SlideShare a Scribd company logo
1 of 18
Download to read offline
Managing Securities in FPGA-
Based Embedded Systems
Presenters:
Rajeev Verma
Pratheep Joe Siluvai Iruthayaraj
Why FPGA?
● Better performance.
○ Large number of bit level operations can be performed.
○ shifting, permutations are achieved ny just wiring.
○ extreme level of parallelism
○ low overheads
● Rapid time to market
● Flexible
● Truth tables or Lookup tables are used for hw acceleration.
● Applications
○ Face recognition systems, wireless networks, cryptographic
applications, supercomputers and many security applications.
Reconfigurable systems
● Cryptographic algorithms are generally implemented on
FPGA
● Encryption devices require strong isolation to segregate
plaintext(red) from ciphertext(black).
● Unencrypted data should be unavailable for black
network.
System Design!
● Shared resources in system
○ Shared DRAM, shared bus and
shared AES encryption core.
● Domain-1
○ MicroBlaze0, RS-232, Distinct
memory portion
● Domain-2
○ MicroBlaze1, an Ethernet interface,
another distinct partition of memory
Applications need separation of data
● Aviation field.
○ Uses Commercial off-the-shelf (COTS) FPGA components.
○ Sensitive and non-sensitive data is processed in same device.
○ This isolation of the sensitive and non-sensitive data is achieved in
modern FPGAs
● Intelligent video surveillance
○ FPGA provides deep computation pipelining and isolation.
○ Rely on 3 cores
■ Video interface for decoding
■ Encryption mechanism for processing the video
■ Network interface for sending data.
FPGA System Flow
● Cores can be generated by
hand or by software like
Xilinx Embedded
Development Kit (EDK).
● Bitstream is the final code
that goes to the core.
Reconfigurable Security Problems
● Design-tool subversion
● Composition
● Trusted Foundries
● Bitstream protection
Design-tool subversion
● Malicious design could destroy FPGA because of short circuit.
● Trusted tools should be used to develop trusted cores.
● Xilinx provide signed cores.
Composition problem
● As final design, we can trust the design as much as the least-trusted design path.
● Systems can be composed on
○ Device level
■ one or more IP cores resides on single chip
○ Board level
■ one or more chips on a single board
○ Network level
■ Multiple boards are connected through network
● Now, it is possible to copy the hardware from existing products.
● Protected IP could be a solution.
● a separate chip for each core can be used which can provide security advantage
Security issues with COTS
● COTS : Commercial off-the-shelf
● Manufacturer should not insert unintended functionalities into FPGA.
● All cores should be flawless so that attacker can’t exploit.
● Security flaws should not exist in running software or the compiler.
● Embedded device depends on other parts of larger nw should not be malicious.
Trusted-Foundry Problem and Bitstream
Protection
● Trusted-Foundry Problem
○ ASIC is having problem of IP theft.
○ FPGA provide important security benefit over ASIC in this issue.
● Bitstream Protection
○ Securely Bitstream uploading is essential to avoid the IP-theft
○ These theft impacts the “Bottom Line”
○ Some FPGA’s can remotely updated in the field.
■ Requires secure channel and authentication.
Reconfigurable security solutions
● Life-cycle management
○ Configuration management stores software with version numbers.
○ Any new version is thoroughly tested before assignment of new version.
○ Control on development environment and tools can support accountability.
○ Alternative is to build a custom set of trusted tools for security critical HW.
○ A critical function of life-cycle protection ensure that o/p is not malicious.
● Secure Architecture
○ FPGA provides self-protected security mechanism at a low cost.
○ Examples
■ Memory Protection
■ Spatial Isolation
■ Tags
■ Secure Communication
Secure Architecture
● Memory Protection
○ Reference monitor is well known method for legal sharing of memory.
○ Reference monitor possesses
■ Self-protecting
■ Enforcement mechanisms cannot be bypassed.
■ Correct and complete.
● Spatial Isolation
○ Control on layout function provide spatial isolation in
FPGA.
Secure Architecture cont..
● Tags
○ Ability to track information and its transformation as it flows through
the system.
○ Tag is metadata that can be attached to each piece of system data.
○ Tag can be used in FPGA at different granularity.
● Secure Communication
○ Cores need to share data so can’t be isolated.
○ Currently FPGA system use
■ Shared Memory
■ Direct connection
■ Shared Bus
Future Work
● Multicore Systems
○ Chip multiprocessors running multiple threads
○ SoCs with multiple single-purpose cores on single ASIC.
○ New techniques are needed to mediate secure, efficient communication of
multi core system.
● Integration of security primitives.
○ If computing units are shared among security domains then temporal scheme
might be required.
○ Spatial schemes, temporal scheme or tags should be designed which can meet
security requirement and minimize overhead.
Future Work
● Reconfigurable Updates
○ Latest FPGA are capable of changing configuration on runtime.
○ These dynamic systems need more communication between core.
○ Cores state can be changed from executing to updated.
○ These are complicated systems and require new primitives for security.
● Channels and information leakage
○ Core are isolated still need communication through covert channel which can
be insecure.
○ Another attack can be side channel attack. E.g Power-analysis attack.
Conclusion
● A Successful approach must combine life-cycle management and a
coherent security architecture.
● Designing any trustworthy complex system is challenging.
● Hardware security is getting more and more important.
Questions??
Thanks!

More Related Content

What's hot

Real Time Clock Interfacing for Arduino
Real Time Clock Interfacing for ArduinoReal Time Clock Interfacing for Arduino
Real Time Clock Interfacing for Arduinohandson28
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)Hamid Reza
 
Smart grid(v1)
Smart grid(v1)Smart grid(v1)
Smart grid(v1)sahar148
 
Fpga architectures and applications
Fpga architectures and applicationsFpga architectures and applications
Fpga architectures and applicationsSudhanshu Janwadkar
 
register file structure of PIC controller
register file structure of PIC controllerregister file structure of PIC controller
register file structure of PIC controllerNirbhay Singh
 
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONS
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONSUNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONS
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONSDr.YNM
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportChinaraja Baratam
 
FPGA Design Challenges
FPGA Design ChallengesFPGA Design Challenges
FPGA Design ChallengesKrishna Gaihre
 
Basics of Digital Design and Verilog
Basics of Digital Design and VerilogBasics of Digital Design and Verilog
Basics of Digital Design and VerilogGanesan Narayanasamy
 
Questions & Answers related to home automation
Questions & Answers related to home automationQuestions & Answers related to home automation
Questions & Answers related to home automationMOHAMMAD TANVEER
 
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachAn Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachMostafa Khamis
 
Pll in lpc2148
Pll in lpc2148Pll in lpc2148
Pll in lpc2148Aarav Soni
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter pptRitam Giri
 
WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)Vikram Purohit
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array) Iffat Anjum
 

What's hot (20)

Real Time Clock Interfacing for Arduino
Real Time Clock Interfacing for ArduinoReal Time Clock Interfacing for Arduino
Real Time Clock Interfacing for Arduino
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)
 
Smart grid(v1)
Smart grid(v1)Smart grid(v1)
Smart grid(v1)
 
Fpga architectures and applications
Fpga architectures and applicationsFpga architectures and applications
Fpga architectures and applications
 
register file structure of PIC controller
register file structure of PIC controllerregister file structure of PIC controller
register file structure of PIC controller
 
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONS
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONSUNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONS
UNIT-III CASE STUDIES -FPGA & CPGA ARCHITECTURES APPLICATIONS
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
 
DAC and sensor interfacing with PIC
DAC and sensor interfacing with PICDAC and sensor interfacing with PIC
DAC and sensor interfacing with PIC
 
GSM BASED GAS LEAKAGE DETECTION SYSTEM
GSM BASED GAS LEAKAGE DETECTION SYSTEMGSM BASED GAS LEAKAGE DETECTION SYSTEM
GSM BASED GAS LEAKAGE DETECTION SYSTEM
 
FPGA Design Challenges
FPGA Design ChallengesFPGA Design Challenges
FPGA Design Challenges
 
Basics of Digital Design and Verilog
Basics of Digital Design and VerilogBasics of Digital Design and Verilog
Basics of Digital Design and Verilog
 
FPGA
FPGAFPGA
FPGA
 
Questions & Answers related to home automation
Questions & Answers related to home automationQuestions & Answers related to home automation
Questions & Answers related to home automation
 
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping ApproachAn Automatic Generation of NoC Architectures: An Application-Mapping Approach
An Automatic Generation of NoC Architectures: An Application-Mapping Approach
 
Unit VI CPLD-FPGA Architecture
Unit VI CPLD-FPGA ArchitectureUnit VI CPLD-FPGA Architecture
Unit VI CPLD-FPGA Architecture
 
Pll in lpc2148
Pll in lpc2148Pll in lpc2148
Pll in lpc2148
 
Smart energy meter ppt
Smart energy meter   pptSmart energy meter   ppt
Smart energy meter ppt
 
WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)WIDE AREA MONITORING SYSTEMS(WAMS)
WIDE AREA MONITORING SYSTEMS(WAMS)
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
 
Low Power VLSI Design
Low Power VLSI DesignLow Power VLSI Design
Low Power VLSI Design
 

Similar to Security issues in FPGA based systems.

Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsAbdullah Deeb
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...ST_World
 
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...XinliShang1
 
Cpld and fpga mod vi
Cpld and fpga   mod viCpld and fpga   mod vi
Cpld and fpga mod viAgi George
 
FPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projectsFPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projectsKrishna Gaihre
 
Streaming multiprocessors and HPC
Streaming multiprocessors and HPCStreaming multiprocessors and HPC
Streaming multiprocessors and HPCOmkarKachare1
 
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapUWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapedlangley
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux NetworkingJames Morris
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptxPratik Gohel
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security Systemajinky gadewar
 
Edge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacksEdge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacks1GV20CS058Shivaraj
 
IGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGAIGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGASamira Riki
 
Chiplets in Data Centers
Chiplets in Data CentersChiplets in Data Centers
Chiplets in Data CentersODSA Workgroup
 

Similar to Security issues in FPGA based systems. (20)

Reconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatformsReconfigurable trust forembeddedcomputingplatforms
Reconfigurable trust forembeddedcomputingplatforms
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
Project_updated
Project_updatedProject_updated
Project_updated
 
Fpg as 11 body
Fpg as 11 bodyFpg as 11 body
Fpg as 11 body
 
Fpga acquisition
Fpga acquisitionFpga acquisition
Fpga acquisition
 
UNIT-1.pptx
UNIT-1.pptxUNIT-1.pptx
UNIT-1.pptx
 
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
One Stone, Three Birds_ Finer-Grained Encryption with Apache Parquet @ Large ...
 
Micro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application DevelopmentMicro-controllers (PIC) based Application Development
Micro-controllers (PIC) based Application Development
 
Cpld and fpga mod vi
Cpld and fpga   mod viCpld and fpga   mod vi
Cpld and fpga mod vi
 
FPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projectsFPGA Selection Methodology for Real time projects
FPGA Selection Methodology for Real time projects
 
Scada
ScadaScada
Scada
 
Streaming multiprocessors and HPC
Streaming multiprocessors and HPCStreaming multiprocessors and HPC
Streaming multiprocessors and HPC
 
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheapUWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
UWE Linux Boot Camp 2007: Hacking embedded Linux on the cheap
 
Directions in SELinux Networking
Directions in SELinux NetworkingDirections in SELinux Networking
Directions in SELinux Networking
 
Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
 
RTOS based Confidential Area Security System
RTOS based Confidential Area Security SystemRTOS based Confidential Area Security System
RTOS based Confidential Area Security System
 
Edge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacksEdge computing PPT slides and it's benifits and drawbacks
Edge computing PPT slides and it's benifits and drawbacks
 
IGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGAIGLOO2 Microsemi FPGA
IGLOO2 Microsemi FPGA
 
Lect 1 Into.pptx
Lect 1 Into.pptxLect 1 Into.pptx
Lect 1 Into.pptx
 
Chiplets in Data Centers
Chiplets in Data CentersChiplets in Data Centers
Chiplets in Data Centers
 

Recently uploaded

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Security issues in FPGA based systems.

  • 1. Managing Securities in FPGA- Based Embedded Systems Presenters: Rajeev Verma Pratheep Joe Siluvai Iruthayaraj
  • 2. Why FPGA? ● Better performance. ○ Large number of bit level operations can be performed. ○ shifting, permutations are achieved ny just wiring. ○ extreme level of parallelism ○ low overheads ● Rapid time to market ● Flexible ● Truth tables or Lookup tables are used for hw acceleration. ● Applications ○ Face recognition systems, wireless networks, cryptographic applications, supercomputers and many security applications.
  • 3. Reconfigurable systems ● Cryptographic algorithms are generally implemented on FPGA ● Encryption devices require strong isolation to segregate plaintext(red) from ciphertext(black). ● Unencrypted data should be unavailable for black network.
  • 4. System Design! ● Shared resources in system ○ Shared DRAM, shared bus and shared AES encryption core. ● Domain-1 ○ MicroBlaze0, RS-232, Distinct memory portion ● Domain-2 ○ MicroBlaze1, an Ethernet interface, another distinct partition of memory
  • 5. Applications need separation of data ● Aviation field. ○ Uses Commercial off-the-shelf (COTS) FPGA components. ○ Sensitive and non-sensitive data is processed in same device. ○ This isolation of the sensitive and non-sensitive data is achieved in modern FPGAs ● Intelligent video surveillance ○ FPGA provides deep computation pipelining and isolation. ○ Rely on 3 cores ■ Video interface for decoding ■ Encryption mechanism for processing the video ■ Network interface for sending data.
  • 6. FPGA System Flow ● Cores can be generated by hand or by software like Xilinx Embedded Development Kit (EDK). ● Bitstream is the final code that goes to the core.
  • 7. Reconfigurable Security Problems ● Design-tool subversion ● Composition ● Trusted Foundries ● Bitstream protection
  • 8. Design-tool subversion ● Malicious design could destroy FPGA because of short circuit. ● Trusted tools should be used to develop trusted cores. ● Xilinx provide signed cores.
  • 9. Composition problem ● As final design, we can trust the design as much as the least-trusted design path. ● Systems can be composed on ○ Device level ■ one or more IP cores resides on single chip ○ Board level ■ one or more chips on a single board ○ Network level ■ Multiple boards are connected through network ● Now, it is possible to copy the hardware from existing products. ● Protected IP could be a solution. ● a separate chip for each core can be used which can provide security advantage
  • 10. Security issues with COTS ● COTS : Commercial off-the-shelf ● Manufacturer should not insert unintended functionalities into FPGA. ● All cores should be flawless so that attacker can’t exploit. ● Security flaws should not exist in running software or the compiler. ● Embedded device depends on other parts of larger nw should not be malicious.
  • 11. Trusted-Foundry Problem and Bitstream Protection ● Trusted-Foundry Problem ○ ASIC is having problem of IP theft. ○ FPGA provide important security benefit over ASIC in this issue. ● Bitstream Protection ○ Securely Bitstream uploading is essential to avoid the IP-theft ○ These theft impacts the “Bottom Line” ○ Some FPGA’s can remotely updated in the field. ■ Requires secure channel and authentication.
  • 12. Reconfigurable security solutions ● Life-cycle management ○ Configuration management stores software with version numbers. ○ Any new version is thoroughly tested before assignment of new version. ○ Control on development environment and tools can support accountability. ○ Alternative is to build a custom set of trusted tools for security critical HW. ○ A critical function of life-cycle protection ensure that o/p is not malicious. ● Secure Architecture ○ FPGA provides self-protected security mechanism at a low cost. ○ Examples ■ Memory Protection ■ Spatial Isolation ■ Tags ■ Secure Communication
  • 13. Secure Architecture ● Memory Protection ○ Reference monitor is well known method for legal sharing of memory. ○ Reference monitor possesses ■ Self-protecting ■ Enforcement mechanisms cannot be bypassed. ■ Correct and complete. ● Spatial Isolation ○ Control on layout function provide spatial isolation in FPGA.
  • 14. Secure Architecture cont.. ● Tags ○ Ability to track information and its transformation as it flows through the system. ○ Tag is metadata that can be attached to each piece of system data. ○ Tag can be used in FPGA at different granularity. ● Secure Communication ○ Cores need to share data so can’t be isolated. ○ Currently FPGA system use ■ Shared Memory ■ Direct connection ■ Shared Bus
  • 15. Future Work ● Multicore Systems ○ Chip multiprocessors running multiple threads ○ SoCs with multiple single-purpose cores on single ASIC. ○ New techniques are needed to mediate secure, efficient communication of multi core system. ● Integration of security primitives. ○ If computing units are shared among security domains then temporal scheme might be required. ○ Spatial schemes, temporal scheme or tags should be designed which can meet security requirement and minimize overhead.
  • 16. Future Work ● Reconfigurable Updates ○ Latest FPGA are capable of changing configuration on runtime. ○ These dynamic systems need more communication between core. ○ Cores state can be changed from executing to updated. ○ These are complicated systems and require new primitives for security. ● Channels and information leakage ○ Core are isolated still need communication through covert channel which can be insecure. ○ Another attack can be side channel attack. E.g Power-analysis attack.
  • 17. Conclusion ● A Successful approach must combine life-cycle management and a coherent security architecture. ● Designing any trustworthy complex system is challenging. ● Hardware security is getting more and more important.