Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks
We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bi...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on reliability 2014-06, Vol.63 (2), p.661-675 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 675 |
---|---|
container_issue | 2 |
container_start_page | 661 |
container_title | IEEE transactions on reliability |
container_volume | 63 |
creator | Lok-Won Kim Villasenor, John D. |
description | We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement. |
doi_str_mv | 10.1109/TR.2014.2316952 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TR_2014_2316952</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6804702</ieee_id><sourcerecordid>3377824911</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</originalsourceid><addsrcrecordid>eNo9kE1LAzEQhoMoWKtnD14CntMm2SSbHGu1VigobT0vaXaWbu1-mGSR_feutHga3uF5Z-BB6J7RCWPUTLfrCadMTHjClJH8Ao2YlJqwlLNLNKKUaTKszTW6CeEwRCGMHqHdc1_bqnR40dUulk2N19AerYMK6oiLxuNNHyJUpKnJfF-2eAOu82XscVnjuAf84SFA7QA3BV5an_9YD-TJBsjxLEbrvsItuirsMcDdeY7R5-JlO1-S1fvr23y2Io5rE4nUmoHNldaK51I5C-B2zJoEaFpwpqXgOVVK7dLc5tpIKxRPKRilwIDUkIzR4-lu65vvDkLMDk3n6-FlxqRQlAqWmIGanijnmxA8FFnry8r6PmM0-xOZbdfZn8jsLHJoPJwaJQD800pTkVKe_ALuAW5U</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1546004139</pqid></control><display><type>article</type><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Lok-Won Kim ; Villasenor, John D.</creator><creatorcontrib>Lok-Won Kim ; Villasenor, John D.</creatorcontrib><description>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</description><identifier>ISSN: 0018-9529</identifier><identifier>EISSN: 1558-1721</identifier><identifier>DOI: 10.1109/TR.2014.2316952</identifier><identifier>CODEN: IERQAD</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Computer architecture ; Decoding ; dynamic function replacement ; dynamic reconfiguration ; Hardware ; Hardware Trojan horses ; Multiplexing ; reconfigurable logic device ; System-on-chip ; Trojan horses</subject><ispartof>IEEE transactions on reliability, 2014-06, Vol.63 (2), p.661-675</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jun 2014</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</citedby><cites>FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6804702$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,777,781,793,27905,27906,54739</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6804702$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lok-Won Kim</creatorcontrib><creatorcontrib>Villasenor, John D.</creatorcontrib><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><title>IEEE transactions on reliability</title><addtitle>TR</addtitle><description>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</description><subject>Computer architecture</subject><subject>Decoding</subject><subject>dynamic function replacement</subject><subject>dynamic reconfiguration</subject><subject>Hardware</subject><subject>Hardware Trojan horses</subject><subject>Multiplexing</subject><subject>reconfigurable logic device</subject><subject>System-on-chip</subject><subject>Trojan horses</subject><issn>0018-9529</issn><issn>1558-1721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9kE1LAzEQhoMoWKtnD14CntMm2SSbHGu1VigobT0vaXaWbu1-mGSR_feutHga3uF5Z-BB6J7RCWPUTLfrCadMTHjClJH8Ao2YlJqwlLNLNKKUaTKszTW6CeEwRCGMHqHdc1_bqnR40dUulk2N19AerYMK6oiLxuNNHyJUpKnJfF-2eAOu82XscVnjuAf84SFA7QA3BV5an_9YD-TJBsjxLEbrvsItuirsMcDdeY7R5-JlO1-S1fvr23y2Io5rE4nUmoHNldaK51I5C-B2zJoEaFpwpqXgOVVK7dLc5tpIKxRPKRilwIDUkIzR4-lu65vvDkLMDk3n6-FlxqRQlAqWmIGanijnmxA8FFnry8r6PmM0-xOZbdfZn8jsLHJoPJwaJQD800pTkVKe_ALuAW5U</recordid><startdate>20140601</startdate><enddate>20140601</enddate><creator>Lok-Won Kim</creator><creator>Villasenor, John D.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>20140601</creationdate><title>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</title><author>Lok-Won Kim ; Villasenor, John D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-5881ead68862d56caeecb1a93e07f218542d0666b7dad895a46270e966e9e58e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Computer architecture</topic><topic>Decoding</topic><topic>dynamic function replacement</topic><topic>dynamic reconfiguration</topic><topic>Hardware</topic><topic>Hardware Trojan horses</topic><topic>Multiplexing</topic><topic>reconfigurable logic device</topic><topic>System-on-chip</topic><topic>Trojan horses</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Lok-Won Kim</creatorcontrib><creatorcontrib>Villasenor, John D.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>IEEE transactions on reliability</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lok-Won Kim</au><au>Villasenor, John D.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks</atitle><jtitle>IEEE transactions on reliability</jtitle><stitle>TR</stitle><date>2014-06-01</date><risdate>2014</risdate><volume>63</volume><issue>2</issue><spage>661</spage><epage>675</epage><pages>661-675</pages><issn>0018-9529</issn><eissn>1558-1721</eissn><coden>IERQAD</coden><abstract>We describe a set of design methodologies and experiments related to enabling hardware systems to utilize on-the-fly configuration of reconfigurable logic to recover system operation from unexpected loss of system function. Methods we explore include programming using locally stored configuration bitstream as well as using configuration bitstream transmitted from a remote site. We examine specific ways of utilizing reconfigurable logic to regenerate system function, as well as the effectiveness of this approach as a function of the type of attack, and various architectural attributes of the system. Based on this analysis, we propose architectural features of System-on-Chip (SoC) that can minimize performance degradation and maximize the likelihood of seamless system operation despite the function replacement. This approach is highly feasible in that it is not required to specially manage system software and other normal system hardware functions for the replacement.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TR.2014.2316952</doi><tpages>15</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 0018-9529 |
ispartof | IEEE transactions on reliability, 2014-06, Vol.63 (2), p.661-675 |
issn | 0018-9529 1558-1721 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TR_2014_2316952 |
source | IEEE Electronic Library (IEL) |
subjects | Computer architecture Decoding dynamic function replacement dynamic reconfiguration Hardware Hardware Trojan horses Multiplexing reconfigurable logic device System-on-chip Trojan horses |
title | Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T06%3A03%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Dynamic%20Function%20Replacement%20for%20System-on-Chip%20Security%20in%20the%20Presence%20of%20Hardware-Based%20Attacks&rft.jtitle=IEEE%20transactions%20on%20reliability&rft.au=Lok-Won%20Kim&rft.date=2014-06-01&rft.volume=63&rft.issue=2&rft.spage=661&rft.epage=675&rft.pages=661-675&rft.issn=0018-9529&rft.eissn=1558-1721&rft.coden=IERQAD&rft_id=info:doi/10.1109/TR.2014.2316952&rft_dat=%3Cproquest_RIE%3E3377824911%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1546004139&rft_id=info:pmid/&rft_ieee_id=6804702&rfr_iscdi=true |