SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for...

27
SoC FPGA Hardware Security Requirements and Roadmap Ryan Kenny, Strategic Marketing Intel Programmable Solutions Group 1

Transcript of SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for...

Page 1: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

SoC FPGA Hardware Security Requirements and Roadmap

Ryan Kenny, Strategic Marketing Intel Programmable Solutions Group

1

Page 2: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

2

Agenda

• Security Threat Models for FPGA/SoC FPGA End Markets

• Taxonomy of Security Threats

• Threat Use Cases

• Overall Security Product Features and Roadmap

Page 3: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

3

FPGA End Markets

FPGA or SoC FPGA User Markets and Threats

COMMUNICATIONS COMPUTER AND STORAGE

Entertainment Broadcast

Instrumentation Energy

Automotive Military

DIGITAL CONSUMER INDUSTRIAL

Wireless Networking

Wireline

Computer Storage Office

Page 4: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

4

FPGA End Markets

FPGA or SoC FPGA User Markets and Threats

COMMUNICATIONS COMPUTER AND STORAGE

DIGITAL CONSUMER INDUSTRIAL

DIGITAL CONSUMER INDUSTRIAL

Wireless Networking Wireline

Computer Storage Office

Supply Chain

Data at Rest

Data IN Transit

Remote Access/Update

Physical/Reverse Engineering

! ! ! ! !

Page 5: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

5

Where FPGA Security Requirements Originate

Requirements (2010) Requirements (2016)

Military

Industrial

Wireline

Computer/Storage

Automotive

Other

Page 6: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

6

Threat Models: Industrial IoT

Threat Model Very Complex

Primarily Remote Access, Targeting Privacy Information

Requires Hardened Identity Management and Accelerated Authentication

Page 7: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

7

Threat Models: Wireline Systems Threats are

to data as well as infrastructure

Targets are both owners and users of telecommunications

Solutions require novel access controls,

hardware identity, and supply chain control

Page 8: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

8

Threat Models: Data Center

Variety of Physical and Virtual Isolation Features Needed by FPGA and SoC FPGA

Platform-Specific Security Risks

Physical Virtual Cloud

Page 9: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

9

Data Center Security is a Variable in Cloud Adoption

Adoption of Virtualization Depends on Security Models

Security Solutions are a Combination of Cloud Architecture and 3rd Party Software

Hardware-Based Security (Identity) Difficult in Virtual Environments

Page 10: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

10

Agenda

• Security Threat Models for FPGA/SoC FPGA End Markets

• Taxonomy of Security Threats

• Threat Use Cases

• Overall Security Product Features and Roadmap

Page 11: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

11

FPGA-based Attacks

Supply Chain Attacks

Silicon

Software

Intellectual Property

Side channel Network Boot code Over-voltage Over-temp Clock skew Single- event upset (SEU) Glitching

Decap FIB Microprobe Chemical Erode Electron Microscope

Invasive

Mask set Clone / counterfeit Boot code

Extra circuits

Extra circuits Hidden failure modes Extract data and keys

Universe (Known) of Hardware Threats

Non - invasive

Page 13: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

13

Agenda

• Security Threat Models for FPGA/SoC FPGA End Markets

• Taxonomy of Security Threats

• Threat Use Cases

• Overall Security Product Features and Roadmap

Page 14: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

14

Security Use Case: FPGA Design Cloning

FPGA Design Cloning and Reverse Engineering

Mitigation

Stratix® II to Present Encrypt Configuration

Store and Protect Key on FPGA

Page 18: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

18

Security Use Case: Boot or Config Code Alteration

Boot or Configuration Code Alteration

Mitigation

Arria® 10 and Stratix® 10 Symmetric and Asymmetric Authentication

(Internal or External Root of Trust)

Page 19: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

19

Future Security Use Case: Multi-Tenancy

PR Regions (VM Components) Can Interfere with One Another

Mitigation

Stratix® 10 and Beyond: Secure Isolation of Blue/Green and

Green/Green Bitstreams

FPGA

Device

Virtual Machine Monitor

Device

Guest OS

Guest OS

IOMMU

App App App App

Device

Manager

Memory

Device

Manager

Page 20: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

20

Agenda

• Security Threat Models for FPGA/SoC FPGA End Markets

• Taxonomy of Security Threats

• Threat Use Cases

• Overall Security Product Features and Roadmap

Page 21: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

21

Se

curi

ty F

ea

ture

Gro

wth

2009 2012 2015 2017

JTAG Disable JTAG Secure

On-chip Oscillator

Partial Reconfiguration Error Correction

Temp. Sensor JTAG Monitor

Unique ID

Bitstream Authentication User Fuses/Keys

Additional Sensors Embedded Security

Agile Partial Reconfiguration Side Channel Analysis Protection

Whole Device Encrypt/Authenticate User Accessible PUF Security Processor

Scripted Zeroization Secure RMA/Debug/Upgrade

Domestic Manufacture

Intel® PSG Roadmap of SoC FPGA Security Features

This document contains information on products, services and/or processes in development. All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest forecast, schedule, specifications and roadmaps.

Page 22: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

22

Block Level Capabilities of Stratix® 10 SDM

Page 23: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

23

Secure Device Manager with Configuration Sectors • Stratix® 10 bitstreams will be

‘sectorized’ and configure sectors in parallel

• This also allows zeroization to be partial, complete, ordered, or fully parallel

• Verification can be performed likewise at the sector level

• This also enhances Error Detection Cyclic Redundancy Check and response (Scrubbing)

©

Page 24: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

24

Configuration Flow for Stratix® 10 Device

Page 25: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

25

Summary and Next Steps

• FPGA or SoCs address multiple markets with different threat profiles

• Threat profiles addressed in FPGA or SoC designs are changing rapidly

• FPGA and SoC future architectures address newer IoT and data center profiles

• Take advantage of these new security features in your architectures

Page 26: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

26

Intel PSG Anti-Tamper Security Symposium

• 7 November, 2016

• Hillsboro Oregon

• Non-disclosure agreement (NDA) required

Page 27: SoC FPGA Hardware Security Requirements and Roadmap · 2 Agenda •Security Threat Models for FPGA/SoC FPGA End Markets •Taxonomy of Security Threats •Threat Use Cases •Overall

27

Additional Sources of Information

A PDF of this presentation is available from our Technical Session Catalog: www.intel.com/idfsessionsSF.

More web-based info: https://www.altera.com/content/dam/altera-www/global/en_US/pdfs/literature/wp/wp-01252-secure-device-manager-for-fpga-soc-security.pdf