● Manufacturer should not insert unintended functionalities into FPGA.
● All cores should be flawless so that attacker can’t exploit.
● Security flaws should not exist in running software or the compiler.
● Embedded device depends on other parts of larger nw should not be malicious.
Trusted-Foundry Problem and Bitstream
Protection
● Trusted-Foundry Problem
○ ASIC is having problem of IP theft.
○ FPGA provide important security benefit over ASIC in this issue.
● Bitstream Protection
○ Securely Bitstream uploading is essential to avoid the IP-theft
○ These theft impacts the “Bottom Line”
○ Some FPGA’s can remotely updated in the field.
■ Requires secure channel and authentication.
Reconfigurable security solutions
● Life-cycle management
○ Configuration management stores software with version numbers.
○ Any new version is thoroughly tested before assignment of new version.
○ Control on development environment and tools can support accountability.
○ Alternative is to build a custom set of trusted tools for security critical HW.
○ A critical function of life-cycle protection ensure that o/p is not malicious.
● Secure Architecture
○ FPGA provides self-protected security mechanism at a low cost.
○ Examples
■ Memory Protection
■ Spatial Isolation
■ Tags
■ Secure Communication
Secure Architecture
● Memory Protection
○ Reference monitor is well known method for legal sharing of memory.
○ Reference monitor possesses
■ Self-protecting
■ Enforcement mechanisms cannot be bypassed.
■ Correct and complete.
● Spatial Isolation
○ Control on layout function provide spatial isolation in
FPGA.
Secure Architecture cont..
● Tags
○ Ability to track information and its transformation as it flows through
the system.
○ Tag is metadata that can be attached to each piece of system data.
○ Tag can be used in FPGA at different granularity.
● Secure Communication
○ Cores need to share data so can’t be isolated.
○ Currently FPGA system use
■ Shared Memory
■ Direct connection
■ Shared Bus
Future Work
● Multicore Systems
○ Chip multiprocessors running multiple threads
○ SoCs with multiple single-purpose cores on single ASIC.
○ New techniques are needed to mediate secure, efficient communication of
multi core system.
● Integration of security primitives.
○ If computing units are shared among security domains then temporal scheme
might be required.
○ Spatial schemes, temporal scheme or tags should be designed which can meet
security requirement and minimize overhead.
Future Work
● Reconfigurable Updates
○ Latest FPGA are capable of changing configuration on runtime.
○ These dynamic systems need more communication between core.
○ Cores state can be changed from executing to updated.
○ These are complicated systems and require new primitives for security.
● Channels and information leakage
○ Core are isolated still need communication through covert channel which can
be insecure.
○ Another attack can be side channel attack. E.g Power-analysis attack.
Conclusion
● A Successful approach must combine life-cycle management and a
coherent security architecture.
● Designing any trustworthy complex system is challenging.
● Hardware security is getting more and more important.
Questions??
Thanks!

Contenu connexe

Tendances

Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
Iffat Anjum
 
PCI Express Verification using Reference Modeling
PCI Express Verification using Reference ModelingPCI Express Verification using Reference Modeling
PCI Express Verification using Reference Modeling
DVClub
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
Shivam Gupta
 

Tendances (20)

Cpld fpga
Cpld fpgaCpld fpga
Cpld fpga
 
Nand 4011 design
Nand 4011 designNand 4011 design
Nand 4011 design
 
CPLD xc9500
CPLD xc9500CPLD xc9500
CPLD xc9500
 
Vhdl
VhdlVhdl
Vhdl
 
Fpga architectures and applications
Fpga architectures and applicationsFpga architectures and applications
Fpga architectures and applications
 
Introduction A digital circuit design
Introduction A digital circuit design Introduction A digital circuit design
Introduction A digital circuit design
 
FPGA Introduction
FPGA IntroductionFPGA Introduction
FPGA Introduction
 
FPGA
FPGAFPGA
FPGA
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
 
Cadence Design Flow.pptx
Cadence Design Flow.pptxCadence Design Flow.pptx
Cadence Design Flow.pptx
 
Dr.s.shiyamala fpga ppt
Dr.s.shiyamala  fpga pptDr.s.shiyamala  fpga ppt
Dr.s.shiyamala fpga ppt
 
Software hardware co-design using xilinx zynq soc
Software hardware co-design using xilinx zynq socSoftware hardware co-design using xilinx zynq soc
Software hardware co-design using xilinx zynq soc
 
Field Programmable Gate Array: Building Blocks and Interconnections
Field Programmable Gate Array: Building Blocks and InterconnectionsField Programmable Gate Array: Building Blocks and Interconnections
Field Programmable Gate Array: Building Blocks and Interconnections
 
Layout design on MICROWIND
Layout design on MICROWINDLayout design on MICROWIND
Layout design on MICROWIND
 
PCI Express Verification using Reference Modeling
PCI Express Verification using Reference ModelingPCI Express Verification using Reference Modeling
PCI Express Verification using Reference Modeling
 
System On Chip (SOC)
System On Chip (SOC)System On Chip (SOC)
System On Chip (SOC)
 
Clock Gating
Clock GatingClock Gating
Clock Gating
 
Introduction to FPGAs
Introduction to FPGAsIntroduction to FPGAs
Introduction to FPGAs
 
Pci express technology 3.0
Pci express technology 3.0Pci express technology 3.0
Pci express technology 3.0
 
Bandgap Reference circuit Baased on FinFET Device
Bandgap Reference circuit Baased on FinFET DeviceBandgap Reference circuit Baased on FinFET Device
Bandgap Reference circuit Baased on FinFET Device
 

Similaire à Security issues in FPGA based systems.

Similaire à Security issues in FPGA based systems. (20)

Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
Project_updated
Project_updatedProject_updated
Project_updated
 
Fpg as 11 body
Fpg as 11 bodyFpg as 11 body
Fpg as 11 body
 
Fpga acquisition
Fpga acquisitionFpga acquisition
Fpga acquisition
 
UNIT-1.pptx
UNIT-1.pptxUNIT-1.pptx
UNIT-1.pptx
 
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
 
Micro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application DevelopmentMicro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application Development
 
Cpld and fpga mod vi
Cpld and fpga   mod viCpld and fpga   mod vi
Cpld and fpga mod vi
 
FPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projectsFPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projects
 
Scada
ScadaScada
Scada
 
Streaming multiprocessors and HPC
Streaming multiprocessors and HPCStreaming multiprocessors and HPC
Streaming multiprocessors and HPC
 
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapUWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux Networking
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
 
Edge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacksEdge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacks
 
IGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGAIGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGA
 
Lect 1 Into.pptx
Lect 1 Into.pptxLect 1 Into.pptx
Lect 1 Into.pptx
 
Chiplets in Data Centers
Chiplets in Data CentersChiplets in Data Centers
Chiplets in Data Centers
 

Dernier

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Dernier (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 

Security issues in FPGA based systems.

  • 1. Managing Securities in FPGA- Based Embedded Systems Presenters: Rajeev Verma Pratheep Joe Siluvai Iruthayaraj
  • 2. Why FPGA? ● Better performance. ○ Large number of bit level operations can be performed. ○ shifting, permutations are achieved ny just wiring. ○ extreme level of parallelism ○ low overheads ● Rapid time to market ● Flexible ● Truth tables or Lookup tables are used for hw acceleration. ● Applications ○ Face recognition systems, wireless networks, cryptographic applications, supercomputers and many security applications.
  • 3. Reconfigurable systems ● Cryptographic algorithms are generally implemented on FPGA ● Encryption devices require strong isolation to segregate plaintext(red) from ciphertext(black). ● Unencrypted data should be unavailable for black network.
  • 4. System Design! ● Shared resources in system ○ Shared DRAM, shared bus and shared AES encryption core. ● Domain-1 ○ MicroBlaze0, RS-232, Distinct memory portion ● Domain-2 ○ MicroBlaze1, an Ethernet interface, another distinct partition of memory
  • 5. Applications need separation of data ● Aviation field. ○ Uses Commercial off-the-shelf (COTS) FPGA components. ○ Sensitive and non-sensitive data is processed in same device. ○ This isolation of the sensitive and non-sensitive data is achieved in modern FPGAs ● Intelligent video surveillance ○ FPGA provides deep computation pipelining and isolation. ○ Rely on 3 cores ■ Video interface for decoding ■ Encryption mechanism for processing the video ■ Network interface for sending data.
  • 6. FPGA System Flow ● Cores can be generated by hand or by software like Xilinx Embedded Development Kit (EDK). ● Bitstream is the final code that goes to the core.
  • 7. Reconfigurable Security Problems ● Design-tool subversion ● Composition ● Trusted Foundries ● Bitstream protection
  • 8. Design-tool subversion ● Malicious design could destroy FPGA because of short circuit. ● Trusted tools should be used to develop trusted cores. ● Xilinx provide signed cores.
  • 9. Composition problem ● As final design, we can trust the design as much as the least-trusted design path. ● Systems can be composed on ○ Device level ■ one or more IP cores resides on single chip ○ Board level ■ one or more chips on a single board ○ Network level ■ Multiple boards are connected through network ● Now, it is possible to copy the hardware from existing products. ● Protected IP could be a solution. ● a separate chip for each core can be used which can provide security advantage
  • 10. Security issues with COTS ● COTS : Commercial off-the-shelf ● Manufacturer should not insert unintended functionalities into FPGA. ● All cores should be flawless so that attacker can’t exploit. ● Security flaws should not exist in running software or the compiler. ● Embedded device depends on other parts of larger nw should not be malicious.
  • 11. Trusted-Foundry Problem and Bitstream Protection ● Trusted-Foundry Problem ○ ASIC is having problem of IP theft. ○ FPGA provide important security benefit over ASIC in this issue. ● Bitstream Protection ○ Securely Bitstream uploading is essential to avoid the IP-theft ○ These theft impacts the “Bottom Line” ○ Some FPGA’s can remotely updated in the field. ■ Requires secure channel and authentication.
  • 12. Reconfigurable security solutions ● Life-cycle management ○ Configuration management stores software with version numbers. ○ Any new version is thoroughly tested before assignment of new version. ○ Control on development environment and tools can support accountability. ○ Alternative is to build a custom set of trusted tools for security critical HW. ○ A critical function of life-cycle protection ensure that o/p is not malicious. ● Secure Architecture ○ FPGA provides self-protected security mechanism at a low cost. ○ Examples ■ Memory Protection ■ Spatial Isolation ■ Tags ■ Secure Communication
  • 13. Secure Architecture ● Memory Protection ○ Reference monitor is well known method for legal sharing of memory. ○ Reference monitor possesses ■ Self-protecting ■ Enforcement mechanisms cannot be bypassed. ■ Correct and complete. ● Spatial Isolation ○ Control on layout function provide spatial isolation in FPGA.
  • 14. Secure Architecture cont.. ● Tags ○ Ability to track information and its transformation as it flows through the system. ○ Tag is metadata that can be attached to each piece of system data. ○ Tag can be used in FPGA at different granularity. ● Secure Communication ○ Cores need to share data so can’t be isolated. ○ Currently FPGA system use ■ Shared Memory ■ Direct connection ■ Shared Bus
  • 15. Future Work ● Multicore Systems ○ Chip multiprocessors running multiple threads ○ SoCs with multiple single-purpose cores on single ASIC. ○ New techniques are needed to mediate secure, efficient communication of multi core system. ● Integration of security primitives. ○ If computing units are shared among security domains then temporal scheme might be required. ○ Spatial schemes, temporal scheme or tags should be designed which can meet security requirement and minimize overhead.
  • 16. Future Work ● Reconfigurable Updates ○ Latest FPGA are capable of changing configuration on runtime. ○ These dynamic systems need more communication between core. ○ Cores state can be changed from executing to updated. ○ These are complicated systems and require new primitives for security. ● Channels and information leakage ○ Core are isolated still need communication through covert channel which can be insecure. ○ Another attack can be side channel attack. E.g Power-analysis attack.
  • 17. Conclusion ● A Successful approach must combine life-cycle management and a coherent security architecture. ● Designing any trustworthy complex system is challenging. ● Hardware security is getting more and more important.