1 / 1

Adaptive Security and Separation in Reconfigurable Hardware

DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. DRAM. μ P. μ P. μ P. μ P. http://www.cs.ucsb.edu/~sherwood/RCsec/. Adaptive Security and Separation in Reconfigurable Hardware

meagan
Download Presentation

Adaptive Security and Separation in Reconfigurable Hardware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DRAM DRAM DRAM DRAM DRAM DRAM DRAM DRAM DRAM DRAM DRAM DRAM μP μP μP μP http://www.cs.ucsb.edu/~sherwood/RCsec/ • Adaptive Security and Separation in Reconfigurable Hardware • Reconfigurable Systems are embedded in everything from the NASA Mars Rover to wireless access points. Unfortunately this hardware malleability can be twisted to disrupt critical operations, snoop on supposedly secure channels, or even to physically melt a device. To enable a new class of system that is both reconfigurable and secure, three important areas need to be addressed: logic, memory, and dynamic policy management. FPGA Fabric FPGA chip SDRAM (offchip) Threats Chip Melting IP Theft DoS Interference Snooping BRAM BRAM BRAM BRAM SRAM Block FPGA Fabric BRAM BRAM BRAM BRAM Reconfigurable Policy Enforcement While reconfigurability creates problems as described above, it also creates opportunities: in particular the opportunity for hardware enforcement of adaptive security policies. In an emergency, trusted individuals may need to override the nominal security policy. The reconfigurable component may provide a highly trusted mechanism for secure functionality in changing environments. Thus a key aspect of our work is in establishing a firm foundation for trustworthy dynamic policy enforcement through ontological analysis and formal modeling. Logic Separation Reconfigurable Memory Protection The problem does not stop at memory management. In reconfigurable systems the logic of the hardware can be changed, which opens a host of problems that have no easy analogs in the software domain. For example, configurations can be loaded that cause short circuits or even meltdown. Secret data may need to share the same chip as untrusted intellectual property which has the potential to improperly impede or probe the device. New methods are needed that can statically validate these configurations. Virtual Memory is frequently employed as a security enforcement mechanism; however, it is all but non-existent on embedded systems. Although a TLB-like structure could be constructed out of the logic blocks that populate a modern reconfigurable device, our approach is to rethink the way that embedded memory is protected and shared. With reconfigurable hardware we can implement test example enforcement mechanisms and reason formally as to their security.

More Related