29

Flow of presentation: Kind of attacks on embedded systems. Most relevant security threats faced by NOC. Solutions/ways suggested so far to deal

Embed Size (px)

Citation preview

Flow of presentation:

Kind of attacks on embedded systems.

Most relevant security threats faced by NOC.

Solutions/ways suggested so far to deal with these threats.

Proposed work that can be done.

Kind of Attacks

Classified basically in three major forms

Software Attacks- Viruses , Trojan etc basically aiming at the pit falls in the code.

Physical Attacks- Intrusion in embedded systems. Microprobing techniques.

Side Channel Attacks- Based on physical implementation of the system. Waves, sound or heat produced during time of execution used to detect flow path of data.

Attacks Specific to NOC

Denial of Service Draining or Sleep Deprivation Extraction of Information Hijacking Reverse Engineering

1. Denial of service

Incorrect Path: Introducing in the network a packet with erroneous path.

Deadlock: Adding a packet with paths that intentionally disrespect deadlock free rules.

Livelock: Packet that can revolve in the network for infinite amount of time, wasting bandwidth, latency and power.

2. Draining or Sleep Deprivation

Frequently performing power hungry activities to generate heat in specific paths to either burn the system or detect the flow of path using heat detection and reverse engineering.

This kind of attack in mild form can result in faster battery drain.

3. Extraction of Information Mainly buffer overflow techniques

are used to extract information. Header of the data contain access

rights. Buffer Overflow will result in the

lose of access rights.

4. Hijacking

Altering the execution or in some case configuration of the system in order to make system work other than normal duties.

Can be done if malicious IP cores or input/output ports get read/write access to different parts of the system.

5. Reverse Engineering

Detect the working of system and thus the architecture.

Used by people involved in piracy. Special technologies are devised

and used. Done by analysis of physical

parameters like waves sound or heat produced during execution.

Micro Probing.

Suggested Frameworks

Not many frameworks for the security has been discussed in this field.

The work till now is only an overview, discussion.

We will be discussing two different papers written by Jean-Phillippe Diguet and colleagues (CNRS France).

Whole System can be divided in two parts – Secured and Unsecured

ASIC(Secured)

FPGA(Unsecured)

On the basis of this three kind of implementations are possible.

a.

b.

c.

ASIC

ASIC

FPGA

FPGA

ASIC Enjoys chip intrinsic protection Only thing to protect is chip interfaces

FPGA Reconfiguration opens new problem Bit stream encryption can be used fully

or partially. Cryptographic keys are distributed in the system and Security wrappers can be used.

ASIC and FPGA NOC functionality after FPGA reconfigured Control access between ASIC and FPGA.

Basic Concept of security The whole idea is based on the

fact that all the attacks are done either by input/output ports or some malicious IP core

Malicious IP cores are supposed to be the FPGA part of the system which can be reconfigured and hence hacked easily.

Reference: From NoC security analysis to design solutions

CCM

Central Configuration Module This is the block which is

responsible for providing memory authorizations to NI’s.

It also takes care of any kind of attack, if detected by the NI’s.

NI’s if get packets with abnormality reports to CCM, if reported sender frequently produce erroneous packets its disconnected by CCM.

CASE 1.

All the NI’s and some or all IP cores are in secure zone.

Reference: From NoC security analysis to design solutions

Details of NI in this case:

Reference: From NoC security analysis to design solutions

CASE 2.

Some NI’s outside of the secure areas.

Whole NOC not safe. Boundary has to be safe guarded.

Reference: From NoC security analysis to design solutions

Self Complimented Path Coding The shown factors do not consider

the fact that receiver should be aware of the sender. Since the sender id can be fake the only way to detect the original sender we have to incorporate the path through which these packets route.

Cont.

Proposed solution is to include the route in the packet in self complimented way in terms of routers.

Cont.

Reference: From NoC security analysis to design solutions

Reverse Engineering Attack Path taken by data from one IP block

to other can be reconfigured by programming CCM accordingly. This provides sufficient safety barriers against such kind of attacks.

Encrypted Bit stream

All the IP cores vulnerable to attack are protected by encrypted keys.

CCM is especially suggested to be implemented on ASIC and protected by strong encryption.

Denial of Service

To take care of such kind of attack two kinds of channels are proposed to carry data.

Best Effort : All the communications in unsecured area and between secured and unsecured area is done on this channel

Priority Best Effort : Communication in secure area and between CCM and NI’s takes place at this channel. Guaranteed throughput is also thus achieved in some cases.

To Conclude:

Reference: From NoC security analysis to design solutions

In the recently published paper by the same author emphasis on the design of NI is done.

In future the implementation of the prescribed work can be carried out.

REFERENCES

[1] J. P. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin. NoC-centric security of reconfigurable soc. In Proceedings of the First International Symposium on Networks-on-Chip(NOCS’07), May 7-9 2007.

[2] S. Evainand J. Diguet. From NoC security analysis to design solutions. In IEEE Workshop on Signal Processing Systems Design and Implementation, pages 166-171 , 2005.

[3] L.Fiorin, C. Silvano and M.Sami. Security Aspect in NoC: Overview and Proposal for Secure implementations. 10th Euromicro Conference on Digital System Design architectures, Methods and Tools. (DSD 2007)

THANK YOU

Anurag JainB. Tech 2005