首页> 外文期刊>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems >Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip
【24h】

Toward Hardware-Based IP Vulnerability Detection and Post-Deployment Patching in Systems-on-Chip

机译:在片上基于硬件的IP漏洞检测和部署后修补

获取原文
获取原文并翻译 | 示例

摘要

System integrators create heterogeneous systems-on-chip (SoCs) by integrating numerous third-party intellectual property blocks (3PIPs) to achieve application-specific design goals. With increasing intellectual property (IP) complexity, 3PIPs can suffer from hardware bugs or they can inadvertently introduce other software-exploitable security threats to the SoC. To ensure the ongoing survivability of new SoCs, we need infrastructure for patching newly discovered IP issues after an SoC has been deployed. To address the increasing risks from 3PIPs, we explore the feasibility and limitations of implementing monitoring and mitigation capabilities in hardware. Our proposed monitoring and mitigation patch (MoP) blocks provide a defensive foundation against critical IP-centric issues, focusing on situations where a system integrator only has interface-level visibility of 3PIP designs. The MoPs are distributed throughout the SoC to monitor and mitigate issues directly in hardware and transparently for potentially compromised software-the MoPs are resilient against run-time compromised software and firmware. We ensure that these monitors are reconfigurable after deployment by implementing them using embedded-FPGAs or as a reprogrammable, fixed-design module. We perform a case study of numerous IP-types and model a selection of security-relevant issues and bugs in the IPs, exploring the relative complexity and potential resource overhead. Our study shows the utility of our proposed approach, with MoP blocks requiring less than similar to 1.5% of the adaptive logic modules (ALMs) in a Cyclone V FPGA for interface monitoring and issue mitigation per IP.
机译:系统集成商通过集成众多第三方知识产权块(3PIPS)来实现异构系统的片上(SOC)以实现特定于应用的设计目标。随着知识产权(IP)复杂性的增加,3PPIP可能会遭受硬件错误,或者他们可以无意中向SOC引入其他软件可利用的安全威胁。为确保新SOC的持续生存性,我们需要在部署SOC后修补新发现的IP问题的基础架构。为满足3级的风险越来越大,我们探讨了在硬件中实施监控和缓解能力的可行性和限制。我们建议的监测和缓解补丁(MOP)块为严格的知识产权问题提供了防守基础,专注于系统集成商仅具有3PIP设计的接口级别可见度的情况。 MOP分布在整个SOC中,以便在硬件中直接监控和缓解问题,并且透明地用于潜在受损的软件 - MOPS是针对运行时受损软件和固件的弹性。我们确保通过使用嵌入式FPGA或作为可重新编程的固定设计模块来实现这些监视器在部署后重新配置。我们在IP中执行了众多IP类型和模型的案例研究,并在IPS中选择了安全相关问题和错误,探索了相对复杂性和潜在资源开销。我们的研究显示了我们所提出的方法的效用,拖把块需要较低的摩托车V FPGA中的自适应逻辑模块(ALMS)的1.5%,用于接口监控和每IP发出缓解。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号