上海品茶

您的当前位置:上海品茶 > 报告分类 > PDF报告下载

2018年从集成电路芯片角度看物联网和系统安全.pdf

编号:95510 PDF 24页 3.29MB 下载积分:VIP专享
下载报告请您先登录!

2018年从集成电路芯片角度看物联网和系统安全.pdf

1、从集成电路芯片角度看物联网和系统安全IOT AND SYSTEM SECURITY:FROM THE VLSI PERSPECTIVEContentsINTRO TO IOTVLSI ATTACKSREVERSE ENGINEERINGCASE STUDYInternet of Things(IoT)Expanding Adoption of IoTA Recent Survey of IoT Adoption0%10%20%30%40%50%IoT platform/middlewareHome automationIndustrial automationConnected/smart c

2、itiesEnergy managementBuilding automationAgricultureHealthcareAutomotiveTransportation20172016Internet of Things(IoT)by 202020204BILLIONConnected People$4TRILLIONRevenue Opportunity25+MILLIONApps50TRILLIONGBs of Data25+BILLIONEmbedded and Intelligent SystemsIoT Design and StructureWeb Services(Weath

3、er,SNS,)Internet of ThingsSoftware CodeHardware PlatformApplicationsDevice Data CollectionDevice Control&MonitoringMashup ServiceCloud to Support IoTMicroprocessorHow To Ensure IoT Security?Cross-Layer:Technical cybersecurity solutions should take various layers of computing systems into considerati

4、on.Layered View of Computing SystemsHardware LayersSoftware LayersHardware-Software BoundaryWHY INTEGRATED CIRCUITS(IC,AKA VLSI)SECURITYIntroduction to Secure BootEstablish a root of trustStart code execution from a trusted sourceHave trusted source check next step of the code chainProcessorBoot Cod

5、eExternal codecheckPass:executeFail:panic()Secure Boot ChainProcessorBoot CodeExternal codecheckMore External CodeBypassing Boot ProcessBoot Process Security Validation Modern SoCs are designed to provide high flexibility Dilemma:Flexibility vs security Task:Evaluate the security implications of all

6、 possible boot configurations Case study:TI Sitara AM3703 SoCPCB Reverse EngineeringTop viewSide viewChip Reverse EngineeringNXP Mifare Proprietary cryptographic algorithm:CRYPTO-1 Reverse engineering:Algorithm and LFSR structure Widely used in ID cardsIC Supply ChainGlobal Integrated Circuit(IC)Sup

7、ply ChainManufacturingTesting and PackagingUsageDesignG2G1i0i1i2G3G4i3i4What software developers see.What hardware developers see.Integration Circuit(IC)Reverse Engineering Netlist recovery by a foundry or end-user threatens intellectual property and facilitates system level exploitation.The technol

8、ogy is advancingPackaged ICDieDelayering,Imaging,RecognitionG2G1i0i1i2G3G4i3i4NetlistFICS Research SeCurity and AssuraNce(SCAN)LabCourtesy of FICS UFImaging and Circuit Edit Capabilities100 m1 m100 nm10 nm1 nmDestructiveNondestructiveLYRA-3 XMH(Gallium FIB-SEM)FERA3-GMH(Plasma FIB-SEM)Skyscan 2211(X

9、-ray Micro CT)Imaging ResolutionMilling rate2000 m3/s200 m3/sOrion NanoFab(He-Ne FIB)20 m3/sCourtesy of FICS UFOptical Backside AnalysisPhoton EmissionLaser Stimulation/Fault InjectionOptical Contactless ProbingCourtesy of Shahin Tajik FICSPHOTON EMISSION ANALYSIS(PEM)Combinatorial vs.Sequential Log

10、icCombinatorial Logic:AND,OR,NOT,XORs,etc.Sequential Logic:Counter,Shift Register,State Machines,etc.Presence of Clock in Sequential LogicAltera MAX V(180 nm)Courtesy of Shahin Tajik FICSRing-Oscillator EmissionIdentical Switching Frequency by all LEsSwitching frequency independent and generally higher than clock frequencyApplications:TRNG and Internal ClocksAltera MAX V(180 nm)Courtesy of Shahin Tajik FICSConclusionsIC SECURITY REVISITING IOT SECURITYWORKFORCE GENERATIONHARDWARE FOR SOFTWARETHANKS

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(2018年从集成电路芯片角度看物联网和系统安全.pdf)为本站 (云闲) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
会员购买
客服

专属顾问

商务合作

机构入驻、侵权投诉、商务合作

服务号

三个皮匠报告官方公众号

回到顶部