This document discusses embedded security as a new phenomenon for securing systems and identifying hardware trojans. It provides an overview of embedded security requirements, implementations in different systems like optical burst switching and dual CPU systems, methods for identifying hardware trojans including gate-level characterization and power analysis, and techniques for isolating detected trojans. The goal is to explain embedded security and hardware trojan detection and prevention.
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Vishwanath rakesh ece 561
1. Embedded Security as a new phenomenon in the field of securing different system
and Identifying and preventing hardware Trojan.
CS/ECE 561
RAKESH VISHWANATH
3. Introduction to Embedded Security
In today’s world Embedded Security is one or the other form most important requirement for
increasing number of embedded system.
As future technologies which promise greater interaction between computer and humans
are increasing there security becomes paramount issue which needs to be taken care.
Embedded Security is one form which makes successful deployment of next generation
Embedded System.
Embedded security can’t be solved at a single security abstraction layer, but rather it needs a
more multiple abstraction layer security for systems.
4. Embedded Security Requirement
Embedded System often provide critical functions
that could be attack by malicious entities.
Embedded system security often requires
protecting critical or sensitive information (code or
data) throughout its lifetime.
Security should be such a way that it should
possess data confidentiality, data integrity and peer
authentication.
Security requirement may vary when considered
from the view point of manufacture ex: cellphone.
5. Embedded Security in different systems
Classical and Quantum Cryptography – In Optical Burst Switching.
Traditional by which two separate cores providing security through
isolation and ARM trust Zone technology – In Dual Virtual CPU System.
Classical server based finger print verification and User based scheme where
user authenticates directly from Embedded device - In Bio-metric authentication
Security.
6. Embedded Security in Optical Burst Switching [OBS]
Optical Burst Switching [OBS] is one of the most
promising optical switching technology for future
internet which provides finer granularity but suffers
from security vulnerabilities.
Even though OBS provide IPsec to secure IP network
but its security limit is for traffic that do not
necessary have IP layer.
Best to provide Embedded security framework which
combines both classical and quantum cryptography.
7. Embedded Security in Dual Virtual CPU System
In Dual Virtual CPU System security is the main concern which needs to be solved.
Security in Dual Virtual CPU can be maintained by two ways.
- Traditional by which two separate cores providing security through isolation.
- ARM trust Zone technology.
8. Embedded Security in Dual Virtual CPU System- Continued
The figure shows traditional way of achieving
Embedded Security in Dual Virtual CPU.
In this method there is one SoC package with two
separate system.
First CPU runs the normal world operating system
its memory and peripherals consume lot of space.
Second CPU runs Security sensitive codes and its
complete system is inside SoC.
9. Embedded Security in Dual Virtual CPU System- Continued
The figure shows ARM trust Zone of achieving Embedded
Security in Dual Virtual CPU.
In this method the processor is viewed as two separate
virtual processor while running software.
And in this method switching between trust Zone secure
and normal world is initiated only by extension.
Design using trust Zone approach have the advantage of
dual core CPU approach.
10. Embedded Security as Biometric authentication
Biometric authentication is one form of security which facilitates both user and server
from malicious attack.
Security in Biometric can be achieved in two ways
- Classical server based finger print verification.
- User based scheme where user authenticates directly from Embedded device.
11. Embedded Security as Biometric authentication-Continued
The figure shows the Classical Server based finger
print verification in Biometric authentication.
In this method the user enters his identity into
server ex: magnetic card.
This form of Security scheme posses some security
flaws.
12. Embedded Security as Biometric authentication-Continued
The figure shows the device based scheme where
user authenticates directly from embedded device.
In this method device fingerprint sensor and
template are located, avoiding server based
security issues.
And in this method the device initiates a verification
transaction by transmitting its ID to the server.
13. Identifying Hardware Trojan
In recent years the threat to the security of
Integrated Circuits (IC’s) are Hardware Trojan
Horse.
The figure shows the simple Trojan during normal
operation.
Trojan can be identified by many ways like
- Gate level Characterization.
- Path delay finger print.
- power supply transient signals.
- Current integration method.
14. Identifying Hardware Trojan – Gate level Characterization
The main technical obstacles to Hardware Trojan Horse detection is due to
manufacturing variability.
In this method they first recover the characteristics of gate like recovering
the properties of ICs.
In this method they make use of linear programming to solve the equations
of system created by non destructive measurements of power and delay.
15. Identifying Hardware Trojan – Path delay finger print
In this method Trojans are characterized and the cost of testing is lowered.
In this method the chips are validated by comparing there delay parameter to the
finger prints.
In path delay finger print the whole testing procedure is followed by three methods.
- path delay gathering of nominal chip.
- Finger print generation.
- Trojan Detection.
16. Identifying Hardware Trojan – Power supply transient signals
In this method the Trojans are detected based on the
analysis of power transient signal and statistical
prediction eclipse technique.
In this method process variation takes place due to
power transient signal measured at each port so they
use calibration test.
In calibration test the configure the scan chain to deliver
a step input to the gate of p-channel transistor figure
shows the calibration circuit response.
17. Identifying Hardware Trojan – Current Integration method
In this method the chip is connected by four ports
and they are identified by exhaustive test as shown
in the figure.
In this process the worst case charger will be
obtained in response to pattern set and the pattern
set will be applied to each chip .
In this method the small current difference between
the Trojan inserted and Trojan free circuit can be
magnified by the charger integration process.
18. Isolation of Hardware Trojan
The Isolation of Trojan is done at the final stage after detection of hardware Trojan.
The Trojan Isolation process has made the fact that will draw more current from
their nearest power port.
In this method the current at each power is measured, integrated and compared
with the current integration process of each port.
19. Conclusion
As Embedded System are increasing day by day security is the serious threat,
Embedded security if one form of security which protects from malicious attack.
Embedded Security handles the information in trusted and isolated environment
preventing from the malicious attack of device.
This Survey made an effort to explain Embedded security and their security in
different system along with Identifying and Preventing Hardware Trojans.
20. Reference
[1] Introduction :
a). David D, Hwand “Securing Embedded system” IEEE Security & Privacy April 2006.
b). Paul Kocher, Ruby Lee, Gary McGraw, Anand Raghunathan and Srivaths Ravi “Security as a new dimension in the field of
Embeddded security” published in Citeseer 2004.
[2] Embedded Security Requirement :
Mehran Mozaffari Kermani, Meng Zhang, Anand Raghunathan, Niraj K. Jha “ Emerging Frontiers in Embedded security”. VLSI
design and 2013 12th International conference on embedded system, IEEE 2013.
[3] Embedded Security in different System:
a). Yuhua Chen, Pramode k. Verma and Subhash kak “ Embedded security framework for Integrated Classical and Quantum
Cryptography Service in Optical Burst Switching Network” published on 17th Feb 2009 Wiley Interscience.
b). Wilson.P, Frey.A, Mihm.T,Kershaw D.” Implementing embedded security on Dual Virtual CPU System” Published in Design
& Test computer, IEEE Nov-Dec 2007.
[4] Identifying and detecting Hardware Trojans:
Miodrag Potkonjak, Nahapetian, Nelson, Massey” Hardware Trojan Detection using gate level characterization” Published in
Design automation conference 2009 DAC ’09 46th ACM/IEEE.
[5] Isolation of Hardware Trojans:
Xiaoxiao Wang, Hassan Salmani and Mohammad Tehranipoo,Jim Plusquellic “Hardware Trojan Detection and Isolation Using
Current Integration and Localized Current Analysis IEEE 2008.