5.3 Special Session: Secure Composition of Hardware Systems

Printer-friendly version PDF version

Date: Wednesday 11 March 2020
Time: 08:30 - 10:00
Location / Room: Autrans

Chair:
Ilia Polian, Stuttgart University, DE

Co-Chair:
Francesco Regazzoni, ALARI, CH

Today's electronic systems consist of mixtures of programmable, reconfigurable, and application- specific hardware components, tied together by tremendously complex software. At the same time, systems are increasingly integrated such that a sub-system that was traditionally regarded "harm- less" (car's entertainment system) finds itself tightly coupled with safety-critical sub-systems (driving assistance) and security-sensitive sub-systems such as online payment and others. Moreover, a system's hardware components are now often directly accessible to the end users and thus vulnerable to physical attacks. The goal of this hot-topic session is to establish a common understanding of principles and techniques that can facilitate composition and integration of hardware systems and achieve security guarantees. Theoretical foundations of secure composition are currently limited to software systems, and unique security challenges arise when a real system, composed of a range of hardware components with different owners and trust assumptions is put together. Physical and side-channel attacks add another level of complexity to the problem of secure composition. Moreover, practical hardware systems include software stacks of tremendous size and complexity, and hardware- software interaction can create new security challenges. This hot-topic session will consider secure composition both from a purely hardware-centric and from a hardware-software perspective in a more complex system. It will also target composition of countermeasures against hardware-centric attacks and against software-driven attacks on hardware. It brings together researchers and industry practitioners who deal with secure composition: security- oriented electronic design automation; secure architectures of automotive hardware-software systems; and advanced attack scenarios against complexed hardware systems.

TimeLabelPresentation Title
Authors
08:305.3.1TOWARDS SECURE COMPOSITION OF INTEGRATED CIRCUITS AND ELECTRONIC SYSTEMS: ON THE ROLE OF EDA
Speaker:
Johann Knechtel, New York University Abu Dhabi, AE
Authors:
Johann Knechtel1, Elif Bilge Kavun2, Francesco Regazzoni3, Annelie Heuser4, Anupam Chattopadhyay5, Debdeep Mukhopadhyay6, Dey Soumyajit6, Yunsi Fei7, Yaacov Belenky8, Itamar Levi9, Tim Güneysu10, Patrick Schaumont11 and Ilia Polian12
1New York University Abu Dhabi, AE; 2University of Sheffield, GB; 3ALaRI, CH; 4Université de Rennes / Inria / CNRS / IRISA, FR; 5Nanyang Technological University, SG; 6IIT Kharagpur, IN; 7Northeastern University, US; 8Intel, IL; 9Bar-Ilan University, IL; 10Ruhr-University Bochum, DE; 11Worcester Polytechnic Institute, US; 12University of Stuttgart, DE
Abstract
Modern electronic systems become evermore complex, yet remain modular, with integrated circuits (ICs) acting as versatile hardware components at their heart. Electronic design automation (EDA) for ICs has focused traditionally on power, performance, and area. However, given the rise of hardware-centric security threats, we believe that EDA must also adopt related notions like secure by design and secure composition of hardware. Despite various promising studies, we argue that some aspects still require more efforts, for example: effective means for compilation of assumptions and constraints for security schemes, all the way from the system level down to the "bare metal"; modeling, evaluation, and consideration of security-relevant metrics; or automated and holistic synthesis of various countermeasures, without inducing negative cross-effects. In this paper, we first introduce hardware security for the EDA community. Next we review prior (academic) art for EDA-driven security evaluation and implementation of countermeasures. We then discuss strategies and challenges for advancing research and development toward secure composition of circuits and systems.

Download Paper (PDF; Only available from the DATE venue WiFi)
08:555.3.2ATTACKER MODELING ON COMPOSED SYSTEMS
Speaker:
Pierre Schnarz, Continental AG, DE
Authors:
Tobias Basic, Jan Müller, Pierre Schnarz and Marc Stoettinger, Continental AG, DE
09:155.3.3PITFALLS IN MACHINE LEARNING-BASED ADVERSARY MODELING FOR HARDWARE SYSTEMS
Speaker:
Fatemeh Ganji, University of Florida, US
Authors:
Fatemeh Ganji1, Sarah Amir1, Shahin Tajik1, Jean-Pierre Seifert2 and Domenic Forte1
1University of Florida, US; 2TU Berlin, DE

Download Paper (PDF; Only available from the DATE venue WiFi)
09:355.3.4USING UNIVERSAL COMPOSITION TO DESIGN AND ANALYZE SECURE COMPLEX HARDWARE SYSTEMS
Speaker:
Marten van Dijk, University of Connecticut, US
Authors:
Ran Canetti1, Marten van Dijk2, Hoda Maleki3, Ulrich Rührmair4 and Patrick Schaumont5
1Boston University, US; 2University of Connecticut, US; 3University of Augusta, US; 4TU Munich, DE; 5Worcester Polytechnic Institute, US

Download Paper (PDF; Only available from the DATE venue WiFi)
10:00End of session