RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department.

Slides:



Advertisements
Similar presentations
Optimization of Parallel Task Execution on the Adaptive Reconfigurable Group Organized Computing System Presenter: Lev Kirischian Department of Electrical.
Advertisements

FPGA (Field Programmable Gate Array)
© 2003 Xilinx, Inc. All Rights Reserved Course Wrap Up DSP Design Flow.
Transmission Security via Fast Time-Frequency Hopping PI: Eli Yablanovich Co-PIs: Rick Wesel Ingrid Verbauwhede Ming Wu Bahram Jalali UCLA Electrical.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
TIE Extensions for Cryptographic Acceleration Charles-Henri Gros Alan Keefer Ankur Singla.
Autonomic Systems Justin Moles, Winter 2006 Enabling autonomic behavior in systems software with hot swapping Paper by: J. Appavoo, et al. Presentation.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
Cryptanalysis on FPGA Based Hardware
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
FPGA Implementation of Closed-Loop Control System for Small-Scale Robot.
Exploring timing based side channel attacks against i CCMP Suman Jana, Sneha K. Kasera University of Utah Introduction
Department of Electrical and Computer Engineering Configurable computing for high-security/high-performance ambient systems 1 Guy Gogniat, Lilian Bossuet,
Guy Gogniat, Jean Philippe Diguet,Romain Vaslin,Tilman Wolf, Wayne Burleson, Lilian Bossuet University of South Britanny, University of Massachusetts,
1 Multi - Core fast Communication for SoPC Multi - Core fast Communication for SoPC Technion – Israel Institute of Technology Department of Electrical.
Security Considerations in Adaptive Middleware Security and Mobile Agents Ajanta – Mobile Agent’s research project papers (
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
UCB November 8, 2001 Krishna V Palem Proceler Inc. Customization Using Variable Instruction Sets Krishna V Palem CTO Proceler Inc.
Radu Muresan CODES+ISSS'04, September 8-10, 2004, Stockholm, Sweden1 Current Flattening in Software and Hardware for Security Applications Authors: R.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
Study of AES Encryption/Decription Optimizations Nathan Windels.
Juanjo Noguera Xilinx Research Labs Dublin, Ireland Ahmed Al-Wattar Irwin O. Irwin O. Kennedy Alcatel-Lucent Dublin, Ireland.
The 1st European NetFPGA Developers Workshop Design Remote Reconfiguration Supported Security Protection System on NetFPGA and Virtex5 Kai Zhang, Xiaoming.
Chapter 2 Operating System Overview Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical.
February 12, 1998 Aman Sareen DPGA-Coupled Microprocessors Commodity IC’s for the Early 21st Century by Aman Sareen School of Electrical Engineering and.
1 Miodrag Bolic ARCHITECTURES FOR EFFICIENT IMPLEMENTATION OF PARTICLE FILTERS Department of Electrical and Computer Engineering Stony Brook University.
Tufts Wireless Laboratory School Of Engineering Tufts University “Network QoS Management in Cyber-Physical Systems” Nicole Ng 9/16/20151 by Feng Xia, Longhua.
Introduction to information systems
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Architectures for mobile and wireless systems Ese 566 Report 1 Hui Zhang Preethi Karthik.
Additional Security Tools Lesson 15. Skills Matrix.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Hardware Assisted Control Flow Obfuscation for Embedded Processors Xiaoton Zhuang, Tao Zhang, Hsien-Hsin S. Lee, Santosh Pande HIDE: An Infrastructure.
Embedding Constraint Satisfaction using Parallel Soft-Core Processors on FPGAs Prasad Subramanian, Brandon Eames, Department of Electrical Engineering,
Trusted ILLIAC - A Configurable, Application-Aware, High-Performance Platform for Trustworthy Computing Ravishankar Iyer, Wen-mei Hwu, Klara Nahrstedt,
Swankoski MAPLD 2005 / B103 1 Dynamic High-Performance Multi-Mode Architectures for AES Encryption Eric Swankoski Naval Research Lab Vijay Narayanan Penn.
Design Space Exploration for Application Specific FPGAs in System-on-a-Chip Designs Mark Hammerquist, Roman Lysecky Department of Electrical and Computer.
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
Title of Selected Paper: IMPRES: Integrated Monitoring for Processor Reliability and Security Authors: Roshan G. Ragel and Sri Parameswaran Presented by:
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
R ECONFIGURABLE H ARDWARE FOR H IGH - SECURITY /H IGH -P ERFORMANCE E MBEDDED S YSTEMS : T HE SAFES P ERSPECTIVE Guy Gogniat, Tilman Wolf, Wayne Burleson,
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
A Biased Fault Attack on the Time Redundancy Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen and Debdeep Mukhopadhyay.
DSP Architectures Additional Slides Professor S. Srinivasan Electrical Engineering Department I.I.T.-Madras, Chennai –
FPGA Implementation of RC6 including key schedule Hunar Qadir Fouad Ramia.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Review of Parnas’ Criteria for Decomposing Systems into Modules Zheng Wang, Yuan Zhang Michigan State University 04/19/2002.
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
VADA Lab.SungKyunKwan Univ. 1 L5:Lower Power Architecture Design 성균관대학교 조 준 동 교수
1 Operating System Overview Chapter 2. 2 Operating System A program that controls the execution of application programs An interface between applications.
Page 1 2P13 Week 1. Page 2 Page 3 Page 4 Page 5.
1 Decentralized Adaptive Voltage Control with Distributed Energy Resources Presenter: Huijuan Li.
A Framework For Trusted Instruction Execution Via Basic Block Signature Verification Milena Milenković, Aleksandar Milenković, and Emil Jovanov Electrical.
Overview on Hardware Security
Hiba Tariq School of Engineering
New Cache Designs for Thwarting Cache-based Side Channel Attacks
Sindhusha Doddapaneni
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Anne Pratoomtong ECE734, Spring2002
Protect Your Hardware from Hacking and Theft
Dynamic High-Performance Multi-Mode Architectures for AES Encryption
Reconfigurable Computing University of Arkansas
Chapter 2 Operating System Overview
Hash Function Requirements
Counter Mode, Output Feedback Mode
Presentation transcript:

RRB/STS ORNL Workshop Integrated Hardware/Software Security Support R. R. BrooksSam T. Sander Associate ProfessorAssistant Professor Holcombe Department of Electrical and Computer Engineering Clemson University Clemson, SC Tel Fax

RRB/STS ORNL Workshop FPGA security enforcement DAG access with hardware enforcement

RRB/STS ORNL Workshop Differential Power Analysis Using statistic method in order break the secret key Using several runs on several sample inputs, for instance 1000 sample inputs An attacker guesses a particular key and based on that key he can determines a theoretical value for one of the intermediate bits generated by the program

RRB/STS ORNL Workshop Dataflow Analysis a = …… b = a …f = …… d = b … c = …… e = …… g = …… h = b Assume: “a” is the variable that holds secret information a = …… b = a … d = b … h = b

RRB/STS ORNL Workshop Differential Power Analysis Vulnerability

RRB/STS ORNL Workshop

Conclusions Since we do not hide the energy behavior of all instructions, our approach consumes less energy overhead than other approaches Our approach has 83% less energy overhead than dual-rail logic

RRB/STS ORNL Workshop Overview of Symmetric Encryption Architectures The dotted lines indicate the smallest subset of hardware capable of performing a single encryption. Features to note: –Parallel architectures have multiple key schedulers. This is both an advantage and a disadvantage. –Parallel architectures employ feedback routing.

RRB/STS ORNL Workshop Encryption Implementations – AES Industry & Published Results: –Helsinki University of Technology: Virtex-II Pipelined: 17.8 Gbps –Helion Technology: Spartan-3 Pipelined: 10.0 Gbps Virtex-II Pro Pipelined: 16.0 Gbps ASIC Pipelined: 25.0 Gbps Single Spartan-3: 1.0 Gbps Single Virtex-II Pro: 1.7 Gbps

RRB/STS ORNL Workshop Encryption Implementations – AES

RRB/STS ORNL Workshop FPGA Security Concerns Differential Power Analysis –Published Solutions Selective dual-rail logic –Use dual-rail logic to create a uniform power profile for sensitive operations. Only minimal additional energy is consumed as dual-rail operations are not always employed. Power supply noise injection –Obfuscates the power profile by adding random noise to the supply voltage within a specific range. Maintains functionality while making differential power analysis practically infeasible. Both are good solutions

RRB/STS ORNL Workshop FPGA Security Concerns Parallel Advantages –Irregular power profile Variable number of simultaneous encryptions Variable number of different keys Variable number of active modules Variable number of implemented modules –Dynamic key values Within each encryption module, both the key data and the encryption data are changed dynamically –Differential power analysis becomes practically infeasible

RRB/STS ORNL Workshop Conclusions A number of physical attacks exist: Power analysis Bit flipping Pure software solutions can not address them Pure hardware solutions can have prohibitive resource requirements (power, heat). Integrated compiler / instruction set support needed Hardware support essential for necessary throughput (ex. Symmetric encryption) Fixed hardware architecture can not adapt to varying system needs (ex. Number of processes requiring encryption.) Reconfigurable hardware architectures are attractive. Hierarchical verification possible. Isolating processes can take many forms (spatial, logical, temporal).