SlideShare a Scribd company logo
Published in:Applied Electronics (AE), 2012 International
Conference
By:-
Martin Schramm University of Applied Sciences Deggendorf Deggendorf,
Germanymartin.schramm@hdu-deggendorf.de
Andreas Grzemba University of Applied Sciences Deggendorf
Deggendorf, Germany andreas.grzemba@hdu-deggendorf.de
Reconfigurable Trust for Embedded Computing
Platforms
INTRODUCTION
● embedded systems are integral parts of our everyday
lives
● ubiquity and the wireless nature of many embedded
applications give rise to the need for sophisticated
security and privacy mechanisms.
● ”W/O privacy mechanisms” attack surface and injection
vectors
● pure software-based security techniques often can only
react to well-known threatS
INTRODUCTION
● Trusted Computing is a promising new approach for computer
security “hardware-based security module”
● it uses an adaptive hardware-based trust anchor (FPGA,TPM)
● FPGAs offers major advantages when using them for
cryptographic applications.
● high security requirements and performance constrains.
Trusted Computing
● The most important of this approach is the utilization of a
hardware security chips
● egTrusted Platform Module (TPM)
● The interesting feature of the TPM is the possibility to store the
hash” values represent a digital fingerprint” values of security critical data in a
specially secured volatile memory area inside of the chip
● Called Platform Configuration Register (PCR)
● The hardware-based security module is tied to the computing
platform and offer special protected capabilities which are
securely isolated from the rest of the system.
Reconfigurable Hardware
● FPGAs, are more and more becoming important parts of
embedded computing platforms
● It can offer major advantages when using them for
cryptographic applications
● It can be used not only as an accelerator for cryptographic
calculations, but rather as a hardware trust Anchor in
embedded systems
FPGA-BASED TRUST ANCHOR
● This section deals with
the concept of an
adaptive Trust Anchor
which is based on a
FPGA chip.
● Conceptual Design of a
FPGA-based Trust
Anchor
FPGA-BASED TRUST ANCHOR
1) Asymmetric cryptographic algorithms a pair of keys is used to
encrypt and decrypt data eg: Elliptic Curve Cryptography ECC
2) Symmetric cryptographic algorithms eg: Advanced Encryption
Standard AES
3) Random number generator for the creation of cryptographic
key material.
4) Cryptographic Hash/MAC Engine, calculate cryptographic
hash values and message authentication codes.
5) A special memory area is dedicated to store the integrity
values generated during integrity measurements of the
components of the embedded system
FPGA-BASED TRUST ANCHOR
Advantages and Disadvantages
1) Advantages:
● When applying cryptography there always is a risk that the
utilized algorithms and protocols can possess theoretical or
practical weaknesses or that they have been implemented
incorrectly
● A great benefit of reconfigurable hardware a remote upload of
a revised configuration can fix bugs in fielded devices
FPGA-BASED TRUST ANCHOR
1) Advantages.
● Furthermore there always is the possibility that new
methods could be discovered with modern
cryptography.
FPGA-BASED TRUST ANCHOR
2) Shortcomings
● adopt methods to identify the utilized
cryptographic key
Knowledge of the key enables the attacker to decrypt past and
future messages which has been encrypted or to masquerade as
the attacked communication party.
eg :-reverse engineering, finding out information about the inner
logic of the FPGA configuration.
physical access, physical attacks to investigate the design
of the chip or to extract information about the secret key.
FPGA-BASED TRUST ANCHOR
2) Shortcomings
side channel attacks:Attackers could evaluate
information about timing behavior or power consumption in
order to conclude which cryptographic key is employed in
the design.
FPGA-BASED TRUST ANCHOR
2) Shortcomings
● cloning of the whole configuration together with the
cryptographic algorithm and key. In the case that a
symmetric algorithm is used it can be enough to run the
copied application in decryption mode to be able to decrypt
all past and future messages.
symmetric algorithm:-
using the same cryptographic keys for both encryption and
decryption
Solution for cloning bitstream ..
TPM and FPGA-based hybrid system
Because of the remaining unsolved
shortcomings of a pure FPGA-based Trust
Anchor solution , a hybrid system which
consists of a combination of the reconfigurable
security module with another hardware-based
security module, such as the Trusted Platform
Module.
TPM and FPGA-based hybrid system
● tamper resistant and tamper evident and
offers some special capabilities, such as a
True Random Number Generator (TRNG)
True Random Number Generator ~Pseudo-random
Numbers Generator
TRNG it generates random numbers by a specified
hardware chip w/o using a computer program like Pseudo
“newran. ”
TPM and FPGA-based hybrid system
● FPGA Trust Anchor used true random numbers generated
from TRNG to create cryptographic keys for the algorithms
implemented in the reconfigurable hardware device.
● The integrity of the FPGA configuration file can be measured
by the TPM and stored into the Platform Configuration
Register of the security module
TPM and FPGA-based hybrid system
TPM and FPGA-based hybrid system
RSA engine: RSA Authentication Manager software which
validates the pass code
SHA-1 hash engine: Secure Hash Algorithm, The SHA-1 is
known as a one-way hash function, meaning there is no known
mathematical method of computing the output given only the input
HMAC engine :Hashed Message Authentication Code,is a specific
construction for calculating a message authentication code (MAC)
POSSIBLE APPLICATION FIELDS
1) Secure partitioning of real time system:
● Real-Time Operating Systems (RTOS) performing safety-
critical tasks have a high demand for enhanced security
features
POSSIBLE APPLICATION FIELDS
Secure partitioning of real time system:
POSSIBLE APPLICATION FIELDS
Secure partitioning of real time system:
● The General-Purpose Operating System (GPOS) is
connected to the potentially untrustworthy network.
● A TPM is used to measure the integrity level of the
GPOS
● FPGA can be seen as a secured interconnection
between the GPOS and the RTOS
POSSIBLE APPLICATION FIELDS
2) Securing individual
nodes of a networked
system
● The proposed concept
of a reconfigurable
hardware security
module could help
securing individual
nodes from a networked
system
POSSIBLE APPLICATION FIELDS
2) Securing individual nodes of a networked system
● Two nodes of a networked system are illustrated
● One node consists of a common x86-based system
running a GPOS and is equipped with a TPM
● On the second node, a RTOS is running on top of an
ARM-based system and a combination of FPGA Trust
Anchor in combination with another hardware-based
security module protects the system against
manipulation attempts
CONCLUSION AND FUTURE WORK
● Reliability and security are main requirements which
have to be met if a FPGA should be used as root of
trust of a security architecture
● FPGAs have become central components for many
advanced embedded systems.
CONCLUSION AND FUTURE WORK
FUTURE WORK
In the next steps of this ongoing research work effective
ways have to be found in order that a pure FPGA-based
security architecture can give authentic and trustworthy
information about the state of the system.
THANK YOU
Supervised by Dr.Belal Sabaha
Done by Abdullah Deeb, graduate student at Princess
Sumaya University for Technology (PSUT)
WWW.PSUT.EDU.JO
ABDULLAH.DEEB@GMAIL.COM

More Related Content

PDF
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
PPT
Lessson 2 - Application Layer
PPTX
Where Are All The ICS Attacks?
PPTX
Firewall and its purpose
PDF
Introduction to Trusted Computing
PPTX
PDF
Please, Come and Hack my SCADA System!
PPTX
Infrastructure Attacks - The Next generation, ESET LLC
HARDWARE SECURITY IN CASE OF SCAN-BASED ATTACK ON CRYPTO-HARDWARE
Lessson 2 - Application Layer
Where Are All The ICS Attacks?
Firewall and its purpose
Introduction to Trusted Computing
Please, Come and Hack my SCADA System!
Infrastructure Attacks - The Next generation, ESET LLC

What's hot (18)

PPTX
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
PPTX
Test versus security @ IEEE Concept
PPTX
Firewall Basing
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PDF
Next Generation Network: Security and Architecture
PDF
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
DOCX
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
PDF
Authentication Issues between entities during protocol message exchange in SC...
PDF
Firewalls
PDF
10 Frequently asked Questions about Safe Train Control System menTCS
PPTX
Types of firewall
PDF
HKG18-219 - Threat Modeling for IoT
PDF
Snort IPS
PDF
IP Security
PPTX
Firewall and Types of firewall
PDF
STM32 L4 presentation
PPTX
Firewalls and packet filters
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Test versus security @ IEEE Concept
Firewall Basing
Intrusion Detection System using AI and Machine Learning Algorithm
Next Generation Network: Security and Architecture
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Seminar Report - Network Intrusion Prevention by Configuring ACLs on the Rout...
Authentication Issues between entities during protocol message exchange in SC...
Firewalls
10 Frequently asked Questions about Safe Train Control System menTCS
Types of firewall
HKG18-219 - Threat Modeling for IoT
Snort IPS
IP Security
Firewall and Types of firewall
STM32 L4 presentation
Firewalls and packet filters
Ad

Similar to Reconfigurable trust forembeddedcomputingplatforms (20)

PDF
Security issues in FPGA based systems.
PPTX
FPGA-Based Security Solutions & Specific security goals of cryptography
PPT
Trusted computing introduction and technical overview
PPTX
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
PDF
[Codientu.org] design of a microcontroller based circuit for software protection
PDF
Go3611771182
PPTX
Embedded presentation
PDF
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
PDF
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
PDF
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
DOCX
978-1-4577-1343-912$26.00 ©2014 IEEE Reliability an.docx
PDF
Wrapped rsa cryptography check on window
PDF
Security in Embedded systems
PDF
G05215356
PPT
Trusted Computing security _platform.ppt
PPTX
Thesis presentation
PDF
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
PDF
High end security for low-end microcontrollers
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
Tdp.a029a10
Security issues in FPGA based systems.
FPGA-Based Security Solutions & Specific security goals of cryptography
Trusted computing introduction and technical overview
ProjectVault[VivekKumar_CS-C_6Sem_MIT].pptx
[Codientu.org] design of a microcontroller based circuit for software protection
Go3611771182
Embedded presentation
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
978-1-4577-1343-912$26.00 ©2014 IEEE Reliability an.docx
Wrapped rsa cryptography check on window
Security in Embedded systems
G05215356
Trusted Computing security _platform.ppt
Thesis presentation
RITA SECURE COMMUNICATION PROTOCOL: APPLICATION TO SCADA
High end security for low-end microcontrollers
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
Tdp.a029a10
Ad

Recently uploaded (20)

PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
PPT on Performance Review to get promotions
PPTX
additive manufacturing of ss316l using mig welding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Construction Project Organization Group 2.pptx
PDF
composite construction of structures.pdf
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Well-logging-methods_new................
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
573137875-Attendance-Management-System-original
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Operating System & Kernel Study Guide-1 - converted.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPT on Performance Review to get promotions
additive manufacturing of ss316l using mig welding
Model Code of Practice - Construction Work - 21102022 .pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
Construction Project Organization Group 2.pptx
composite construction of structures.pdf
Lecture Notes Electrical Wiring System Components
Well-logging-methods_new................

Reconfigurable trust forembeddedcomputingplatforms

  • 1. Published in:Applied Electronics (AE), 2012 International Conference By:- Martin Schramm University of Applied Sciences Deggendorf Deggendorf, Germanymartin.schramm@hdu-deggendorf.de Andreas Grzemba University of Applied Sciences Deggendorf Deggendorf, Germany andreas.grzemba@hdu-deggendorf.de Reconfigurable Trust for Embedded Computing Platforms
  • 2. INTRODUCTION ● embedded systems are integral parts of our everyday lives ● ubiquity and the wireless nature of many embedded applications give rise to the need for sophisticated security and privacy mechanisms. ● ”W/O privacy mechanisms” attack surface and injection vectors ● pure software-based security techniques often can only react to well-known threatS
  • 3. INTRODUCTION ● Trusted Computing is a promising new approach for computer security “hardware-based security module” ● it uses an adaptive hardware-based trust anchor (FPGA,TPM) ● FPGAs offers major advantages when using them for cryptographic applications. ● high security requirements and performance constrains.
  • 4. Trusted Computing ● The most important of this approach is the utilization of a hardware security chips ● egTrusted Platform Module (TPM) ● The interesting feature of the TPM is the possibility to store the hash” values represent a digital fingerprint” values of security critical data in a specially secured volatile memory area inside of the chip ● Called Platform Configuration Register (PCR) ● The hardware-based security module is tied to the computing platform and offer special protected capabilities which are securely isolated from the rest of the system.
  • 5. Reconfigurable Hardware ● FPGAs, are more and more becoming important parts of embedded computing platforms ● It can offer major advantages when using them for cryptographic applications ● It can be used not only as an accelerator for cryptographic calculations, but rather as a hardware trust Anchor in embedded systems
  • 6. FPGA-BASED TRUST ANCHOR ● This section deals with the concept of an adaptive Trust Anchor which is based on a FPGA chip. ● Conceptual Design of a FPGA-based Trust Anchor
  • 7. FPGA-BASED TRUST ANCHOR 1) Asymmetric cryptographic algorithms a pair of keys is used to encrypt and decrypt data eg: Elliptic Curve Cryptography ECC 2) Symmetric cryptographic algorithms eg: Advanced Encryption Standard AES 3) Random number generator for the creation of cryptographic key material. 4) Cryptographic Hash/MAC Engine, calculate cryptographic hash values and message authentication codes. 5) A special memory area is dedicated to store the integrity values generated during integrity measurements of the components of the embedded system
  • 8. FPGA-BASED TRUST ANCHOR Advantages and Disadvantages 1) Advantages: ● When applying cryptography there always is a risk that the utilized algorithms and protocols can possess theoretical or practical weaknesses or that they have been implemented incorrectly ● A great benefit of reconfigurable hardware a remote upload of a revised configuration can fix bugs in fielded devices
  • 9. FPGA-BASED TRUST ANCHOR 1) Advantages. ● Furthermore there always is the possibility that new methods could be discovered with modern cryptography.
  • 10. FPGA-BASED TRUST ANCHOR 2) Shortcomings ● adopt methods to identify the utilized cryptographic key Knowledge of the key enables the attacker to decrypt past and future messages which has been encrypted or to masquerade as the attacked communication party. eg :-reverse engineering, finding out information about the inner logic of the FPGA configuration. physical access, physical attacks to investigate the design of the chip or to extract information about the secret key.
  • 11. FPGA-BASED TRUST ANCHOR 2) Shortcomings side channel attacks:Attackers could evaluate information about timing behavior or power consumption in order to conclude which cryptographic key is employed in the design.
  • 12. FPGA-BASED TRUST ANCHOR 2) Shortcomings ● cloning of the whole configuration together with the cryptographic algorithm and key. In the case that a symmetric algorithm is used it can be enough to run the copied application in decryption mode to be able to decrypt all past and future messages. symmetric algorithm:- using the same cryptographic keys for both encryption and decryption Solution for cloning bitstream ..
  • 13. TPM and FPGA-based hybrid system Because of the remaining unsolved shortcomings of a pure FPGA-based Trust Anchor solution , a hybrid system which consists of a combination of the reconfigurable security module with another hardware-based security module, such as the Trusted Platform Module.
  • 14. TPM and FPGA-based hybrid system ● tamper resistant and tamper evident and offers some special capabilities, such as a True Random Number Generator (TRNG) True Random Number Generator ~Pseudo-random Numbers Generator TRNG it generates random numbers by a specified hardware chip w/o using a computer program like Pseudo “newran. ”
  • 15. TPM and FPGA-based hybrid system ● FPGA Trust Anchor used true random numbers generated from TRNG to create cryptographic keys for the algorithms implemented in the reconfigurable hardware device. ● The integrity of the FPGA configuration file can be measured by the TPM and stored into the Platform Configuration Register of the security module
  • 16. TPM and FPGA-based hybrid system
  • 17. TPM and FPGA-based hybrid system RSA engine: RSA Authentication Manager software which validates the pass code SHA-1 hash engine: Secure Hash Algorithm, The SHA-1 is known as a one-way hash function, meaning there is no known mathematical method of computing the output given only the input HMAC engine :Hashed Message Authentication Code,is a specific construction for calculating a message authentication code (MAC)
  • 18. POSSIBLE APPLICATION FIELDS 1) Secure partitioning of real time system: ● Real-Time Operating Systems (RTOS) performing safety- critical tasks have a high demand for enhanced security features
  • 19. POSSIBLE APPLICATION FIELDS Secure partitioning of real time system:
  • 20. POSSIBLE APPLICATION FIELDS Secure partitioning of real time system: ● The General-Purpose Operating System (GPOS) is connected to the potentially untrustworthy network. ● A TPM is used to measure the integrity level of the GPOS ● FPGA can be seen as a secured interconnection between the GPOS and the RTOS
  • 21. POSSIBLE APPLICATION FIELDS 2) Securing individual nodes of a networked system ● The proposed concept of a reconfigurable hardware security module could help securing individual nodes from a networked system
  • 22. POSSIBLE APPLICATION FIELDS 2) Securing individual nodes of a networked system ● Two nodes of a networked system are illustrated ● One node consists of a common x86-based system running a GPOS and is equipped with a TPM ● On the second node, a RTOS is running on top of an ARM-based system and a combination of FPGA Trust Anchor in combination with another hardware-based security module protects the system against manipulation attempts
  • 23. CONCLUSION AND FUTURE WORK ● Reliability and security are main requirements which have to be met if a FPGA should be used as root of trust of a security architecture ● FPGAs have become central components for many advanced embedded systems.
  • 24. CONCLUSION AND FUTURE WORK FUTURE WORK In the next steps of this ongoing research work effective ways have to be found in order that a pure FPGA-based security architecture can give authentic and trustworthy information about the state of the system.
  • 25. THANK YOU Supervised by Dr.Belal Sabaha Done by Abdullah Deeb, graduate student at Princess Sumaya University for Technology (PSUT) WWW.PSUT.EDU.JO ABDULLAH.DEEB@GMAIL.COM