R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
-
Upload
maximillian-manning -
Category
Documents
-
view
221 -
download
0
Transcript of R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
RECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS
1
AKSHATA VARDHARAJ
INTRODUCTION
Security challenges
- Limited resources
- Power constraints. SANES (Security Architecture for Embedded Systems
)
- Reconfigurable hardware
- Efficient, flexible
- Supports security standards ,range of attacks. The SANES architecture is based on
- Reconfigurable security primitives
- Reconfigurable hardware monitors
- A hierarchy of security controllers 2
MAIN ISSUES TO BE CONSIDEREDWHEN DESIGNING THE ARCHITECTURE
Security primitives and protocols Attacks CURRENT SOLUTIONS TO ADDRESS BOTH FACE
SEVERAL GAPS SUCH AS Processing gap Battery gap Flexibility gap Tamper resistance gaps Assurance gapsSOLUTIONS Reconfigurable computing : high performance and
flexibility Intrusion detection system : detect abnormal behavior
3
PURPOSE Prevention, detection , remediation of attacks Dynamically adapt security protections to deal with
dynamic constraints Reconfigurable hardware , A continuous monitoring
system Performance and energy issues are taken care by
reconfigurable security primitives Reliability is managed by use of different
implementations Hierarchy of hardware monitors
- Provides different levels of flexibility
- Enables compromise between accuracy and simplicity
4
5SANES ARCHITECTURE
MONITORS
Track specific data of system Number and complexity
- Overhead cost of security architecture Role
- Detect attacks against system Autonomy and adaptability Distributed : analyze different parts
- Battery
- Buses
- Security primitives
- Communication channel Reflex reaction Global reaction
6
SEP: SECURITY EXECUTIVE PROCESSOR
Links monitors by on-chip intelligence Controls the network Acts as gateway to outside world. Provides software to map new monitoring and
verification algorithms to monitors. Issues commands to control operation
7
RECONFIGURABLE ARCHITECTURE
Implements security primitives Security primitives work independently Speedup computation of security algorithm Flexibility
- Update primitives
- Switch from one primitive to another Tradeoffs: throughput, area, latency, reliability, power
,energy to meet real time constraints
8
9SECURITY PRIMITIVE ARCHITECTURE FOR AES
RECONFIGURABLE SECURITY PRIMITIVE
Security primitive datapath Security Primitive Controller(SPC) - Flexibility - Memory mapped mechanism - Defines the configuration of primitive - Control tasks - Processor configures the SPC - Check what execution modes can be used System Security Controller(SSC) - Connected to security primitive - Monitor the primitive - Detects attacks against the primitive - Also connected to other monitors 10
11
FSM OF THE SPCInitialization state , Configuration state
, Run stateStop state , Security state
DYNAMIC SECURITY WITHIN THE SYSTEM: MONITORING
Execution of the security primitives
- Managed by SPC
- Flexibility Protect system
- Managed by SSC
- Deals with attacks Examples of attacks
- Hijacking
- Denial of service
- Extraction of secret information
12
HEURISTIC APPROACH
Problem
- The normal defined behavior can be over written This works for Embedded systems
- Simplicity of work load
- Repetitiveness of workload
- Application profiling
- Capture large fraction of application behavior
- Power, clock, bus, security primitive ,communication channel monitors
13
PERFORMANCE AND SECURITY POLICIES
SPC:
- New configuration , best performance tradeoff
- It runs protected modes only when required
- Continuously checks the state of the system
- Best performance of the primitive SPC selects parameters
- The power limitation
- Evolving environment
- Level of quality of the communication channels.
14
AES (ADVANCED ENCRYPTION STANDARD) CASE STUDY
Memory
- Bit streams (each bit stream corresponds to a configuration).
registers
- The algorithm AES
- Execution mode (i.e. feedback, non-feedback)
- The key and data sizes(i.e. 128 bits). Architecture parameters.
- Reliability (i.e. no, fault detection, fault tolerance),
- On the throughput,
- The area (use rate of the device)
- The energy consumption. 15
CONFIGURATIONS CONSIDERED
Solution corresponds to different levels of performance
- Area
- Energy efficiency which represents the throughput.
- Power Feedback Mode(FB) Feedback mode with fault detection(FB_FB) Feedback Mode with fault tolerance( FB_FT)
- Most secure
- Area and energy overheads are very high Fault detection is a good compromise to guarantee
the performance and to increase the security of the primitive 16
17
COMPARISON OF PARAMETERS FOR THE THREE ARCHITECTURES
18
AREA CONSTRAINT ASSOCIATED WITH THE THREE MODELS
ADVANTAGES
Application verification and protection is provided in dedicated hardware and not inside application
Implies dynamically updated durability Flexibility and security Hierarchy of hardware monitors Meets embedded system constraints
19