16
Threats and Challenges in FPGA Security Ted Huffmire Naval Postgraduate School December 10, 2008

Threats and Challenges in FPGA Security

Embed Size (px)

DESCRIPTION

Threats and Challenges in FPGA Security. Ted Huffmire Naval Postgraduate School December 10, 2008. Overview. Problem Areas. Foundry Trust. Physical Attacks. Design Tools. Design Theft. System Assurance. Attacks. Trojan horse Backdoor Kill switch. Probing Sand and Scan - PowerPoint PPT Presentation

Citation preview

Page 1: Threats and Challenges in FPGA Security

Threats and Challenges in FPGA Security

Ted Huffmire

Naval Postgraduate School

December 10, 2008

Page 2: Threats and Challenges in FPGA Security

Overview

FoundryTrust

PhysicalAttacks

DesignTools

DesignTheft

Problem Areas

Attacks

Trojan horseBackdoorKill switch

ProbingSand and ScanSide Channels

Data Remanence

Covert channelsSide channels

Bypass

CloningReverse engineerReadback attack

SolutionsTrusted foundries

FPGAsX-Ray InspectionSand and Scan

Tamper sensingAdding noiseDegaussing

Logical isolationTracing wiresSanitization

Continuous powerEncrypt bitstream

WatermarkingAuthentication

Future Research

All of supply chainLessons from S/W

Red teamsSide channels

Trusted toolsVerificationLanguages

CM

High-assurancePartial reconfig

PUFs

High-assuranceCMPs

TaggingDynamic security

Reference monitorDefense in depth

User trainingSecurity usability

DoSAuthentication

Complex designs

SystemAssurance

Page 3: Threats and Challenges in FPGA Security

Reconfigurable Hardware

FPGA Chip

SDRAM (off-chip)

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

Re

feren

ceM

on

itor

Crypto Core

CPU Core

CPU Core

AES

μP

μP

Page 4: Threats and Challenges in FPGA Security

Protection Alternatives

Separation Kernels

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

app1 app3app2

kernel

Separate Processors

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

gatekeeper

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

gatekeeper

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

gatekeeper

app1app3 app2

Reconfigurable Protection

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM app1

app2

app3

Reference

Monitor

Physical Software

Spatial Temporal

Page 5: Threats and Challenges in FPGA Security

Design Flows

Page 6: Threats and Challenges in FPGA Security

Intertwined Cores

Page 7: Threats and Challenges in FPGA Security

Moats

FPGA Chip

SDRAM (off-chip)

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

Re

feren

ceM

on

itor

Crypto Core

CPU Core

CPU Core

AESAES

Page 8: Threats and Challenges in FPGA Security

Moats 1.0

Page 9: Threats and Challenges in FPGA Security

Moats 2.0

Page 10: Threats and Challenges in FPGA Security

Moats and Drawbridges

Page 11: Threats and Challenges in FPGA Security

Interconnect Tracing

FPGA Chip

SDRAM (off-chip)

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

Re

feren

ceM

on

itor

Crypto Core

CPU Core

CPU Core

AES

μP

μP

XX

Page 12: Threats and Challenges in FPGA Security

Communication Architecture

FPGA Chip

SDRAM (off-chip)

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

Arb

iter/R

efere

nce M

onitor Crypto Core

CPU Core

CPU Core

AES

μP

μP

Page 13: Threats and Challenges in FPGA Security

Memory Protection

FPGA Chip

SDRAM (off-chip)

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

DRAM

Crypto Core

CPU Core

CPU Core

AESAES

Re

feren

ce M

on

itor

X

XR

eference Monitor

Page 14: Threats and Challenges in FPGA Security

Policy Compiler

Page 15: Threats and Challenges in FPGA Security

SoC Application

Page 16: Threats and Challenges in FPGA Security

Questions?

http://faculty.nps.edu/tdhuffmi