security as a new dimension in embedded system design presented by : vivek srikantan authors: paul...
TRANSCRIPT
![Page 1: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/1.jpg)
Security as a New Dimension in Embedded System Design
Presented by : Vivek Srikantan
Authors:
Paul Kocher
Ruby Lee
Gary McGraw
Anand Raghunathan
Srivaths Ravi
![Page 2: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/2.jpg)
Embedded Systems Design Metrics
• Performance• Power • Cost• Size
And• SECURITY
2
![Page 3: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/3.jpg)
Factors affecting the security implementation in Embedded Systems
• Resource Constraint• Increasing range of attack techniques• Processing capabilities of the embedded systems• Power consumption• Flexible architecture
3
![Page 4: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/4.jpg)
Security Requirements
• Varies depending on whose perspective is considered
• Ex: Cell Phone– Manufacturer– Service provider– Content provider– End user
4
![Page 5: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/5.jpg)
Security Mechanisms
• Symmetric Ciphers
• Secure Hash Algorithms
• Asymmetric Algorithms
5
![Page 6: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/6.jpg)
Security Mechanisms
• Secure communication protocols
• Digital Certificates
• Digital Rights Management
6
![Page 7: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/7.jpg)
Types of Security Attacks
• Software Attacks
• Physical and Side-channel Attacks
7
![Page 8: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/8.jpg)
Software Attacks
• Three Factors or Trinity of Trouble Complexity Extensibility Connectivity
8
![Page 9: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/9.jpg)
Securing against software attacks
9
![Page 10: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/10.jpg)
Physical and Side Channel Attacks
• Invasive Attacks
• Non-invasive Attacks
10
![Page 11: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/11.jpg)
Invasive Attacks
• Physical Attacks De-packaging Layout reconstruction Micro probing or e-beam microscopy
11
![Page 12: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/12.jpg)
Non-Invasive Attacks
• Timing Analysis
• Power Analysis– Simple Power Analysis– Differential Power Analysis
12
![Page 13: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/13.jpg)
Architectures for Security
• Security Processing Architectures
• Attack – Resistant Architectures
13
![Page 14: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/14.jpg)
Security Processing Architectures
• Hardware only approach
- Cost Effective
• Software only Approach
- Processing Gap
- Battery Gap
• Hybrid Approach
14
![Page 15: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/15.jpg)
Attack-Resistant Architectures
• Strong process isolation
• Sealed memory
• Platform attestation
• Secure path to the user
15
![Page 16: Security as a New Dimension in Embedded System Design Presented by : Vivek Srikantan Authors: Paul Kocher Ruby Lee Gary McGraw Anand Raghunathan Srivaths](https://reader030.vdocument.in/reader030/viewer/2022032604/56649e635503460f94b5f5c4/html5/thumbnails/16.jpg)
Conclusion
• Security is currently specificed in a vague manner
• Time-to-market pressures
• Constrained resources
• Trade-offs
16