Skip to main content

A Move Towards a Hardware Patch

  • Chapter
  • First Online:
Security Policy in System-on-Chip Designs

Abstract

System-on-Chip (SoC) security architectures targeted towards diverse applications including Internet of Things (IoT) and automotive systems enforce two critical design requirements: in-field configurability and low overhead. To simultaneously address these constraints, in this paper, we present a novel, flexible, and adaptable SoC security architecture that efficiently implements diverse security policies. The architecture and associated CAD flow enable “hardware patching,” i.e., hardware security policy engine that can be seamlessly and securely upgraded in field to address unanticipated attacks or new security requirements. The proposed framework provides a systematic approach to represent and synthesize diverse security policies. Through extensive analysis using representative SoC models, we show, for the first time to our knowledge, that the proposed framework provides high level of patchability with minimal energy and performance overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Backer, D. Hely, R. Karri, On enhancing the debug architecture of a system-on-chip (SoC) to detect software attacks, in IEEE DFTS (2015)

    Google Scholar 

  2. A. Basak, S. Bhunia, S. Ray, A flexible architecture for systematic implementation of SoC security policies, in IEEE/ACM International Conference on Computer-Aided Design (ICCAD) (2015), pp. 536–543

    Google Scholar 

  3. Counterfeit chips on the rise, http://spectrum.ieee.org/computing/

  4. D. Evans, The internet of things - how the next evolution of the internet is changing everything, in White Paper. Cisco Internet Business Solutions Group (IBSG) (2011)

    Google Scholar 

  5. J.A. Goguen, J. Meseguer, Security policies and security models, in Proceedings of 1982 IEEE Symposium on Security and Privacy (1982), pp. 11–20

    Google Scholar 

  6. J. Lee, I. Heo, Y. Lee, Y. Paek, Efficient dynamic information flow tracking on a processor with core debug interface, in ACM DAC (2015)

    Google Scholar 

  7. X. Li, Sapper: a language for hardwarelevel security policy enforcement, in Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2014)

    Google Scholar 

  8. J. Loucaides, A. Furtak, A new class of vulnerability in SMI handlers of BIOS/UEFI firmware, in The 15th Annual CanSecWest Conference (CanSecWest 2015) (2015)

    Google Scholar 

  9. A.P.D. Nath, S. Ray, A. Basak, S. Bhunia, System-on-chip security architecture and cad framework for hardware patch, in ASP DAC (2018)

    Google Scholar 

  10. S. Ray, J. Yang, A. Basak, S. Bhunia, Correctness and security at odds: post-silicon validation of modern SoC designs, in ACM DAC (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ray, S., Basak, A., Bhunia, S. (2019). A Move Towards a Hardware Patch. In: Security Policy in System-on-Chip Designs. Springer, Cham. https://doi.org/10.1007/978-3-319-93464-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93464-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93463-1

  • Online ISBN: 978-3-319-93464-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics