首页> 外文会议>European Conference on Circuit Theory and Design >On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology
【24h】

On the Integration of Physically Unclonable Functions into ARM TrustZone Security Technology

机译:关于物理上无法克隆的功能到ARM TrustZone安全技术中的集成

获取原文
获取外文期刊封面目录资料

摘要

As Internet of Things (IoT) devices are increasingly used in industry and become further integrated into our daily lives the security of such devices is of paramount concern. Ensuring that the large amount of information that these devices collect is protected and only accessible to authenticated users is a critical requirement of the industry. One potentially inexpensive way to improve device security utilises a Physically Unclonable Function (PUF) to generate a unique random response per device. This random response can be generated in such a way that it can be regenerated reliably and repeatably allowing the response to be considered a signature for each device. This signature could then be used for authentication or key generation purposes, improving trust in IoT devices. The advantage of a PUF based system is that the response does not need to be stored in nonvolatile memory as it is regenerated on demand, hardening the system against physical attacks. With SoC FPGAs being inexpensive and widely available there is potential for their use in both industrial and consumer applications as an additional layer of hardware security. In this paper we investigate and implement a Trusted Execution Environment (TEE) based around a PUF solely implemented in the FPGA fabric on a Xilinx Zynq-7000 SoC FPGA. The PUF response is used to seed a generic entropy maximisation function or Pseudorandom Number Generator (PRNG) with a system controller capable of encrypting data to be useful only to the device. This system interacts with a software platform running in the ARM TrustZone on the ARM Cortex core in the SoC, which handles requests between user programs and the FPGA. The proposed PUF-based security module can generate unique random keys able to pass all NIST tests and protects against physical attacks on buses and nonvolatile memories. These improvements are achieved at a cost of fewer than half the resources on the Zynq-7000 SoC FPGA.
机译:随着物联网(IoT)设备在工业中的使用越来越广泛,并进一步集成到我们的日常生活中,此类设备的安全性至关重要。确保这些设备收集的大量信息受到保护,并且只有经过身份验证的用户才能访问,这是行业的一项关键要求。一种提高设备安全性的潜在廉价方法是利用物理上不可克隆的功能(PUF)在每个设备上生成唯一的随机响应。可以以可靠且可重复的方式生成此随机响应的方式来生成该随机响应,从而将该响应视为每个设备的签名。然后,可以将此签名用于身份验证或密钥生成目的,从而提高对IoT设备的信任度。基于PUF的系统的优点是,响应可以按需重新生成,因此无需将其存储在非易失性存储器中,从而使系统可以抵御物理攻击。由于SoC FPGA价格低廉且可广泛使用,因此有可能在工业和消费类应用中将其用作附加的硬件安全层。在本文中,我们研究和实现了一个基于PUF的受信任执行环境(TEE),该PUF仅在Xilinx Zynq-7000 SoC FPGA的FPGA架构中实现。 PUF响应用于将通用熵最大化函数或伪随机数生成器(PRNG)与系统控制器一起播种,该系统控制器能够加密仅对设备有用的数据。该系统与SoC的ARM Cortex内核上的ARM TrustZone中运行的软件平台进行交互,该软件平台处理用户程序与FPGA之间的请求。提议的基于PUF的安全模块可以生成能够通过所有NIST测试的唯一随机密钥,并防止对总线和非易失性存储器的物理攻击。这些改进的实现成本不到Zynq-7000 SoC FPGA的一半。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号