Automatized Fault Attack Emulation for Penetration Testing
|
|
- Brendan Charles
- 8 years ago
- Views:
Transcription
1 Automatized Fault Attack Emulation for Penetration Testing Johannes Grinschgl 1, Thomas Aichinger 3, Armin Krieg 1, Christian Steger 1, Reinhold Weiss 1, Holger Bock 2, Josef Haid 2 1, Graz University of Technology, Austria 2 Infineon Technologies Austria AG, Design Center Graz, Austria 3 Austria Card GmbH, Austria 12th International Common Criteria Conference Kuala Lumpur, Malaysia, September 29,
2 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 2
3 Motivation (1/3) Increasing complexity of SoC More-than-Moore [Arden2010] Increasing test duration Increasing security and dependability requirements High costs Loss of trust Loss of life SOC Consumer Portable Design Complexity Trends (Source: ITRS Update, "System Drivers ) Increasing number of known fault attacks Increasing knowledge of attackers Better attack tools Cheaper analysis equipment 3
4 Motivation (2/3) Common criteria certification Time consuming Expensive Penetration tests very late in development phase Fault detection during certification Longer time to market Reevaluation Test coverage of penetration tests? Efficiency evaluation of new security features 4
5 Motivation (3/3) How to solve this problem? Target: Reduction of deficits during design phase Early evaluation of security features Support of very large test pattern sets Open sample evaluation support SW test without HW security features (HW test without SW security features) Solution: Automatized Fault Attack Emulation 5
6 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 6
7 Introduction (1/2) Emulation Mapping of smart card functionality to FPGA Emulation resembles very accurately the behavior of the final device Extendibility in respect to fault emulation Real-time emulation performance On-line debugging On-line register and memory examination Standard SW development tool Easy-to-use Rapid FPGA Prototyping Platform, Tanto2-FPGA system, 7
8 Introduction (2/2) POWER-MODES 1 vision: Flexible and Fast Fault Emulator Whole system evaluation for fault attack vulnerability Software Hardware Operating system Saboteur-based attack method Automatized VHDL code base adaptation Automatized result evaluation Austria Card ACOS operating system 1 POWer EmulatoR and MOdel based DEpendability and Security evaluation platform, funded by the Austrian Federal Ministry for Transport, Innovation, and Technology under the FIT-IT contract FFG Project Partners: Infineon Technologies Austria AG and Austria Card 8
9 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 9
10 Related Work (1/2) Fault injection mechanisms Simulation [Jenn1994, Velanzco2001, Rothbart2004] Slow Flexible Physical test [Karlsson1995] Late in design phase Expensive Emulation [Bayar2008, Kenterlis2006, Kafka2008, Sterpone2007, Sonza2006, Baraza2005, Leveugle2000] Fast Low-cost compared to physical tests Compromise between cost and flexibility Early in design phase 10
11 Related Work (2/2) Fault emulation methods Partial reconfiguration [Bayar2008, Kenterlis2006, Kafka2008, Sterpone2007, Sonza2006] Runtime adaptation of LUTs Requires specialized FPGA devices Mutants VHDL modification to modules [Baraza2005, Leveugle2000] Requires pre-modified modules for every fault scenario Saboteur VHDL modification into signal lines [Baraza2005, Leveugle2000] Very flexible if supported by automatized placement Common Criteria Certification Process [JIL2009], [CCEVS2005] 11
12 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 12
13 Autom. Fault Attack Emulation (1/5) Host PC Fault injection flow control Attack Database Storage of different attack scenarios Fault injection controller Saboteur Management Saboteurs Single-bit type Bus type Port type Saboteur interface Saboteur <-> FI controller connection 13
14 Autom. Fault Attack Emulation (2/5) What are saboteurs? Modules which can disturb signals Placed between signal source and sink Advantages Definable detailed attack Full control over the signal Flexibility Applicable to Security and Dependability Evaluations Attack patterns Specification of fault location Mapping of physical to logical location 14
15 Autom. Fault Attack Emulation (3/5) Fault emulation initialization Attack time Attack type Memory address Attack scenario Result evaluation Output Memory Report generation Repeat until all addresses and points in time are tested 15
16 Autom. Fault Attack Emulation (4/5) Attack on security relevant regions Memory regions Time Calculation example Some 100 Addresses 20-50ms for one command ~1ms is interesting ~1M Attack Scenarios 1sec per attack 11,6 Days Long time tests Attack granularity refinement Information gain for real-chip testing 16
17 Autom. Fault Attack Emulation (5/5) Power emulation [Bachmann2010] Automatized control signal extraction Control signal weighting Accumulation Characterization using gate level simulations and physical tests Information extraction from the power profile Emulate power information available to attacker Average error below 10% Power [normalized] 1 Equipment P estimated = c * x[ t] Time [normalized] [Genser2009] i i Reference Estimated 17
18 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 18
19 Impact on Certification Flow (1/3) Impact on smart card embedded SW development SW evaluation without activated HW security features Evaluation of SW security implementation Automated verification of SW countermeasure implementation and test replication using HW with enabled security features Testing of security relevant code is difficult (practical experience) Coding guideline verification E.g. SW handling of memory manipulations E.g. Detection of program counter manipulations Replicable penetration test 19
20 Impact on Certification Flow (2/3) Impact on certification (penetration tests) Advantages for the lab Gain information for physical attacks Attack time Attack region (RAM, Core, ) No blocking of expensive laboratory equipment Enabling of parallel test scenarios Certain HW security features can be deactivated 20
21 Impact on Certification Flow (3/3) Use the emulator as open sample/ sample with known secrets Freely configurable hardware Internal values can be read out and manipulated Registers Memory Program counter Hardware security features can be deactivated Memory encryption Fault detection mechanisms Manipulation of critical signals Fault detection mechanisms Crypto calculation Freely definable software load Debugging is possible Get memory location of critical code 21
22 Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 22
23 Conclusion (1/3) SW development view Test security features Verification of coding guideline Allow to debug SW Open sample approach Specific deactivation of HW security features Allow to test SW on the HW Allow to manipulate HW features Run-time power estimation Extract interesting time slots E.g. Cryptographic calculations 23
24 Conclusion (2/3) Provide information for real chip certification Attack time Attack region RAM, Core, Crypto, Speed-up of security evaluation Simple tests can already be performed during SW development Provide information for the real tests Test counter measures Detailed attack result evaluation by memory analysis Enabling of complex fault attack scenarios 24
25 Conclusion (3/3) Future Work More detailed result evaluation Multiple FPGA configurations for parallel emulation Automatic increase of test granularity at critical regions 25
26 Q&A Thanks for your attention! Questions? 26
27 References [Arden2010] [Jenn1994] [Velanzco2001] [Rothbart2004] [Karlsson1995] [Bayar2008] [Kenterlis2006] [Kafka2008] [Sterpone2007] [Sonza2006] [Baraza2005] [Leveugle2000] [Grinschgl2011] [Pohl2010] [Pellegrini2010] [Bachmann2010] [Genser2009] [JIL2009] [CCEVS2005] W. Arden, M. Brillouët, P. Cogez, M. Graef, B. Huizing, R. Mahnkopf: More-than-Moore, ITRS E. Jenn, J. Arlat, M. Rimen, J. Ohlsson, and J. Karlsson, Fault injection into vhdl models: the mefisto tool, in Proc. Twenty-Fourth Int Fault-Tolerant Computing FTCS-24. Digest of Papers. Symp, 1994, pp R. Velazco, R. Leveugle, and O. Calvo, Upset-like fault injection in vhdl descriptions: A method and preliminary results, in Proc. IEEE Int Defect and Fault Tolerance in VLSI Systems Symp, 2001, pp K. Rothbart, U. Neffe, C. Steger, R. Weiss, E. Rieger, and A. Muehlberger, High level fault injection for attack simulation in smart cards, in Proc. 13th Asian Test Symp, 2004, pp J. Karlsson and P. Folkesson, Application of three physical fault injection techniques to the experimental assessment of the mars architecture. IEEE Computer Society Press, 1995, pp S. Bayar and A. Yurdakul, Self-reconfiguration on spartan-iii fpgas with compressed partial bitstreams via a parallel configuration access port (cpcap) core, in Proc. Ph.D. Research in Microelectronics and Electronics PRIME 2008, 2008, pp P. Kenterlis, N. Kranitis, A. Paschalis, D. Gizopoulos, and M. Psarakis, A low-cost seu fault emulation platform for sram-based fpgas, in Proc. 12th IEEE Int. On-Line Testing Symp. IOLTS 2006, L. Kafka, Analysis of applicability of partial runtime reconfiguration in fault emulator in xilinx fpgas, in DDECS 08: Proceedings of the th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems. Washington, DC, USA: IEEE Computer Society, 2008, pp L. Sterpone and M. Violante, A new partial reconfiguration-based fault-injection system to evaluate seu effects in sram-based fpgas, Nuclear Science, IEEE Transactions on, vol. 54, no. 4, pp , M. Sonza Reorda, L. Sterpone, M. Violante, M. Portela-Garcia, C. Lopez-Ongil, and L. Entrena, Fault injection-based reliability evaluation of sopcs, in Proc. Eleventh IEEE European Test Symp. ETS 06, 2006, pp J. C. Baraza, J. Gracia, D. Gil, and P. J. Gil, Improvement of fault injection techniques based on vhdl code modification, in Proc. Tenth IEEE Int. High-Level Design Validation and Test Workshop, 2005, pp R. Leveugle, Fault injection in vhdl descriptions and emulation, in Proc. IEEE Int Defect and Fault Tolerance in VLSI Systems Symp, 2000, pp J. Grinschgl, A. Krieg, C. Steger, R. Weiss, H. Bock, and J. Haid, Modular fault injector for multiple fault dependability and security evaluations, in DSD 2011, In Press. C. Pohl, R. Fuest, and M. Porrmann, vmagic automatic code generation for vhdl, newsletter edacentrum, vol. 2, pp. 7 10, Jul A. Pellegrini, V. Bertacco, and T. Austin, Fault-based attack of rsa authentication, in Proc. Design, Automation & Test in Europe Conf. & Exhibition (DATE), 2010, pp C. Bachmann, A. Genser, C. Steger, R. Weiss, and J. Haid, Automated Power Characterization for Run-Time Power Emulation of SoC Designs, in DSD 2010, 2010, pp A. Genser, C. Bachmann, J. Haid, C. Steger, and R. Weiss, An emulation-based real-time power profiling unit for embedded software, in SAMOS 2009, 2009, pp Joint Interpretation Library, Application of Attack Potential to Smartcards,, 2009,online available on National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme, Common Criteria Evaluation and Validation Scheme Validation Report, 2005, online available onhttp:// 27
Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001
Agenda Introduzione Il mercato Dal circuito integrato al System on a Chip (SoC) La progettazione di un SoC La tecnologia Una fabbrica di circuiti integrati 28 How to handle complexity G The engineering
More informationON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT
216 ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT *P.Nirmalkumar, **J.Raja Paul Perinbam, @S.Ravi and #B.Rajan *Research Scholar,
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationSmartcard IC Platform Protection Profile
Smartcard IC Platform Protection Profile Version 1.0 July 2001 developed by Atmel Smart Card ICs Hitachi Europe Ltd. Infineon Technologies AG Philips Semiconductors Registered and Certified by Bundesamt
More informationEli Levi Eli Levi holds B.Sc.EE from the Technion.Working as field application engineer for Systematics, Specializing in HDL design with MATLAB and
Eli Levi Eli Levi holds B.Sc.EE from the Technion.Working as field application engineer for Systematics, Specializing in HDL design with MATLAB and Simulink targeting ASIC/FGPA. Previously Worked as logic
More informationOn Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
More informationInternational Workshop on Field Programmable Logic and Applications, FPL '99
International Workshop on Field Programmable Logic and Applications, FPL '99 DRIVE: An Interpretive Simulation and Visualization Environment for Dynamically Reconægurable Systems? Kiran Bondalapati and
More informationReconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra
More informationCoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography
CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography 28. Februar 2008 Alexander Klimm, Oliver Sander, Jürgen Becker Institut für Technik der Informationsverarbeitung Sylvain
More informationDesign of Remote Laboratory dedicated to E2LP board for e-learning courses.
Proceedings of the E2LP Workshop Warsaw, 2014, pp. 25 29 DOI: 10.15439/2014F672 ACSIS, Vol. 4 Design of Remote Laboratory dedicated to E2LP board for e-learning courses. Jan Piwiński Email: jpiwinski@piap.pl
More information2. TEACHING ENVIRONMENT AND MOTIVATION
A WEB-BASED ENVIRONMENT PROVIDING REMOTE ACCESS TO FPGA PLATFORMS FOR TEACHING DIGITAL HARDWARE DESIGN Angel Fernández Herrero Ignacio Elguezábal Marisa López Vallejo Departamento de Ingeniería Electrónica,
More informationOffline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech esimpson@vt.edu Patrick Schaumont Virginia Tech schaum@vt.edu Abstract Many Field-Programmable Gate Array (FPGA) based
More information7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationPaolo Maistri. September 8, 2008. Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3
CURRICULUM VITAE ET STUDIORUM Paolo Maistri September 8, 2008 TABLE OF CONTENTS Personal Information 2 Education and Studies 2 Academic Activities and Affiliations 3 Teaching Activities 4 Teaching Assistance......................................
More informationAlgorithmic Skeletons for the Design of Partially Reconfigurable Systems
for the Design of Partially Reconfigurable Systems Heinz Nixdorf Institute, Florian Dittmann Stefan Frank Franz Rammig Universität Paderborn Motivation Dynamically Reconfigurable Systems - Promising benefits
More informationSolutions for Increasing the Number of PC Parallel Port Control and Selecting Lines
Solutions for Increasing the Number of PC Parallel Port Control and Selecting Lines Mircea Popa Abstract: The paper approaches the problem of control and selecting possibilities offered by the PC parallel
More informationHigh-Level Synthesis for FPGA Designs
High-Level Synthesis for FPGA Designs BRINGING BRINGING YOU YOU THE THE NEXT NEXT LEVEL LEVEL IN IN EMBEDDED EMBEDDED DEVELOPMENT DEVELOPMENT Frank de Bont Trainer consultant Cereslaan 10b 5384 VT Heesch
More informationOptimising the resource utilisation in high-speed network intrusion detection systems.
Optimising the resource utilisation in high-speed network intrusion detection systems. Gerald Tripp www.kent.ac.uk Network intrusion detection Network intrusion detection systems are provided to detect
More informationHow To Design An Image Processing System On A Chip
RAPID PROTOTYPING PLATFORM FOR RECONFIGURABLE IMAGE PROCESSING B.Kovář 1, J. Kloub 1, J. Schier 1, A. Heřmánek 1, P. Zemčík 2, A. Herout 2 (1) Institute of Information Theory and Automation Academy of
More informationSecurity IC Platform Protection Profile
Security IC Platform Protection Profile Version 1.0 15.06.2007 developed by Atmel Infineon Technologies AG NXP Semiconductors Renesas Technology Europe Ltd. STMicroelectronics Registered and Certified
More informationhttp://www.ece.ucy.ac.cy/labs/easoc/people/kyrkou/index.html BSc in Computer Engineering, University of Cyprus
Christos Kyrkou, PhD KIOS Research Center for Intelligent Systems and Networks, Department of Electrical and Computer Engineering, University of Cyprus, Tel:(+357)99569478, email: ckyrkou@gmail.com Education
More informationHardware Task Scheduling and Placement in Operating Systems for Dynamically Reconfigurable SoC
Hardware Task Scheduling and Placement in Operating Systems for Dynamically Reconfigurable SoC Yuan-Hsiu Chen and Pao-Ann Hsiung National Chung Cheng University, Chiayi, Taiwan 621, ROC. pahsiung@cs.ccu.edu.tw
More informationNIST Cybersecurity Framework Manufacturing Implementation
NIST Cybersecurity Framework Manufacturing Implementation Keith Stouffer Project Leader, Cybersecurity for Smart Manufacturing Systems Engineering Lab, NIST Manufacturing Cybersecurity Research at NIST
More informationPUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
More informationReconfig'09 Cancun, Mexico
Reconfig'09 Cancun, Mexico New OPBHW Interface for Real-Time Partial Reconfiguration of FPGA Julien Delorme, Amor Nafkha, Pierre Leray, Christophe Moy SUPELEC/IETR 10 December 2009 SUPELEC - Campus de
More informationHardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09
Testen von Embedded Systems Hardware in the Loop (HIL) Testing VU 2.0, 182.117, WS 2008/09 Raimund dkirner Testing Embedded Software Testing the whole system including the physical environment is not possible
More informationTowards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection
Towards the Hardware Accelerated Defensive Virtual Machine - Type and Bound Protection Michael Lackner 1, Reinhard Berlach 1, Johannes Loinig 2, Reinhold Weiss 1, and Christian Steger 1 1 Institute for
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationFPGA area allocation for parallel C applications
1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University
More informationJoint Interpretation Library
for smart cards and similar devices Document purpose: provide requirements to developers and guidance to evaluators to fulfill the Security Architecture requirements of CC V3 ADV_ARC family. Version 2.0
More informationMsC in Advanced Electronics Systems Engineering
MsC in Advanced Electronics Systems Engineering 1 2 General overview Location: Dijon, University of Burgundy, France Tuition Fees : 475 / year Course Language: English Course duration: 1 year Level: Second
More informationHow To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)
FPGA IMPLEMENTATION OF 4D-PARITY BASED DATA CODING TECHNIQUE Vijay Tawar 1, Rajani Gupta 2 1 Student, KNPCST, Hoshangabad Road, Misrod, Bhopal, Pin no.462047 2 Head of Department (EC), KNPCST, Hoshangabad
More informationPulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
More informationExtending the Power of FPGAs. Salil Raje, Xilinx
Extending the Power of FPGAs Salil Raje, Xilinx Extending the Power of FPGAs The Journey has Begun Salil Raje Xilinx Corporate Vice President Software and IP Products Development Agenda The Evolution of
More informationLA-UR- Title: Author(s): Intended for: Approved for public release; distribution is unlimited.
LA-UR- Approved for public release; distribution is unlimited. Title: Author(s): Intended for: Los Alamos National Laboratory, an affirmative action/equal opportunity employer, is operated by the Los Alamos
More informationAn On-chip Security Monitoring Solution For System Clock For Low Cost Devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices Frank Vater Innovations for High Performance Microelectronics Im Technologiepark 25 15236 Frankfurt (Oder), Germany vater@ihpmicroelectronics.com
More informationChallenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved
Siemens AG - Corporate Technology - IT Security Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG 2015. All rights reserved Not a single
More informationLesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationSeeking Opportunities for Hardware Acceleration in Big Data Analytics
Seeking Opportunities for Hardware Acceleration in Big Data Analytics Paul Chow High-Performance Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Toronto Who
More informationNetworking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
More informationSoC Curricula at Tallinn Technical University
SoC Curricula at Tallinn Technical University Margus Kruus, Kalle Tammemäe, Peeter Ellervee Tallinn Technical University Phone: +372-6202250, Fax: +372-6202246 kruus@cc.ttu.ee nalle@cc.ttu.ee lrv@cc.ttu.ee
More informationHorst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
More informationOpen Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
More informationReCoSoC'11 Montpellier, France. Implementation Scenario for Teaching Partial Reconfiguration of FPGA
ReCoSoC'11 Montpellier, France Implementation Scenario for Teaching Partial Reconfiguration of FPGA Pierre Leray, Amor Nafkha, Christophe Moy SUPELEC/IETR 22 June 2011 SUPELEC - Campus de Rennes - France
More informationBest Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
More informationIntroduction to Embedded Systems. Software Update Problem
Introduction to Embedded Systems CS/ECE 6780/5780 Al Davis logistics minor Today s topics: more software development issues 1 CS 5780 Software Update Problem Lab machines work let us know if they don t
More informationARM Webinar series. ARM Based SoC. Abey Thomas
ARM Webinar series ARM Based SoC Verification Abey Thomas Agenda About ARM and ARM IP ARM based SoC Verification challenges Verification planning and strategy IP Connectivity verification Performance verification
More informationExtended Boundary Scan Test breaching the analog ban. Marcel Swinnen, teamleader test engineering
Extended Boundary Scan Test breaching the analog ban Marcel Swinnen, teamleader test engineering 11-11-2014 2 zero-defect quality impossible to produce zero-defect boards early involvement services (Design
More informationVirtual Platforms Addressing challenges in telecom product development
white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous
More informationFAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.
More informationAn Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths
An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths N. KRANITIS M. PSARAKIS D. GIZOPOULOS 2 A. PASCHALIS 3 Y. ZORIAN 4 Institute of Informatics & Telecommunications, NCSR
More informationFSMD and Gezel. Jan Madsen
FSMD and Gezel Jan Madsen Informatics and Mathematical Modeling Technical University of Denmark Richard Petersens Plads, Building 321 DK2800 Lyngby, Denmark jan@imm.dtu.dk Processors Pentium IV General-purpose
More informationTesting of Digital System-on- Chip (SoC)
Testing of Digital System-on- Chip (SoC) 1 Outline of the Talk Introduction to system-on-chip (SoC) design Approaches to SoC design SoC test requirements and challenges Core test wrapper P1500 core test
More informationImplementation of emulated digital CNN-UM architecture on programmable logic devices and its applications
Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications Theses of the Ph.D. dissertation Zoltán Nagy Scientific adviser: Dr. Péter Szolgay Doctoral School
More informationCryptography & Network-Security: Implementations in Hardware
Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu
More informationOF 1.3 Testing and Challenges
OF 1.3 Testing and Challenges May 1 st, 2014 Ash Bhalgat (Senior Director, Products), Luxoft Santa Clara, CA USA April-May 2014 1 Agenda OpenFlow : What and Why? State of OpenFlow Conformance Challenges
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue3, March -2013 1 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 2, Issue3, March -2013 1 FPGA IMPLEMENTATION OF HARDWARE TASK MANAGEMENT STRATEGIES Assistant professor Sharan Kumar Electronics Department
More informationVerfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014
Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution
More informationNetworking Remote-Controlled Moving Image Monitoring System
Networking Remote-Controlled Moving Image Monitoring System First Prize Networking Remote-Controlled Moving Image Monitoring System Institution: Participants: Instructor: National Chung Hsing University
More informationPerformance Oriented Management System for Reconfigurable Network Appliances
Performance Oriented Management System for Reconfigurable Network Appliances Hiroki Matsutani, Ryuji Wakikawa, Koshiro Mitsuya and Jun Murai Faculty of Environmental Information, Keio University Graduate
More informationHow To Write An Fpa Programmable Gate Array
Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications Niccolò Battezzati Luca Sterpone Massimo Violante Reconfigurable Field Programmable Gate Arrays for Mission-Critical Applications
More informationTesting & Verification of Digital Circuits ECE/CS 5745/6745. Hardware Verification using Symbolic Computation
Testing & Verification of Digital Circuits ECE/CS 5745/6745 Hardware Verification using Symbolic Computation Instructor: Priyank Kalla (kalla@ece.utah.edu) 3 Credits Mon, Wed, 1:25-2:45pm, WEB L105 Office
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationStandardized software components will help in mastering the. software should be developed for FlexRay were presented at
Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of
More informationSecure Portable Data Server. 25/06/2012 Alexei Troussov SMIS team INRIA Rocquencourt
Secure Portable Data Server 25/06/2012 Alexei Troussov SMIS team INRIA Rocquencourt Agenda SMIS team (Secure & Mobile Information Systems) Areas of research interests Past projects and results Recent work
More informationDeveloping reliable Multi-Core Embedded-Systems with NI Linux Real-Time
Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time Oliver Bruder National Instruments Switzerland oliver.bruder@ Embedded Product Design Surveys 66% Product designs complete over budget
More informationSelf-Evaluation Configuration for Remote Data Logging Systems
IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 6-8 September 2007, Dortmund, Germany Self-Evaluation Configuration for Remote Data
More informationDesign of a High Speed Communications Link Using Field Programmable Gate Arrays
Customer-Authored Application Note AC103 Design of a High Speed Communications Link Using Field Programmable Gate Arrays Amy Lovelace, Technical Staff Engineer Alcatel Network Systems Introduction A communication
More informationNetwork Attack Platform
Design and Implementation of a Network Attack Platform Based on Plug-in Technology Li Gen, Wang Bailing *, Liu Yang, Bai Xuefeng and Yuan Xinling Department of Computer Science & Technology Harbin Institute
More informationAn Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
More informationSecured Embedded Many-Core Accelerator for Big Data Processing
Secured Embedded Many- Accelerator for Big Data Processing Amey Kulkarni PhD Candidate Advisor: Professor Tinoosh Mohsenin Energy Efficient High Performance Computing (EEHPC) Lab University of Maryland,
More informationFPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,
More informationOpenSPARC Program. David Weaver Principal Engineer, UltraSPARC Architecture Principal OpenSPARC Evangelist Sun Microsystems, Inc. www.opensparc.
OpenSPARC Program David Weaver Principal Engineer, UltraSPARC Architecture Principal OpenSPARC Evangelist Sun Microsystems, Inc. 1 Agenda What is OpenSPARC? OpenSPARC University Program OpenSPARC Resources
More informationIndustrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationProduct Development Flow Including Model- Based Design and System-Level Functional Verification
Product Development Flow Including Model- Based Design and System-Level Functional Verification 2006 The MathWorks, Inc. Ascension Vizinho-Coutry, avizinho@mathworks.fr Agenda Introduction to Model-Based-Design
More informationExample-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic
Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic Clifford Wolf, Johann Glaser, Florian Schupfer, Jan Haase, Christoph Grimm Computer Technology /99 Overview Ultra-Low-Power
More informationFPGA Music Project. Matthew R. Guthaus. Department of Computer Engineering, University of California Santa Cruz http://vlsida.soe.ucsc.
Department of Computer Engineering, University of California Santa Cruz http://vlsida.soe.ucsc.edu Biographic Info 2006 PhD, University of Michigan in Electrical Engineering 2003-2005 Statistical Physical
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationAn Architecture for Secure Software Defined Radio
An Architecture for Secure Software Defined Radio Chunxiao Li Department of EE Princeton University chunxiao@princeton.edu Anand Raghunathan School of ECE Purdue University raghunathan@purdue.edu Niraj
More informationFondamenti su strumenti di sviluppo per microcontrollori PIC
Fondamenti su strumenti di sviluppo per microcontrollori PIC MPSIM ICE 2000 ICD 2 REAL ICE PICSTART Ad uso interno del corso Elettronica e Telecomunicazioni 1 2 MPLAB SIM /1 MPLAB SIM is a discrete-event
More informationDigital Systems Design! Lecture 1 - Introduction!!
ECE 3401! Digital Systems Design! Lecture 1 - Introduction!! Course Basics Classes: Tu/Th 11-12:15, ITE 127 Instructor Mohammad Tehranipoor Office hours: T 1-2pm, or upon appointments @ ITE 441 Email:
More informationAims and Objectives. E 3.05 Digital System Design. Course Syllabus. Course Syllabus (1) Programmable Logic
Aims and Objectives E 3.05 Digital System Design Peter Cheung Department of Electrical & Electronic Engineering Imperial College London URL: www.ee.ic.ac.uk/pcheung/ E-mail: p.cheung@ic.ac.uk How to go
More informationEVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
More informationDevelopment of a Research-oriented Wireless System for Human Performance Monitoring
Development of a Research-oriented Wireless System for Human Performance Monitoring by Jonathan Hill ECE Dept., Univ. of Hartford jmhill@hartford.edu Majdi Atallah ECE Dept., Univ. of Hartford atallah@hartford.edu
More informationTest vehicle tool to assess candidate ITSEF s competency
Test vehicle tool to assess candidate ITSEF s competency September 28, 2011 Takayuki TOBITA IT Security Center (ISEC) Information-technology Promotion Agency, JAPAN (IPA) 1 Common Criteria Scheme in Japan
More informationSupporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April 2012. Version 2.
Supporting Document Guidance Security Architecture requirements (ADV_ARC) for smart cards and similar devices April 2012 Version 2.0 CCDB-2012-04-003 Foreword This is a supporting document, intended to
More informationReviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
More informationA First Course in Digital Design Using VHDL and Programmable Logic
A First Course in Digital Design Using VHDL and Programmable Logic Shawki Areibi Abstract Present industry practice has created a high demand for systems designers with knowledge and experience in using
More informationHardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
More informationEchtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur
Echtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur 2015 The MathWorks, Inc. 1 Model-Based Design Continuous Verification and Validation Requirements
More informationThe Design of Hardware for Remote Control System of the Manipulator
The Design of Hardware for Remote Control System of the Manipulator Ing. Michal Hammerschmiedt, Department of Agricultural, Food and Environmental Engineering, Faculty of Agronomy, Mendel University in
More informationA New Multi-site Test for System-on-Chip Using Multi-site Star Test Architecture
A New Multi-site Test for System-on-Chip Using Multi-site Star Test Architecture Dongkwan Han, Yong Lee, and Sungho Kang As the system-on-chip (SoC) design becomes more complex, the test costs are increasing.
More informationIntroduction to Digital System Design
Introduction to Digital System Design Chapter 1 1 Outline 1. Why Digital? 2. Device Technologies 3. System Representation 4. Abstraction 5. Development Tasks 6. Development Flow Chapter 1 2 1. Why Digital
More informationEmbedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 martin.schramm@th-deg.de Embedded computing platforms have become omnipresent intend to alleviate
More informationDesign of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition
Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition Qing Li, Shanqing Hu * School of Information and Electronic Beijing Institute of Technology Beijing, China
More informationA Reconfigurable RTOS with HW/SW Co-scheduling for SOPC
A Reconfigurable RTOS with HW/SW Co-scheduling for SOPC Qingxu Deng, Shuisheng Wei, Hai Xu, Yu Han, Ge Yu Department of Computer Science and Engineering Northeastern University, China xhsoldier@163.com
More information