2018年從集成電路芯片角度看物聯網和系統安全.pdf

編號:95510 PDF 24頁 3.29MB 下載積分:VIP專享
下載報告請您先登錄!

2018年從集成電路芯片角度看物聯網和系統安全.pdf

1、從集成電路芯片角度看物聯網和系統安全IOT AND SYSTEM SECURITY:FROM THE VLSI PERSPECTIVEContentsINTRO TO IOTVLSI ATTACKSREVERSE ENGINEERINGCASE STUDYInternet of Things(IoT)Expanding Adoption of IoTA Recent Survey of IoT Adoption0%10%20%30%40%50%IoT platform/middlewareHome automationIndustrial automationConnected/smart c

2、itiesEnergy managementBuilding automationAgricultureHealthcareAutomotiveTransportation20172016Internet of Things(IoT)by 202020204BILLIONConnected People$4TRILLIONRevenue Opportunity25+MILLIONApps50TRILLIONGBs of Data25+BILLIONEmbedded and Intelligent SystemsIoT Design and StructureWeb Services(Weath

3、er,SNS,)Internet of ThingsSoftware CodeHardware PlatformApplicationsDevice Data CollectionDevice Control&MonitoringMashup ServiceCloud to Support IoTMicroprocessorHow To Ensure IoT Security?Cross-Layer:Technical cybersecurity solutions should take various layers of computing systems into considerati

4、on.Layered View of Computing SystemsHardware LayersSoftware LayersHardware-Software BoundaryWHY INTEGRATED CIRCUITS(IC,AKA VLSI)SECURITYIntroduction to Secure BootEstablish a root of trustStart code execution from a trusted sourceHave trusted source check next step of the code chainProcessorBoot Cod

5、eExternal codecheckPass:executeFail:panic()Secure Boot ChainProcessorBoot CodeExternal codecheckMore External CodeBypassing Boot ProcessBoot Process Security Validation Modern SoCs are designed to provide high flexibility Dilemma:Flexibility vs security Task:Evaluate the security implications of all

6、 possible boot configurations Case study:TI Sitara AM3703 SoCPCB Reverse EngineeringTop viewSide viewChip Reverse EngineeringNXP Mifare Proprietary cryptographic algorithm:CRYPTO-1 Reverse engineering:Algorithm and LFSR structure Widely used in ID cardsIC Supply ChainGlobal Integrated Circuit(IC)Sup

7、ply ChainManufacturingTesting and PackagingUsageDesignG2G1i0i1i2G3G4i3i4What software developers see.What hardware developers see.Integration Circuit(IC)Reverse Engineering Netlist recovery by a foundry or end-user threatens intellectual property and facilitates system level exploitation.The technol

8、ogy is advancingPackaged ICDieDelayering,Imaging,RecognitionG2G1i0i1i2G3G4i3i4NetlistFICS Research SeCurity and AssuraNce(SCAN)LabCourtesy of FICS UFImaging and Circuit Edit Capabilities100 m1 m100 nm10 nm1 nmDestructiveNondestructiveLYRA-3 XMH(Gallium FIB-SEM)FERA3-GMH(Plasma FIB-SEM)Skyscan 2211(X

9、-ray Micro CT)Imaging ResolutionMilling rate2000 m3/s200 m3/sOrion NanoFab(He-Ne FIB)20 m3/sCourtesy of FICS UFOptical Backside AnalysisPhoton EmissionLaser Stimulation/Fault InjectionOptical Contactless ProbingCourtesy of Shahin Tajik FICSPHOTON EMISSION ANALYSIS(PEM)Combinatorial vs.Sequential Log

10、icCombinatorial Logic:AND,OR,NOT,XORs,etc.Sequential Logic:Counter,Shift Register,State Machines,etc.Presence of Clock in Sequential LogicAltera MAX V(180 nm)Courtesy of Shahin Tajik FICSRing-Oscillator EmissionIdentical Switching Frequency by all LEsSwitching frequency independent and generally higher than clock frequencyApplications:TRNG and Internal ClocksAltera MAX V(180 nm)Courtesy of Shahin Tajik FICSConclusionsIC SECURITY REVISITING IOT SECURITYWORKFORCE GENERATIONHARDWARE FOR SOFTWARETHANKS

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(2018年從集成電路芯片角度看物聯網和系統安全.pdf)為本站 (云閑) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
相關報告
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站