Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks

We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on reliability 2014-06, Vol.63 (2), p.661-675
Hauptverfasser: Lok-Won Kim, Villasenor, John D.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 675
container_issue 2
container_start_page 661
container_title IEEE transactions on reliability
container_volume 63
creator Lok-Won Kim
Villasenor, John D.
description We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.
doi_str_mv 10.1109/TR.2014.2316952
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TR_2014_2316952</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6804702</ieee_id><sourcerecordid>3377824911</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKtnD14CntMm2SSbHGu1VigobT0vaXaWbu1-mGSR_feutHga3uF5Z-BB6J7RCWPUTLfrCadMTHjClJH8Ao2YlJqwlLNLNKKUaTKszTW6CeEwRCGMHqHdc1_bqnR40dUulk2N19AerYMK6oiLxuNNHyJUpKnJfF-2eAOu82XscVnjuAf84SFA7QA3BV5an_9YD-TJBsjxLEbrvsItuirsMcDdeY7R5-JlO1-S1fvr23y2Io5rE4nUmoHNldaK51I5C-B2zJoEaFpwpqXgOVVK7dLc5tpIKxRPKRilwIDUkIzR4-lu65vvDkLMDk3n6-FlxqRQlAqWmIGanijnmxA8FFnry8r6PmM0-xOZbdfZn8jsLHJoPJwaJQD800pTkVKe_ALuAW5U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1546004139</pqid></control><display><type>article</type><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Lok-Won Kim ; Villasenor, John D.</creator><creatorcontrib>Lok-Won Kim ; Villasenor, John D.</creatorcontrib><description>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</description><identifier>ISSN: 0018-9529</identifier><identifier>EISSN: 1558-1721</identifier><identifier>DOI: 10.1109/TR.2014.2316952</identifier><identifier>CODEN: IERQAD</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Computer architecture ; Decoding ; dynamic function replacement ; dynamic reconfiguration ; Hardware ; Hardware Trojan horses ; Multiplexing ; reconfigurable logic device ; System-on-chip ; Trojan horses</subject><ispartof>IEEE transactions on reliability, 2014-06, Vol.63 (2), p.661-675</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</citedby><cites>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6804702$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6804702$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lok-Won Kim</creatorcontrib><creatorcontrib>Villasenor, John D.</creatorcontrib><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><title>IEEE transactions on reliability</title><addtitle>TR</addtitle><description>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</description><subject>Computer architecture</subject><subject>Decoding</subject><subject>dynamic function replacement</subject><subject>dynamic reconfiguration</subject><subject>Hardware</subject><subject>Hardware Trojan horses</subject><subject>Multiplexing</subject><subject>reconfigurable logic device</subject><subject>System-on-chip</subject><subject>Trojan horses</subject><issn>0018-9529</issn><issn>1558-1721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEQhoMoWKtnD14CntMm2SSbHGu1VigobT0vaXaWbu1-mGSR_feutHga3uF5Z-BB6J7RCWPUTLfrCadMTHjClJH8Ao2YlJqwlLNLNKKUaTKszTW6CeEwRCGMHqHdc1_bqnR40dUulk2N19AerYMK6oiLxuNNHyJUpKnJfF-2eAOu82XscVnjuAf84SFA7QA3BV5an_9YD-TJBsjxLEbrvsItuirsMcDdeY7R5-JlO1-S1fvr23y2Io5rE4nUmoHNldaK51I5C-B2zJoEaFpwpqXgOVVK7dLc5tpIKxRPKRilwIDUkIzR4-lu65vvDkLMDk3n6-FlxqRQlAqWmIGanijnmxA8FFnry8r6PmM0-xOZbdfZn8jsLHJoPJwaJQD800pTkVKe_ALuAW5U</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Lok-Won Kim</creator><creator>Villasenor, John D.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>20140601</creationdate><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><author>Lok-Won Kim ; Villasenor, John D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Computer architecture</topic><topic>Decoding</topic><topic>dynamic function replacement</topic><topic>dynamic reconfiguration</topic><topic>Hardware</topic><topic>Hardware Trojan horses</topic><topic>Multiplexing</topic><topic>reconfigurable logic device</topic><topic>System-on-chip</topic><topic>Trojan horses</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lok-Won Kim</creatorcontrib><creatorcontrib>Villasenor, John D.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on reliability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lok-Won Kim</au><au>Villasenor, John D.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</atitle><jtitle>IEEE transactions on reliability</jtitle><stitle>TR</stitle><date>2014-06-01</date><risdate>2014</risdate><volume>63</volume><issue>2</issue><spage>661</spage><epage>675</epage><pages>661-675</pages><issn>0018-9529</issn><eissn>1558-1721</eissn><coden>IERQAD</coden><abstract>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TR.2014.2316952</doi><tpages>15</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 0018-9529
ispartof IEEE transactions on reliability, 2014-06, Vol.63 (2), p.661-675
issn 0018-9529
1558-1721
language eng
recordid cdi_crossref_primary_10_1109_TR_2014_2316952
source IEEE Electronic Library (IEL)
subjects Computer architecture
Decoding
dynamic function replacement
dynamic reconfiguration
Hardware
Hardware Trojan horses
Multiplexing
reconfigurable logic device
System-on-chip
Trojan horses
title Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T06%3A03%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20Function%20Replacement%20for%20System-on-Chip%20Security%20in%20the%20Presence%20of%20Hardware-Based%20Attacks&rft.jtitle=IEEE%20transactions%20on%20reliability&rft.au=Lok-Won%20Kim&rft.date=2014-06-01&rft.volume=63&rft.issue=2&rft.spage=661&rft.epage=675&rft.pages=661-675&rft.issn=0018-9529&rft.eissn=1558-1721&rft.coden=IERQAD&rft_id=info:doi/10.1109/TR.2014.2316952&rft_dat=%3Cproquest_RIE%3E3377824911%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1546004139&rft_id=info:pmid/&rft_ieee_id=6804702&rfr_iscdi=true