R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

19
RECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ

Transcript of R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

Page 1: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

RECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS

1

AKSHATA VARDHARAJ

Page 2: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

INTRODUCTION

Security challenges

- Limited resources

- Power constraints. SANES (Security Architecture for Embedded Systems

)

- Reconfigurable hardware

- Efficient, flexible

- Supports security standards ,range of attacks. The SANES architecture is based on

- Reconfigurable security primitives

- Reconfigurable hardware monitors

- A hierarchy of security controllers 2

Page 3: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

MAIN ISSUES TO BE CONSIDEREDWHEN DESIGNING THE ARCHITECTURE

Security primitives and protocols Attacks CURRENT SOLUTIONS TO ADDRESS BOTH FACE

SEVERAL GAPS SUCH AS Processing gap Battery gap Flexibility gap Tamper resistance gaps Assurance gapsSOLUTIONS Reconfigurable computing : high performance and

flexibility Intrusion detection system : detect abnormal behavior

3

Page 4: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

PURPOSE Prevention, detection , remediation of attacks Dynamically adapt security protections to deal with

dynamic constraints Reconfigurable hardware , A continuous monitoring

system Performance and energy issues are taken care by

reconfigurable security primitives Reliability is managed by use of different

implementations Hierarchy of hardware monitors

- Provides different levels of flexibility

- Enables compromise between accuracy and simplicity

4

Page 5: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

5SANES ARCHITECTURE

Page 6: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

MONITORS

Track specific data of system Number and complexity

- Overhead cost of security architecture Role

- Detect attacks against system Autonomy and adaptability Distributed : analyze different parts

- Battery

- Buses

- Security primitives

- Communication channel Reflex reaction Global reaction

6

Page 7: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

SEP: SECURITY EXECUTIVE PROCESSOR

Links monitors by on-chip intelligence Controls the network Acts as gateway to outside world. Provides software to map new monitoring and

verification algorithms to monitors. Issues commands to control operation

7

Page 8: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

RECONFIGURABLE ARCHITECTURE

Implements security primitives Security primitives work independently Speedup computation of security algorithm Flexibility

- Update primitives

- Switch from one primitive to another Tradeoffs: throughput, area, latency, reliability, power

,energy to meet real time constraints

8

Page 9: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

9SECURITY PRIMITIVE ARCHITECTURE FOR AES

Page 10: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

RECONFIGURABLE SECURITY PRIMITIVE

Security primitive datapath Security Primitive Controller(SPC) - Flexibility - Memory mapped mechanism - Defines the configuration of primitive - Control tasks - Processor configures the SPC - Check what execution modes can be used System Security Controller(SSC) - Connected to security primitive - Monitor the primitive - Detects attacks against the primitive - Also connected to other monitors 10

Page 11: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

11

FSM OF THE SPCInitialization state , Configuration state

, Run stateStop state , Security state

Page 12: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

DYNAMIC SECURITY WITHIN THE SYSTEM: MONITORING

Execution of the security primitives

- Managed by SPC

- Flexibility Protect system

- Managed by SSC

- Deals with attacks Examples of attacks

- Hijacking

- Denial of service

- Extraction of secret information

12

Page 13: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

HEURISTIC APPROACH

Problem

- The normal defined behavior can be over written This works for Embedded systems

- Simplicity of work load

- Repetitiveness of workload

- Application profiling

- Capture large fraction of application behavior

- Power, clock, bus, security primitive ,communication channel monitors

13

Page 14: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

PERFORMANCE AND SECURITY POLICIES

SPC:

- New configuration , best performance tradeoff

- It runs protected modes only when required

- Continuously checks the state of the system

- Best performance of the primitive SPC selects parameters

- The power limitation

- Evolving environment

- Level of quality of the communication channels.

14

Page 15: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

AES (ADVANCED ENCRYPTION STANDARD) CASE STUDY

Memory

- Bit streams (each bit stream corresponds to a configuration).

registers

- The algorithm AES

- Execution mode (i.e. feedback, non-feedback)

- The key and data sizes(i.e. 128 bits). Architecture parameters.

- Reliability (i.e. no, fault detection, fault tolerance),

- On the throughput,

- The area (use rate of the device)

- The energy consumption. 15

Page 16: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

CONFIGURATIONS CONSIDERED

Solution corresponds to different levels of performance

- Area

- Energy efficiency which represents the throughput.

- Power Feedback Mode(FB) Feedback mode with fault detection(FB_FB) Feedback Mode with fault tolerance( FB_FT)

- Most secure

- Area and energy overheads are very high Fault detection is a good compromise to guarantee

the performance and to increase the security of the primitive 16

Page 17: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

17

COMPARISON OF PARAMETERS FOR THE THREE ARCHITECTURES

Page 18: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

18

AREA CONSTRAINT ASSOCIATED WITH THE THREE MODELS

Page 19: R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.

ADVANTAGES

Application verification and protection is provided in dedicated hardware and not inside application

Implies dynamically updated durability Flexibility and security Hierarchy of hardware monitors Meets embedded system constraints

19