Addressing Supply Chain Security with Split Manufacturing Ted Huffmire Summer UCI CECS Seminar July 27, 2012.

Slides:



Advertisements
Similar presentations
1 Implementing an Untrusted Operating System on Trusted Hardware David Lie Chandramohan A. Thekkath Mark Horowitz University of Toronto, Microsoft Research,
Advertisements

1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
A reconfigurable system featuring dynamically extensible embedded microprocessor, FPGA, and customizable I/O Borgatti, M. Lertora, F. Foret, B. Cali, L.
 Alexandra Constantin  James Cook  Anindya De Computer Science, UC Berkeley.
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Memory Chapter 3. Slide 2 of 14Chapter 1 Objectives  Explain the types of memory  Explain the types of RAM  Explain the working of the RAM  List the.
Programmable Logic Devices
Fault Detection in a HW/SW CoDesign Environment Prepared by A. Gaye Soykök.
Architecture Support for Security Peter Chapman Michael Maass.
SDN and Openflow.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
3Dsec: Trustworthy System Security through 3-D Integrated Hardware Ted Huffmire 14 January 2009.
3D-MAPS: 3D Massively Parallel Processor with Stacked Memory Dae Hyun Kim, Krit Athikulwongse, Michael Healy, Mohammad Hossain, Moongon Jung, et al. Georgia.
Week 1- Fall 2009 Dr. Kimberly E. Newman University of Colorado.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
1 HW/SW Partitioning Embedded Systems Design. 2 Hardware/Software Codesign “Exploration of the system design space formed by combinations of hardware.
OCIN Workshop Wrapup Bill Dally. Thanks To Funding –NSF - Timothy Pinkston, Federica Darema, Mike Foster –UC Discovery Program Organization –Jane Klickman,
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Configurable System-on-Chip: Xilinx EDK
CAD and Design Tools for On- Chip Networks Luca Benini, Mark Hummel, Olav Lysne, Li-Shiuan Peh, Li Shang, Mithuna Thottethodi,
Research Directions for On-chip Network Microarchitectures Luca Carloni, Steve Keckler, Robert Mullins, Vijay Narayanan, Steve Reinhardt, Michael Taylor.
Host Intrusion Prevention Systems & Beyond
Dynamic Hardware Software Partitioning A First Approach Komal Kasat Nalini Kumar Gaurav Chitroda.
Digital Circuit Implementation. Wafers and Chips  Integrated circuit (IC) chips are manufactured on silicon wafers  Transistors are placed on the wafers.
GallagherP188/MAPLD20041 Accelerating DSP Algorithms Using FPGAs Sean Gallagher DSP Specialist Xilinx Inc.
On-Chip Control Flow Integrity Check for Real Time Embedded Systems Fardin Abdi Taghi Abad, Joel Van Der Woude, Yi Lu, Stanley Bak, Marco Caccamo, Lui.
- 1 - A Powerful Dual-mode IP core for a/b Wireless LANs.
Computer performance.
Technion – Israel Institute of Technology Department of Electrical Engineering High Speed Digital Systems Lab Spring 2009.
Ross Brennan On the Introduction of Reconfigurable Hardware into Computer Architecture Education Ross Brennan
CSCE 548 Secure Software Development Risk-Based Security Testing.
ECE 526 – Network Processing Systems Design Network Processor Architecture and Scalability Chapter 13,14: D. E. Comer.
Hardware Trust Implications of 3-D Integration Ted Huffmire (NPS), Timothy Levin (NPS), Michael Bilzor (NPS), Cynthia E. Irvine (NPS), Jonathan Valamehr.
Introspective 3D Chips S. Mysore, B. Agrawal, N. Srivastava, S. Lin, K. Banerjee, T. Sherwood (UCSB), ASPLOS 2006 Shimin Chen (LBA Reading Group Presentation)
A 3D Data Transformation Processor Dimitrios Megas, Kleber Pizolato, Timothy Levin, and Ted Huffmire WESS 2012 October 11, 2012.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
1 Fault Tolerance in the Nonstop Cyclone System By Scott Chan Robert Jardine Presented by Phuc Nguyen.
1 3-General Purpose Processors: Altera Nios II 2 Altera Nios II processor A 32-bit soft core processor from Altera Comes in three cores: Fast, Standard,
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
IVEC: Off-Chip Memory Integrity Protection for Both Security and Reliability Ruirui Huang, G. Edward Suh Cornell University.
Threats and Challenges in FPGA Security Ted Huffmire Naval Postgraduate School December 10, 2008.
J. Christiansen, CERN - EP/MIC
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
Jump to first page One-gigabit Router Oskar E. Bruening and Cemal Akcaba Advisor: Prof. Agarwal.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
MAPLD 2005/254C. Papachristou 1 Reconfigurable and Evolvable Hardware Fabric Chris Papachristou, Frank Wolff Robert Ewing Electrical Engineering & Computer.
Moats and Drawbridges: An Isolation Primitive for Reconfigurable Hardware Based Systems Ted Huffmire, Brett Brotherton, Gang Wang, Timothy Sherwood, Ryan.
Lecture 12: Reconfigurable Systems II October 20, 2004 ECE 697F Reconfigurable Computing Lecture 12 Reconfigurable Systems II: Exploring Programmable Systems.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
Operating Systems Security
Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation.
1 Device Controller I/O units typically consist of A mechanical component: the device itself An electronic component: the device controller or adapter.
2014 Redefining the Data Center: White-Box Networking Jennifer Casella October 9, 2014 #GHC
Programmable Logic Devices
Improving Multi-Core Performance Using Mixed-Cell Cache Architecture
CSCE 548 Secure Software Development Risk-Based Security Testing
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Architecture & Organization 1
What happens inside a CPU?
FPGA: Real needs and limits
Architecture & Organization 1
Protect Your Hardware from Hacking and Theft
Characteristics of Reconfigurable Hardware
Sai Krishna Deepak Maram, CS 6410
Shielding applications from an untrusted cloud with Haven
Co-designed Virtual Machines for Reliable Computer Systems
Presentation transcript:

Addressing Supply Chain Security with Split Manufacturing Ted Huffmire Summer UCI CECS Seminar July 27, 2012

Disclaimer The views presented in this talk are those of the speaker and do not necessarily reflect the views of the United States Department of Defense.

Outline Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

What is Hardware Security? Many of the issues of hardware security are similar to traditional computer security –Malware, authentication, program analysis, patches, insiders, social engineering, developmental attacks, evaluation, certification and accreditation, flawed implementations, protocols, system-level issues, network security, usability, economic incentives, complexity. Anything can be hacked, but the attacker has finite resources. –Shades of grey rather than black-and-white (“broken” or not) –Make attackers toil, and design systems that “win” decisively –Each security technique has its advantages and disadvantages, and we must understand each technique's limitations. Even crypto has limitations. We need to know what specific attacks each technique is capable of preventing.

What is Hardware Security? Opportunities of hardware –High performance Custom processors for crypto, deep packet inspection, etc. –Direct control –No intermediate OS layers –Physical separation Challenges –Semantic gap –Engineering and fabrication costs

What is Hardware Security? Foundry Trust –Malicious Hardware (a.k.a. “gate-ware”) Trojan Horse, Rootkit, Kill Switch –Design Theft (Protecting Intellectual Property) –Start with a secure design before addressing fabrication security Operational Attacks –Power Analysis, Fault Injection, Heating, Optical –Cold Boot, Probing, Math Errors Developmental Attacks –Malicious Design Tools –Malicious IP System Assurance –Security Architecture, Key Management, PUFs –Formal analysis of IP cores (not a panacea)

What is Hardware Security? Interfaces [Schaumont 2009] –Secure hardware is part of a bigger system. –Secure hardware interfaces are tricky: How do you distinguish red wires from black wires? –Secure hardware interfaces do not exist yet! –Current secure hardware serves software Composition [Schaumont 2009] –This is not trivial. –To resist side channels, you must avoid redundancy. –However, fault tolerance requires increasing redundancy. –How can you build fault-tolerant, side channel resistant systems? Metrics [Schaumont 2009] –Security is dimensionless. –Metrics are absolutely necessary to do meaningful research. –Without metrics, it is impossible to analyze trade-offs. Education: Electrical Engineers are trained to make things happen rather than to make bad things NOT happen [Schaumont 2009]

Trustworthy Tools and IP Stripped-down alternative design flow

Option 1 Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

Tradeoffs Software vs. Hardware – Generality vs. performance – FPGAs are in between ASIC performance comes at a high NRE cost – Fabrication – Verification Security – IP is vulnerable in overseas foundries – Reduce problem of trusting foundry to problem of trusting FPGA CPU ASIC FPGA General-PurposeApplication-Specific

Option 0? Running software on a CPU – Software is loaded onto the CPU in a secure facility after fabrication Coprocessor – One chip is manufactured in a trusted foundry; the other in an overseas foundry – The two reside on the same circuit board

Reconfigurable Hardware FPGA Fabric SDRAM (off-chip) DRAM FPGA chip μPμP μPμP μPμP μPμP SRAM Block BRAM FPGA Fabric

Trusted Design in FPGAs Source: [Trimberger 2007]

Option 2 Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

2D Split Manufacturing Design in the US Fabricate through the first or second metal layer at an insecure facility Finish the metal layers 2 through 12 in a trusted facility

2D Split Manufacturing To achieve this, the IARPA TIC Program will use a FEOL and BEOL set of processes – FEOL = Front End of Line – BEOL = Back End of Line The final ASIC is the result of the combined FEOL and BEOL processes

2D Split Manufacturing Questions – What is the interface?

2D Split Manufacturing Source – – posers_Day_ pdf

Option 3 Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

[Koyanagi05]

[Koyanagi05] Timeline

Alternative 3-D Approaches PoP [Lim10] Wire Bonding (SiP) [Amkor09]

Alternative 3-D Approaches PoP [Lim10]

Alternative 3-D Approaches [Amkor10]

Examples of 3-D Systems Network-on-Chip [Kim07]

Examples of 3-D Systems Network-on-Chip [Kim07]

Examples of 3-D Systems Particle Physics [Demarteau09]

Examples of 3-D Systems Chip Scale Camera Module [Yoshikawa09]

Examples of 3-D Systems 3D-PIC 3-D CMOS Imager [Chang10]

Examples of 3-D Systems 3-D Stacked Retinal Chip [Kaiho09]

Examples of 3-D Systems 3-D Stacked Retinal Chip [Koyanagi05]

Medical Image Processing [Cong 2011]

Examples of 3-D Systems 3-D FPGAs [Razavi09]

Examples of 3-D Systems 3D-MAPS: Many-core 3-D Processor with Stacked Memory [Lim10]

Some Data on 3D [Kim 2012] 64 CPU cores joined with 256K of SRAM: 63.8GB/s memory bandwidth [Yoshikawa 2009] CMOS image sensor: 55% reduction in volume and 36% reduction in footprint [Loh 2007] 3D floor plan for Pentium 4: 15% improvement in performance and power; 10.3% improvement in clock frequency for Alpha 21364; 3D version of dynamic non-uniform cache architecture reduces L2 access time by 50%; 3D stacking can allow the cache size to increase, reducing average memory access latency by 13% and reducing off-chip bandwidth by 3x [Black 2006] 3D stacked DRAM cache can reduce cycles per memory access by 13% on average and by as much as 55% while reducing off-chip bandwidth and power by 55% [Loh 2008] Optimizations to 3D DRAM that result in 1.75x speedup over prior 3D- DRAM approaches; L2 miss handling architecture that achieves an extra 17.8% performance improvement [Puttaswamy 2005] 3D-partitioned cache can reduce latency by 21.5%, reduce energy consumption by 30.9%, and increase IPC by 12%.

What is 3Dsec? Economics of High Assurance –High NRE Cost, Low Volume –Gap between DoD and Commercial Disentangle security from the COTS –Use a separate chip for security –Use 3-D Integration to combine: 3-D Control Plane Computation Plane –Need to add posts to the COTS chip design Dual use of computation plane

Trustworthy System Security through 3-D Integrated Hardware 3DSec : Security Layer Processor Layer Cross Section Post Silicon Layer 2 Silicon Layer 1 Goal: Build trustworthy systems using commercial hardware components Problem: Integrating specialized security mechanisms is too costly for hardware vendors Idea: Augment commodity hardware after fabrication with a separate layer of security circuitry Anticipated Benefits: Configurable, protected, low-cost hardware security controls that can override activity in the commodity hardware Privacy Applications: Detect and intercept the execution of malicious code Prevent the microprocessor internals from being exploited to leak crypto keys Tag and Track private information as it flows through a processor

Pro’s and Con’s Why not use a co-processor? On-chip? Pro’s –High bandwidth and low latency –Controlled lineage –Direct access to internal structures Con’s –Thermal and cooling –Design and testing –Manufacturing yield

Cost Cost of fabricating systems with 3-D –Fabricating and testing the security layer –Bonding it to the host layer –Fabricating the vias –Testing the joined unit

Circuit-Level Modifications Passive vs. Active Monitoring Tapping Re-routing Overriding Disabling

3-D Application Classes Enhancement of native functions Secure alternate service Isolation and protection Passive monitoring –Information flow tracking –Runtime correctness checks –Runtime security auditing

Self-Protection and Dependency Layering Can a 3-D control plane provide useful secure services when it is conjoined with an untrustworthy computation plane? Yes, provided: –Self-protection –Dependency Layering Applies to overseas foundry –Option 1: FPGA fabric –Option 2: FEOL layer(s) –Option 3: computation plane

Conclusions and Future Work Motivation and Background Option 1: Reconfigurable Hardware Option 2: 2D Split Manufacturing Option 3: 3D Split Manufacturing Conclusions and Future Work

Conclusions Option 1 – Design never goes to foundry – Simple and inexpensive – Bit-stream decryption mechanism is vulnerable to side channel attack on fielded device. – Caution: Attacker can cause serious harm by modifying the FPGA fabric even without knowledge of the final design to be loaded onto the FPGA

Conclusions Option 2 – Only BEOL knows connections between devices made in FEOL stage – What is the interface between FEOL, BEOL? – Cost? Complexity? Feasibility? – Caution: Attacker can cause serious harm by modifying FEOL layer(s) even without knowledge of BEOL layers.

Conclusions Option 3 – Computation plane manufactured in untrusted foundry, control plane manufactured in trusted foundry – Caution: attacker can cause harm by modifying computation plane even without knowledge of control plane.

Conclusions Option 3 – 3D probing for testing purposes is harder for 3D than for 2D – It is not trivial to chemically remove package of 3DIC, break bond between tiers, and tap the TSVs – Tiers are tightly bonded and have no exposed shared buses or I/O pins – Future work: secure protocols between tiers

Conclusions Option 2 vs. Option 3 – Both are challenging. What is the interface? – Option 2: Can we depend on untrusted FEOL devices? Can we protect ourselves from them? Can same FEOL wafer design be used for many different BEOL designs? Can we tap, override, disable, reroute, etc.? Can we decouple security and non-security functionality? – Option 3: Can we use untrusted computation plane? Can we protect ourselves from them? Can same computation plane be used with many different control planes (or alone)?

Split Manufacturing Discussion Points – Can we trust the result of split manufacturing? – Could this approach harm security? – What are the challenges of 2D? – What are the challenges of 3D? – Is it worth it? When is it worth it? – Why not use trusted foundry always? – Are trusted foundries a band aid solution to offshoring trend? – Can we do everything from scratch?

Questions? faculty.nps.edu/tdhuffmi

Additional Slides Additional slides

Split Manufacturing 2-D 3-D

Face-to-Back Bonding Rerouting bus signals