当前位置: X-MOL 学术arXiv.eess.SP › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s
arXiv - EE - Signal Processing Pub Date : 2022-09-26 , DOI: arxiv-2209.12987
Muhammed Kawser Ahmed, Sujan Kumar Saha, Christophe Bobda

Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious software-level attackers from gaining unauthorized access and compromising security, we propose a root of trust-based trusted execution mechanism \textbf{\textit{(named as \textbf{TrustToken}) }}. TrustToken builds a security block to provide a root of trust-based IP security: secure key generation and truly random source. \textbf{TrustToken} only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted user interaction. The proposed design achieves this by interconnecting the third-party IP interface to \textbf{TrustToken} Controller and checking IP authorization(Token) signals \texttt{`correctness'} at run-time. \textbf{TrustToken} architecture shows a very low overhead resource utilization LUT (618, 1.16 \%), FF (44, 0.04 \%), and BUFG (2 , 6.25\%) in implementation. The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.

中文翻译:

TrustToken,用于非可信知识产权 (IP) 的可信 SoC 解决方案

异构 SoC 中的安全和可信赖执行是现代计算系统的主要优先事项。SoC 的安全性主要解决两个广泛的信任问题: 1. 防止硬件安全威胁(侧通道、IP 隐私、克隆、故障注入和拒绝服务);2. 防止在 SoC 处理器上运行的恶意软件攻击。为了防止恶意软件级攻击者获得未经授权的访问和损害安全性,我们提出了基于信任的可信执行机制 \textbf{\textit{(命名为 \textbf{TrustToken}) }} 的根。TrustToken 构建了一个安全块以提供基于信任的 IP 安全性的根:安全密钥生成和真正的随机源。\textbf{TrustToken} 通过提供基本的安全功能,即安全、隔离执行和受信任的用户交互,仅允许不受信任的第三方 IP 与 SoC 世界的其他部分之间进行受信任的通信。提议的设计通过将第三方 IP 接口互连到 \textbf{TrustToken} 控制器并在运行时检查 IP 授权(令牌)信号 \texttt{`正确性'} 来实现这一点。\textbf{TrustToken} 架构在实现中显示了非常低的开销资源利用率 LUT (618, 1.16 \%)、FF (44, 0.04 \%) 和 BUFG (2, 6.25\%)。实验结果表明,TrustToken 可以为非可信 SoC IP 提供安全、低成本、可信的解决方案。提议的设计通过将第三方 IP 接口互连到 \textbf{TrustToken} 控制器并在运行时检查 IP 授权(令牌)信号 \texttt{`正确性'} 来实现这一点。\textbf{TrustToken} 架构在实现中显示了非常低的开销资源利用率 LUT (618, 1.16 \%)、FF (44, 0.04 \%) 和 BUFG (2, 6.25\%)。实验结果表明,TrustToken 可以为非可信 SoC IP 提供安全、低成本、可信的解决方案。提议的设计通过将第三方 IP 接口互连到 \textbf{TrustToken} 控制器并在运行时检查 IP 授权(令牌)信号 \texttt{`正确性'} 来实现这一点。\textbf{TrustToken} 架构在实现中显示了非常低的开销资源利用率 LUT (618, 1.16 \%)、FF (44, 0.04 \%) 和 BUFG (2, 6.25\%)。实验结果表明,TrustToken 可以为非可信 SoC IP 提供安全、低成本、可信的解决方案。
更新日期:2022-09-28
down
wechat
bug