networks on chips security “aspect framework and analysis”
DESCRIPTION
Networks on Chips Security “Aspect Framework and Analysis”. Flow of presentation:. Kind of attacks on embedded systems. Most relevant security threats faced by NOC. Solutions/ways suggested so far to deal with these threats. Proposed work that can be done. Kind of Attacks. - PowerPoint PPT PresentationTRANSCRIPT
Flow of presentation:
Kind of attacks on embedded systems.
Most relevant security threats faced by NOC.
Solutions/ways suggested so far to deal with these threats.
Proposed work that can be done.
Kind of Attacks
Classified basically in three major forms
Software Attacks- Viruses , Trojan etc basically aiming at the pit falls in the code.
Physical Attacks- Intrusion in embedded systems. Microprobing techniques.
Side Channel Attacks- Based on physical implementation of the system. Waves, sound or heat produced during time of execution used to detect flow path of data.
Attacks Specific to NOC
Denial of Service Draining or Sleep Deprivation Extraction of Information Hijacking Reverse Engineering
1. Denial of service
Incorrect Path: Introducing in the network a packet with erroneous path.
Deadlock: Adding a packet with paths that intentionally disrespect deadlock free rules.
Livelock: Packet that can revolve in the network for infinite amount of time, wasting bandwidth, latency and power.
2. Draining or Sleep Deprivation
Frequently performing power hungry activities to generate heat in specific paths to either burn the system or detect the flow of path using heat detection and reverse engineering.
This kind of attack in mild form can result in faster battery drain.
3. Extraction of Information Mainly buffer overflow techniques
are used to extract information. Header of the data contain access
rights. Buffer Overflow will result in the
lose of access rights.
4. Hijacking
Altering the execution or in some case configuration of the system in order to make system work other than normal duties.
Can be done if malicious IP cores or input/output ports get read/write access to different parts of the system.
5. Reverse Engineering
Detect the working of system and thus the architecture.
Used by people involved in piracy. Special technologies are devised
and used. Done by analysis of physical
parameters like waves sound or heat produced during execution.
Micro Probing.
Suggested Frameworks
Not many frameworks for the security has been discussed in this field.
The work till now is only an overview, discussion.
We will be discussing two different papers written by Jean-Phillippe Diguet and colleagues (CNRS France).
Whole System can be divided in two parts – Secured and Unsecured
ASIC(Secured)
FPGA(Unsecured)
On the basis of this three kind of implementations are possible.
a.
b.
c.
ASIC
ASIC
FPGA
FPGA
ASIC Enjoys chip intrinsic protection Only thing to protect is chip interfaces
FPGA Reconfiguration opens new problem Bit stream encryption can be used fully
or partially. Cryptographic keys are distributed in the system and Security wrappers can be used.
ASIC and FPGA NOC functionality after FPGA reconfigured Control access between ASIC and FPGA.
Basic Concept of security The whole idea is based on the
fact that all the attacks are done either by input/output ports or some malicious IP core
Malicious IP cores are supposed to be the FPGA part of the system which can be reconfigured and hence hacked easily.
Reference: From NoC security analysis to design solutions
CCM
Central Configuration Module This is the block which is
responsible for providing memory authorizations to NI’s.
It also takes care of any kind of attack, if detected by the NI’s.
NI’s if get packets with abnormality reports to CCM, if reported sender frequently produce erroneous packets its disconnected by CCM.
CASE 1.
All the NI’s and some or all IP cores are in secure zone.
Reference: From NoC security analysis to design solutions
Details of NI in this case:
Reference: From NoC security analysis to design solutions
CASE 2.
Some NI’s outside of the secure areas.
Whole NOC not safe. Boundary has to be safe guarded.
Reference: From NoC security analysis to design solutions
Self Complimented Path Coding The shown factors do not consider
the fact that receiver should be aware of the sender. Since the sender id can be fake the only way to detect the original sender we have to incorporate the path through which these packets route.
Cont.
Proposed solution is to include the route in the packet in self complimented way in terms of routers.
Cont.
Reference: From NoC security analysis to design solutions
Reverse Engineering Attack Path taken by data from one IP block
to other can be reconfigured by programming CCM accordingly. This provides sufficient safety barriers against such kind of attacks.
Encrypted Bit stream
All the IP cores vulnerable to attack are protected by encrypted keys.
CCM is especially suggested to be implemented on ASIC and protected by strong encryption.
Denial of Service
To take care of such kind of attack two kinds of channels are proposed to carry data.
Best Effort : All the communications in unsecured area and between secured and unsecured area is done on this channel
Priority Best Effort : Communication in secure area and between CCM and NI’s takes place at this channel. Guaranteed throughput is also thus achieved in some cases.
To Conclude:
Reference: From NoC security analysis to design solutions
In the recently published paper by the same author emphasis on the design of NI is done.
In future the implementation of the prescribed work can be carried out.
REFERENCES
[1] J. P. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin. NoC-centric security of reconfigurable soc. In Proceedings of the First International Symposium on Networks-on-Chip(NOCS’07), May 7-9 2007.
[2] S. Evainand J. Diguet. From NoC security analysis to design solutions. In IEEE Workshop on Signal Processing Systems Design and Implementation, pages 166-171 , 2005.
[3] L.Fiorin, C. Silvano and M.Sami. Security Aspect in NoC: Overview and Proposal for Secure implementations. 10th Euromicro Conference on Digital System Design architectures, Methods and Tools. (DSD 2007)
THANK YOU
Anurag JainB. Tech 2005