A Flexible Design Flow for Software IP Binding in FPGA

被引:16
作者
Gora, Michael A. [1 ]
Maiti, Abhranil [1 ]
Schaumont, Patrick [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24060 USA
基金
美国国家科学基金会;
关键词
Design flow; firmware; field programmable gate arrays (FPGA); intellectual property; physical unclonable function secure embedded systems; security; software binding; PHYSICAL UNCLONABLE FUNCTIONS; ARCHITECTURE; PROTECTION; HARDWARE; SECURE;
D O I
10.1109/TII.2010.2068303
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software intellectual property (SWIP) is a critical component of increasingly complex field programmable gate arrays (FPGA)-based system-on-chip (SOC) designs. As a result, developers want to ensure that their Software Intellectual Property (SWIP) is protected from being exposed to or tampered with by unauthorized parties. By restricting the execution of SWIP to a single trusted FPGA platform, SWIP binding addresses developers' concerns about maintaining control of their intellectual property and the market position it affords. This work proposes a novel design flow for SWIP binding on a commodity FPGA platform lacking specialized hardcore security facilities. We accomplish this by leveraging the qualities of a Physical Unclonable Function (PUF) and a tight integration of hardware and software security features. A prototype implementation demonstrates our design flow's ability to successfully protect software by encryption using a 128 bit FPGA-unique key extracted from a PUF. Based on this proof of concept, a solution to perform secure remote software updates, a common challenge in embedded systems, is proposed to showcase the practicality and flexibility of the design flow.
引用
收藏
页码:719 / 728
页数:10
相关论文
共 49 条
[1]   Malicious code detection for open firmware [J].
Adelstein, F ;
Stillerman, M ;
Kozen, D .
18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, :403-412
[2]  
Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
[3]  
[Anonymous], SECURITY
[4]  
[Anonymous], 2003, International conference on Supercomputing, ICS '03
[5]  
[Anonymous], UCAMCLTR630
[6]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[7]  
Atallah M.J., 2008, Proceedings of the 1st ACM workshop on Virtual machine security, P45
[8]   Wires on demand:: Run-time communication synthesis for reconfigurable computing [J].
Athanas, P. ;
Bowen, J. ;
Dunham, T. ;
Patterson, C. ;
Rice, J. ;
Shelburne, M. ;
Suris, J. ;
Bucciero, M. ;
Graf, J. .
2007 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, VOLS 1 AND 2, 2007, :513-516
[9]   SECURE FPGA CONFIGURATION ARCHITECTURE PREVENTING SYSTEM DOWNGRADE [J].
Badrignans, Benoit ;
Elbaz, Reouven ;
Torres, Lionel .
2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2, 2008, :317-+
[10]  
Bösch C, 2008, LECT NOTES COMPUT SC, V5154, P181, DOI 10.1007/978-3-540-85053-3_12