networks on chips security “aspect framework and analysis”

29

Upload: menefer

Post on 14-Jan-2016

25 views

Category:

Documents


0 download

DESCRIPTION

Networks on Chips Security “Aspect Framework and Analysis”. Flow of presentation:. Kind of attacks on embedded systems. Most relevant security threats faced by NOC. Solutions/ways suggested so far to deal with these threats. Proposed work that can be done. Kind of Attacks. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Networks on Chips Security “Aspect Framework and  Analysis”
Page 2: Networks on Chips Security “Aspect Framework and  Analysis”

Flow of presentation:

Kind of attacks on embedded systems.

Most relevant security threats faced by NOC.

Solutions/ways suggested so far to deal with these threats.

Proposed work that can be done.

Page 3: Networks on Chips Security “Aspect Framework and  Analysis”

Kind of Attacks

Classified basically in three major forms

Software Attacks- Viruses , Trojan etc basically aiming at the pit falls in the code.

Physical Attacks- Intrusion in embedded systems. Microprobing techniques.

Side Channel Attacks- Based on physical implementation of the system. Waves, sound or heat produced during time of execution used to detect flow path of data.

Page 4: Networks on Chips Security “Aspect Framework and  Analysis”

Attacks Specific to NOC

Denial of Service Draining or Sleep Deprivation Extraction of Information Hijacking Reverse Engineering

Page 5: Networks on Chips Security “Aspect Framework and  Analysis”

1. Denial of service

Incorrect Path: Introducing in the network a packet with erroneous path.

Deadlock: Adding a packet with paths that intentionally disrespect deadlock free rules.

Livelock: Packet that can revolve in the network for infinite amount of time, wasting bandwidth, latency and power.

Page 6: Networks on Chips Security “Aspect Framework and  Analysis”

2. Draining or Sleep Deprivation

Frequently performing power hungry activities to generate heat in specific paths to either burn the system or detect the flow of path using heat detection and reverse engineering.

This kind of attack in mild form can result in faster battery drain.

Page 7: Networks on Chips Security “Aspect Framework and  Analysis”

3. Extraction of Information Mainly buffer overflow techniques

are used to extract information. Header of the data contain access

rights. Buffer Overflow will result in the

lose of access rights.

Page 8: Networks on Chips Security “Aspect Framework and  Analysis”

4. Hijacking

Altering the execution or in some case configuration of the system in order to make system work other than normal duties.

Can be done if malicious IP cores or input/output ports get read/write access to different parts of the system.

Page 9: Networks on Chips Security “Aspect Framework and  Analysis”

5. Reverse Engineering

Detect the working of system and thus the architecture.

Used by people involved in piracy. Special technologies are devised

and used. Done by analysis of physical

parameters like waves sound or heat produced during execution.

Micro Probing.

Page 10: Networks on Chips Security “Aspect Framework and  Analysis”

Suggested Frameworks

Not many frameworks for the security has been discussed in this field.

The work till now is only an overview, discussion.

We will be discussing two different papers written by Jean-Phillippe Diguet and colleagues (CNRS France).

Page 11: Networks on Chips Security “Aspect Framework and  Analysis”

Whole System can be divided in two parts – Secured and Unsecured

ASIC(Secured)

FPGA(Unsecured)

Page 12: Networks on Chips Security “Aspect Framework and  Analysis”

On the basis of this three kind of implementations are possible.

a.

b.

c.

ASIC

ASIC

FPGA

FPGA

Page 13: Networks on Chips Security “Aspect Framework and  Analysis”

ASIC Enjoys chip intrinsic protection Only thing to protect is chip interfaces

FPGA Reconfiguration opens new problem Bit stream encryption can be used fully

or partially. Cryptographic keys are distributed in the system and Security wrappers can be used.

ASIC and FPGA NOC functionality after FPGA reconfigured Control access between ASIC and FPGA.

Page 14: Networks on Chips Security “Aspect Framework and  Analysis”

Basic Concept of security The whole idea is based on the

fact that all the attacks are done either by input/output ports or some malicious IP core

Malicious IP cores are supposed to be the FPGA part of the system which can be reconfigured and hence hacked easily.

Page 15: Networks on Chips Security “Aspect Framework and  Analysis”

Reference: From NoC security analysis to design solutions

Page 16: Networks on Chips Security “Aspect Framework and  Analysis”

CCM

Central Configuration Module This is the block which is

responsible for providing memory authorizations to NI’s.

It also takes care of any kind of attack, if detected by the NI’s.

NI’s if get packets with abnormality reports to CCM, if reported sender frequently produce erroneous packets its disconnected by CCM.

Page 17: Networks on Chips Security “Aspect Framework and  Analysis”

CASE 1.

All the NI’s and some or all IP cores are in secure zone.

Reference: From NoC security analysis to design solutions

Page 18: Networks on Chips Security “Aspect Framework and  Analysis”

Details of NI in this case:

Reference: From NoC security analysis to design solutions

Page 19: Networks on Chips Security “Aspect Framework and  Analysis”

CASE 2.

Some NI’s outside of the secure areas.

Whole NOC not safe. Boundary has to be safe guarded.

Reference: From NoC security analysis to design solutions

Page 20: Networks on Chips Security “Aspect Framework and  Analysis”

Self Complimented Path Coding The shown factors do not consider

the fact that receiver should be aware of the sender. Since the sender id can be fake the only way to detect the original sender we have to incorporate the path through which these packets route.

Page 21: Networks on Chips Security “Aspect Framework and  Analysis”

Cont.

Proposed solution is to include the route in the packet in self complimented way in terms of routers.

Page 22: Networks on Chips Security “Aspect Framework and  Analysis”

Cont.

Reference: From NoC security analysis to design solutions

Page 23: Networks on Chips Security “Aspect Framework and  Analysis”

Reverse Engineering Attack Path taken by data from one IP block

to other can be reconfigured by programming CCM accordingly. This provides sufficient safety barriers against such kind of attacks.

Page 24: Networks on Chips Security “Aspect Framework and  Analysis”

Encrypted Bit stream

All the IP cores vulnerable to attack are protected by encrypted keys.

CCM is especially suggested to be implemented on ASIC and protected by strong encryption.

Page 25: Networks on Chips Security “Aspect Framework and  Analysis”

Denial of Service

To take care of such kind of attack two kinds of channels are proposed to carry data.

Best Effort : All the communications in unsecured area and between secured and unsecured area is done on this channel

Priority Best Effort : Communication in secure area and between CCM and NI’s takes place at this channel. Guaranteed throughput is also thus achieved in some cases.

Page 26: Networks on Chips Security “Aspect Framework and  Analysis”

To Conclude:

Reference: From NoC security analysis to design solutions

Page 27: Networks on Chips Security “Aspect Framework and  Analysis”

In the recently published paper by the same author emphasis on the design of NI is done.

In future the implementation of the prescribed work can be carried out.

Page 28: Networks on Chips Security “Aspect Framework and  Analysis”

REFERENCES

[1] J. P. Diguet, S. Evain, R. Vaslin, G. Gogniat, and E. Juin. NoC-centric security of reconfigurable soc. In Proceedings of the First International Symposium on Networks-on-Chip(NOCS’07), May 7-9 2007.

[2] S. Evainand J. Diguet. From NoC security analysis to design solutions. In IEEE Workshop on Signal Processing Systems Design and Implementation, pages 166-171 , 2005.

[3] L.Fiorin, C. Silvano and M.Sami. Security Aspect in NoC: Overview and Proposal for Secure implementations. 10th Euromicro Conference on Digital System Design architectures, Methods and Tools. (DSD 2007)

Page 29: Networks on Chips Security “Aspect Framework and  Analysis”

THANK YOU

Anurag JainB. Tech 2005