Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware

  • Chapter
  • First Online:
Logic, Rewriting, and Concurrency

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9200))

Abstract

Mobile devices are in roles where the integrity and confidentiality of their apps and data are of paramount importance. They usually contain a System-on-Chip (SoC), which integrates microprocessors and peripheral Intellectual Property (IP) connected by a Network-on-Chip (NoC). Malicious IP or software could compromise critical data. Some types of attacks can be blocked by controlling data transfers on the NoC using Memory Management Units (MMUs) and other access control mechanisms. However, commodity processors do not provide strong assurances regarding the correctness of such mechanisms, and it is challenging to verify that all access control mechanisms in the system are correctly configured. We propose a NoC Firewall (NoCF) that provides a single locus of control and is amenable to formal analysis. We demonstrate an initial analysis of its ability to resist malformed NoC commands, which we believe is the first effort to detect vulnerabilities that arise from NoC protocol violations perpetrated by erroneous or malicious IP.

M. LeMay was with the University of Illinois at Urbana-Champaign while performing the work described herein, but he was employed by Intel Corporation at the time of submission. The views expressed are those of the authors only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Bluespec SystemVerilog overview. Technical report, Bluespec, Inc. (2006). http://www.bluespec.com/products/documents/BluespecSystemVerilogOverview.pdf

  2. Arbaugh, W.A., Farber, D.J., Smith, J.M.: A secure and reliable bootstrap architecture. In: 18th IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 65–71, May 1997

    Google Scholar 

  3. Arditi, L.: Formal verification: so many applications. In: Design Automation Conference on Electronic Chips & Systems Design Initiative 2010 Presentation, Anaheim, CA, USA, June 2010

    Google Scholar 

  4. Beaumont, M., Hopkins, B., Newby, T.: Hardware trojans - prevention, detection, countermeasures (A literature review). Technical report DSTO-TN-1012, DSTO Defence Science and Technology Organisation, Edinburgh, South Australia, July 2011. http://www.eetimes.com/author.asp?section_id=36&doc_id=1266011

  5. Butler, S.: Managing IP quality in the SoC era. Electronic Engineering Times Europe p. 5, October 2011. http://www.wsj.com/articles/SB10001424052748704641604576255223445021138

  6. Cheng, R.: So you want to use your iPhone for work? Uh-oh. Wall Street J., April 2011

    Google Scholar 

  7. Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: Maude manual (version 2.6). Technical report, January 2011

    Google Scholar 

  8. Dalinger, I.: Formal Verification of a Processor with Memory Management Units. Saarland University, Saarbrücken (2006)

    Google Scholar 

  9. Goering, R.: Panelists discuss solutions to SoC IP integration challenges. Industry Insights - Cadence Community, May 2011

    Google Scholar 

  10. Gotze, K.: A survey of frequently identified vulnerabilities in commercial computing semiconductors. In: 4th IEEE International Symposium on Hardware-Oriented Security and Trust, pp. 122–126. HOST, San Diego (2011)

    Google Scholar 

  11. Huffmire, T., Brotherton, B., Wang, G., Sherwood, T., Kastner, R., Levin, T., Nguyen, T., Irvine, C.: Moats and drawbridges: an isolation primitive for reconfigurable hardware based systems. In: 28th IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 281–295, May 2007

    Google Scholar 

  12. Huffmire, T., Irvine, C., Nguyen, T.D., Levin, T., Kastner, R., Sherwood, T.: Handbook of FPGA Design Security. Springer, The Netherlands (2010)

    Book  Google Scholar 

  13. Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an OS kernel. In: 22nd ACM Symposium on Operating Systems Principles, SOSP, Big Sky, MT, USA, pp. 207–220, October 2009

    Google Scholar 

  14. LeMay, M., Gunter, C.A.: Network-on-chip firewall: countering defective and malicious system-on-chip hardware, April 2014. http://arxiv.org/abs/1404.3465

  15. Li, X., Tiwari, M., Oberg, J.K., Kashyap, V., Chong, F.T., Sherwood, T., Hardekopf, B.: Caisson: a hardware description language for secure information flow. In: 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, San Jose, CA, USA, pp. 109–120, June 2011

    Google Scholar 

  16. Martí-Oliet, N., Meseguer, J., Verdejo, A.: A rewriting semantics for Maude strategies. In: 7th International Workshop on Rewriting Logic and its Applications, WRLA, pp. 227–247. Elsevier, Budapest (2008)

    Google Scholar 

  17. Meredith, P., Katelman, M., Meseguer, J., Rosu, G.: A formal executable semantics of Verilog. In: 8th ACM/IEEE International Conference on Formal Methods and Models for Codesign, MemoCODE, Grenoble, France, pp. 179–188, July 2010

    Google Scholar 

  18. Katelman, M.K.: A Meta-Language for Functional Verification. Ph.D. Dissertation, University of Illinois at Urbana-Champaign, Urbana, Illinois (2011)

    Google Scholar 

  19. Mukherjee, S.S., Emer, J., Reinhardt, S.K.: The soft error problem: an architectural perspective. In: 11th International Symposium on High-Performance Computer Architecture, HPCA, pp. 243–247. IEEE, San Francisco (2005)

    Google Scholar 

  20. Nachenberg, C.: A window into mobile device security: examining the security approaches employed in Apple’s iOS and Google’s Android. Technical report, Symantec Security Response, June 2011

    Google Scholar 

  21. Richards, D., Lester, D.: A monadic approach to automated reasoning for Bluespec SystemVerilog. Innovations Syst. Softw. Eng. 7(2), 85–95 (2011). Springer

    Article  Google Scholar 

  22. Schubert, E.T., Levitt, K., Cohen, G.C.: Formal verification of a set of memory management units. Contractor Report 189566, National Aeronautics and Space Administration, Hampton, VA, USA, March 1992

    Google Scholar 

  23. Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: 21st ACM Symposium on Operating Systems Principles, SOSP, Stevenson, WA, USA, pp. 335–350, October 2007

    Google Scholar 

  24. Shimpi, A.L.: NVIDIA to acquire Icera, adds software baseband to its portfolio, May 2011. AnandTech.com

  25. Szefer, J., Keller, E., Lee, R.B., Rexford, J.: Eliminating the hypervisor attack surface for a more secure cloud. In: 18th ACM Conference on Computer and Communications Security, CCS, Chicago, IL, USA, October 2011

    Google Scholar 

  26. Tiwari, M., Oberg, J.K., Li, X., Valamehr, J., Levin, T., Hardekopf, B., Kastner, R., Chong, F.T., Sherwood, T.: Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security. In: 38th International Symposium on Computer Architecture, ISCA, pp. 189–200. ACM, San Jose (2011)

    Google Scholar 

  27. Villasenor, J.: Ensuring hardware cybersecurity. The Brookings Institution, May 2011

    Google Scholar 

  28. Volpano, D.: Towards provable security for multilevel reconfigurable hardware. Technical report, Naval Postgraduate School (2008)

    Google Scholar 

  29. Wassel, H.M.G., Gao, Y., Oberg, J.K., Huffmire, T., Kastner, R., Chong, F.T., Sherwood, T.: SurfNoC: a low latency and provably non-interfering approach to secure networks-on-chip. In: 40th International Symposium on Computer Architecture, ISCA, pp. 583–594. ACM, Tel-Aviv (2013)

    Google Scholar 

Download references

Acknowledgments

This paper is dedicated to José Meseguer, whose work has inspired and formed the basis of so many studies like it.

The work was partially supported by HHS 90TR0003-01 (SHARPS) and NSF CNS 13-30491 (THaW). The views expressed are those of the authors only. We measured lines of code using David A. Wheeler’s ‘SLOCCount’.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael LeMay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

LeMay, M., Gunter, C.A. (2015). Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. In: Martí-Oliet, N., Ölveczky, P., Talcott, C. (eds) Logic, Rewriting, and Concurrency. Lecture Notes in Computer Science(), vol 9200. Springer, Cham. https://doi.org/10.1007/978-3-319-23165-5_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23165-5_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23164-8

  • Online ISBN: 978-3-319-23165-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics