Secure architecture in embedded systems: an overview Romain Vaslin, Guy Gogniat, Jean-Philippe Diguet ´ ` ´ CNRS FRE 2734 Laboratoire d’Electronique des Systemes TEmps Reel Universite´ de Bretagne Sud
Cryptarchi 2006
Romain Vaslin 1
Secure architecture in embedded systems: an overview
Introduction
Introduction
Security in embedded systems : essential issue for external communication and architecture core New attacks due to the specific field (hardware and software attacks) We need adapted solutions : Security solutions Architecture solutions
Romain Vaslin 2
Secure architecture in embedded systems: an overview
Introduction
Summary 1
Hardware and software attacks on embedded systems Hardware attacks Software attacks
2
Processor-based solutions Constraints on embedded systems & context Existing Processor-based solutions
3
(Re)configurable hardware architectures Dedicated processor (Re)configurable architectures Interests and limitations of existing solutions
4
Configurable coprocessor-based architecture Outline of our approach An example : a coprocessor dedicated to hash Romain Vaslin 3
Secure architecture in embedded systems: an overview
Software attacks Definitions Virus : malicious program which needs the human help to infect a system and to spread (duplicate) Worms : autonomous virus
Romain Vaslin 8
Secure architecture in embedded systems: an overview
Dedicated processor (Re)configurable architectures Interests and limitations of existing solutions
Dedicated processor Features of a dedicated processor Specific instruction-set Specific execution unit Example DSP architecture : instruction MAC Ciphering architecture (cryptomaniac a , cryptonite b ) : modular exponentiation a
Lisa Wu, Chris Weaver and Todd Austin, CryptoManiac : a fast flexible architecture for secure communication, Proceedings
of the 28th annual international symposium on Computer architecture, 2001 b Rainer Buchty, Nevin Heintze, and Dino Oliva, Cryptonite A Programmable Crypto Processor Architecture for High-Bandwidth Applications, 2004
Romain Vaslin 17
Secure architecture in embedded systems: an overview
Dedicated processor (Re)configurable architectures Interests and limitations of existing solutions
(Re)configurable architecture Different kind of architecture (Re)configuration at design time : Xtensa architecture (Tensilica), Xirisc (Re)configuration at runtime : Stretch architecture
Solutions performances Xirisc : DES speedup by 13 Xtensa : MD5 and AES speedup by 1.7 Stretch : EEMBC speedup by 190 Romain Vaslin 19
Secure architecture in embedded systems: an overview
Dedicated processor (Re)configurable architectures Interests and limitations of existing solutions
Interests and limitations of existing solutions Summary Power consuption Granularity vs efficiency Programmability Tools dedicated to the architecture (compiler, simulator)
Romain Vaslin 22
Secure architecture in embedded systems: an overview
Outline of our approach An example : a coprocessor dedicated to hash
Coprocessor dedicated to hash : recovery between algorithms
Recovery between algorithms Equation for Fmix (b, c, d) (x ∧ y) ⊕ (¯ x ∧ z) x ⊕y ⊕z (x ∧ y) ⊕ (x ∧ z) ⊕ (y ∧ z) rot m x ⊕ rot n x ⊕ rot l x (x ∧ y) ⊕ (y ∧ z¯) y ⊕ (x ∨ z¯)
SHA-1 x x x
SHA-2 x x x
MD5 x x x x x
Parametric function for md5 and SHA family T = G + [a
retrieval, detection and tracking. By mixing color and ... faces, vehicles) registered in digital images and videos. On ... maximizes the similarity with the objects previously detected .... Similarly and after some algebraic manipulations, the covar
wrist watch, hand-held devices (PDAs and cell phones), Internet appliances, thin clients, firewalls ... featured Linux kernel requires about 1 MB of memory.
should help to inform those working on population and conservation genetic studies in most ..... IUCN Red List of Threatened Species [Downloaded on May 10,.
capacity for analysis and proof of properties of the systems under design. For- ... tion and, on the other hand, in making possible certain speci cation property.
Their e ect and signi cance in the building of the kind of ... The work described in the article is partly funded by the CEC as Esprit Project EP 20897. SACRES ... Among the tools available are the speci cation tools, designed for the construction an
drivers are called by devices, possibly multiple times, with a hardware configuration documented during the boot process or when inserting the peripheral.
Bluetooth protocol stack and operating system must be ported onto the new platform ..... web browser or even a remote network manager, a user interface can be ...
to fishermen on Lake Volta, or adolescent girls working as porters ('kayayee') ...... Great Lakes region led to the breakdown of CEPGL. ...... rainy months. Ghana.
signment of individuals to populations [10-12]. Finally, mi- crosatellites are helpful ..... Primmer CR, Møller AP, Ellegren H. A wide-range survey of cross-species ...
Known in chemometrics as âSelf Modeling Curve Resolutionâ. [Lawton & Sylvestre ... Automated background and filtering still required. ICASSP 2013. 10 / 22 ...
FÃnd words in the replies which mean the following. ... Put the words in the correct order to make questions. ...... He is giving some advice to sat"speo"ple.
embedded controller and battery operated applications that need to accommodate Dallas Semiconductor iButton and 1-. Wire devices. The HA7S relieves the ...
tele â Q2. Q2 tele q = let (a, b) = epr f. = bmeas q a -- Alice in corr b f. -- Bob bmeas. â Q2. Q2. Q2 â Q2 bmeas x y = let (x , y ) = cnot x y in (meas (had x ), meas ...
2 What is important for people when they buy cosmetics and things like soap, shampoo or ... 3 Where does the company get the ingredients for its products? ... and new manufacturing and distribution ... PAM ______ its winning formula to.
Jan 21, 2005 - ... a theoretical point of view, this is a very attractive interdisciplinary study area that poses interesting questions .... This is not a problem for nonreal-time applications (e.g. file transfer), ... http://personal.ie.cuhk.edu.hk/
The development of plastic materials is one of the most successful stories of the twentieth century. ... mechanical, thermal, electrical, and chemical properties.
good (respectively wrong) answer to a request. .... tibodies as reactions/answers. ..... It constitutes a benchmark for several research fields, .... test different immune systems notably those described in the previous section. .... Moreover, subsum
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example ...
Embedded Systems â High Performance Systems, Applications and Projects ...... In addition the presented memory management system can also be exploited for memory ... URL: http://www.arm.com/pdfs/ARMCortexA-9Processor.pdf ...... Poly-Generator conve
ÅDeployer. â¢Deploys, configures and runs EJBs and Web applications. Application. Assembler. Deployment Environment. Node. Application Server JVM. Admin.