《2018年从集成电路芯片角度看物联网和系统安全.pdf》由会员分享,可在线阅读,更多相关《2018年从集成电路芯片角度看物联网和系统安全.pdf(24页珍藏版)》请在三个皮匠报告上搜索。
1、从集成电路芯片角度看物联网和系统安全IOT AND SYSTEM SECURITY:FROM THE VLSI PERSPECTIVEContentsINTRO TO IOTVLSI ATTACKSREVERSE ENGINEERINGCASE STUDYInternet of Things(IoT)Expanding Adoption of IoTA Recent Survey of IoT Adoption0%10%20%30%40%50%IoT platform/middlewareHome automationIndustrial automationConnected/smart c
2、itiesEnergy managementBuilding automationAgricultureHealthcareAutomotiveTransportation20172016Internet of Things(IoT)by 202020204BILLIONConnected People$4TRILLIONRevenue Opportunity25+MILLIONApps50TRILLIONGBs of Data25+BILLIONEmbedded and Intelligent SystemsIoT Design and StructureWeb Services(Weath
3、er,SNS,)Internet of ThingsSoftware CodeHardware PlatformApplicationsDevice Data CollectionDevice Control&MonitoringMashup ServiceCloud to Support IoTMicroprocessorHow To Ensure IoT Security?Cross-Layer:Technical cybersecurity solutions should take various layers of computing systems into considerati
4、on.Layered View of Computing SystemsHardware LayersSoftware LayersHardware-Software BoundaryWHY INTEGRATED CIRCUITS(IC,AKA VLSI)SECURITYIntroduction to Secure BootEstablish a root of trustStart code execution from a trusted sourceHave trusted source check next step of the code chainProcessorBoot Cod
5、eExternal codecheckPass:executeFail:panic()Secure Boot ChainProcessorBoot CodeExternal codecheckMore External CodeBypassing Boot ProcessBoot Process Security Validation Modern SoCs are designed to provide high flexibility Dilemma:Flexibility vs security Task:Evaluate the security implications of all
6、 possible boot configurations Case study:TI Sitara AM3703 SoCPCB Reverse EngineeringTop viewSide viewChip Reverse EngineeringNXP Mifare Proprietary cryptographic algorithm:CRYPTO-1 Reverse engineering:Algorithm and LFSR structure Widely used in ID cardsIC Supply ChainGlobal Integ