skip to main content
research-article

An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC

Published:27 September 2017Publication History
Skip Abstract Section

Abstract

MPSoC-based embedded systems design is becoming increasingly complex. Not only do we need to satisfy multiple design objectives, we increasingly need to address potential security risks. In this work, we propose a security-aware systematic design approach which explores the design space, given a system-level application description, by generating potential architecture configurations of execution platform nodes that are interconnected using a NoC. We then perform automated security analysis to check the generated configurations against designer-specified security constraints. Following the analysis, we use an automated architecture configuration refinement process to generate a list of security additions that are inserted into the initial configuration so that the security constraints are satisfied. By performing this refinement on several candidate configuration options, we can explore the trade-off between resource cost and security. In this paper, we illustrate the proposed approach using a Smart Home Control System application.

References

  1. L. A. D. Bathen and N. Dutt. 2010. PoliMakE: A Policy Making Engine for Secure Embedded Software Execution on Chip-multiprocessors. In Proceedings of the 5th Workshop on Embedded Systems Security (WESS’10). ACM, New York, NY, USA, 2:10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Brasser, B. El Mahjoub, A.-R. Sadeghi, C. Wachsmann, and P. Koeberl. 2015. TyTAN: Tiny Trust Anchor for Tiny Devices. In Proceedings of the 52Nd Annual Design Automation Conference (DAC’15). ACM, New York, NY, USA, 34:6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Fernandes, C. Marcon, R. Cataldo, J. Silveira, G. Sigl, and J. Sepulveda. 2016. A security aware routing approach for NoC-based MPSoCs. In 2016 29th Symposium on Integrated Circuits and Systems Design (SBCCI). 1--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Fiorin, G. Palermo, S. Lukovic, V. Catalano, and C. Silvano. 2008. Secure Memory Accesses on Networks-on-Chip. IEEE Transactions on Computers 57, 9 (2008), 1216--1229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. D. Grammatikakis, K. Papadimitriou, P. Petrakis, A. Papagrigoriou, G. Kornaros, I. Christoforakis, O. Tomoutzoglou, G. Tsamis, and M. Coppola. 2015. Security in MPSoCs: A NoC Firewall and an Evaluation Framework. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34, 8 (2015), 1344--1357.Google ScholarGoogle ScholarCross RefCross Ref
  6. Y. Hu, D. Mller-Gritschneder, M. J. Sepulveda, G. Gogniat, and U. Schlichtmann. 2015. Automatic ILP-based Firewall Insertion for Secure Application-Specific Networks-on-Chip. In 2015 Ninth International Workshop on Interconnection Network Architectures: On-Chip, Multi-Chip. 9--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Kang. 2016. Design Space Exploration for Security. In 2016 IEEE Cybersecurity Development (SecDev). 30--36.Google ScholarGoogle Scholar
  8. D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. 2000. Architectural Support for Copy and Tamper Resistant Software. SIGPLAN Not. 35, 11 (Nov 2000), 168--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ARM Limited. 2009. ARM Security Technology -- Building a Secure System using TrustZone® Technology. Technical Report PRD29-GENC-009492CUnrestricted. ARM. http://infocenter.arm.com/help/topic/com.arm.doc.prd29-genc-009492c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf.Google ScholarGoogle Scholar
  10. C. Liu, J. Rajendran, C. Yang, and R. Karri. 2014. Shielding Heterogeneous MPSoCs From Untrustworthy 3PIPs Through Security-Driven Task Scheduling. IEEE Transactions on Emerging Topics in Computing 2, 4 (2014), 461--472.Google ScholarGoogle ScholarCross RefCross Ref
  11. K. Patel, S. Parameswaran, and R. G. Ragel. 2011. Architectural Frameworks for Security and Reliability of MPSoCs. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 19, 9 (2011), 1641--1654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Paulitsch, O. M. Duarte, H. Karray, K. Mueller, D. Muench, and J. Nowotsch. 2015. Mixed-Criticality Embedded Systems -- A Balance Ensuring Partitioning and Performance. In 2015 Euromicro Conference on Digital System Design (DSD). 453--461. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Z. Salcic, M. Nadeem, H. Park, and J. Teich. 2016. Optimizing Latencies and Customizing NoC of Time-Predictable Heterogeneous Multi-Core Processor. In IEEE 10th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC-16).Google ScholarGoogle Scholar
  14. P. Stewin and I. Bystrov. 2013. Understanding DMA Malware. In Proceedings of the 9th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA’12). Springer-Verlag, Berlin, Heidelberg, 21--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. I. Stierand, S. Malipatlolla, S. Frschle, A. Sthring, and S. Henkler. 2014. Integrating the Security Aspect into Design Space Exploration of Embedded Systems. In 2014 IEEE International Symposium on Software Reliability Engineering Workshops. 371--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. L. Szekeres, M. Payer, L. T. Wei, and R. Sekar. 2014. Eternal War in Memory. Security 8 Privacy, IEEE 12, 3 (2014), 45--53.Google ScholarGoogle Scholar
  17. B. Tan, M. Biglari-Abhari, and Z. Salcic. 2016. A system-level security approach for heterogeneous MPSoCs. In 2016 Conference on Design and Architectures for Signal and Image Processing (DASIP). 74--81.Google ScholarGoogle Scholar

Index Terms

  1. An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!