a surrogate system on chip (soc) for security … chetwynd...muhammad yasin and ozgursinanoglu,...

24
A Surrogate System on Chip (SoC) for Security Assessments Brendon Chetwynd 10 April 2019 DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited. This material is based upon work supported under Air Force Contract No. FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the U.S. Air Force. Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227- 7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. © 2019 Massachusetts Institute of Technology.

Upload: others

Post on 29-May-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

A Surrogate System on Chip (SoC) for Security Assessments

Brendon Chetwynd

10 April 2019

DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited. This material is based upon work supported under Air Force Contract No. FA8702-15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the U.S. Air Force. Delivered to the U.S. Government with Unlimited

Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227-7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. © 2019 Massachusetts Institute of Technology.

Page 2: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 2BRWC 4/2019

Outline

• CEP Background• AISS Role• Next Steps• Summary

Page 3: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 3BRWC 4/2019

CEP OverviewCEP 2.0 High-level Architecture

Page 4: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 4BRWC 4/2019

CEP OverviewCEP 2.0 High-level Architecture

Feature Highlights– Accelerators for common DoD functions including DSP and secure communications– Verification test suite for validating baseline functionality– Annotated / labeled security-sensitive design elements

DoD – Department of Defense, DSP – Digital Signal Processing

Page 5: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 5BRWC 4/2019

CEP Overview

An open-source benchmark-enabling design

– Scale: • Sufficient SoC complexity to

stress defensive tool-flows and IP– Diversity:

• Mission-relevant surrogate modules offer diversity of functions

– Releasability: • Open-source license module

permits free distribution to all performers

– Extensibility: • Module approach offers easy

adaptation to meet emerging program objectives

CEP 2.0 High-level Architecture

Feature Highlights– Accelerators for common DoD functions including DSP and secure communications– Verification test suite for validating baseline functionality– Annotated / labeled security-sensitive design elements

IP – Intellectual Property

Page 6: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 6BRWC 4/2019

CEP Overview

CEP 2.0 High-level Architecture

The CEP is an extensible, license-unencumbered surrogate SoCthat will enable evaluation of AISS tools and techniques

An open-source benchmark-enabling design

– Scale: • Sufficient SoC complexity to

stress defensive tool-flows and IP

– Diversity: • Mission-relevant surrogate

modules offer diversity of functions

– Releasability: • Open-source license module

permits free distribution to all performers

– Extensibility: • Module approach offers easy

adaptation to meet emerging program objectives

Feature Highlights– Accelerators for common DoD functions including DSP and secure communications– Verification test suite for validating baseline functionality– Annotated / labeled security-sensitive design elements

Page 7: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 7BRWC 4/2019

CEP – Security Reference Architecture

Benefit to performers: Enables developmental test and evaluation of security techniques

on surrogate system

Benefits to transition partners: Enables risk-reducing collaboration with sensitive project tapeouts

and program schedules

An open-source benchmark-enabling design

– Scale: • Sufficient SoC complexity to

stress defensive tool-flows and IP– Diversity:

• Mission-relevant surrogate modules offer diversity of functions

– Releasability: • Open-source license module

permits free distribution to all performers

– Extensibility: • Module approach offers easy

adaptation to meet emerging program objectives

Page 8: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 8BRWC 4/2019

CEP Roadmap (to date)

CEP Version v1.1 v1.2 v2.0Processor mor1k mor1k RISC-V*

Bus Wishbone AXI4-Lite AXI4-Lite

OS Support None None None

ASIC Optimized - Minimized FPGA specific logic

Test Suite / Documentation /

Other

• Unit C code (sim + HW)• Expanded documentation

• Unit C code (sim + HW)• Waveforms (sim)• Regression (sim + HW)

• Unit C code (sim + HW)• Waveforms (sim)• Regression (sim + HW)

Languages Verilog SystemVerilog, Verilog, VHDL Mixed + Chisel

Release Date July ‘18 Nov ‘18 Apr ‘19

Notes • Labeled Security Targets• Misc. Code Cleanup

ü ü

OS – Operating System, RISC – Reduced Instruction Set Computer, AXI – Advanced Extensible Interface, FPGA – Field Programmable Gate Array, HW – Hardware, sim – Simulation, VHDL – VHSIC Hardware Description Language*Air Force Research Lab RISC-V / University of California Berkley Rocket Chip

Page 9: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 9BRWC 4/2019

Outline

• CEP Background• AISS Role• Next Steps• Summary

Page 10: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 10BRWC 4/2019

AISS Application: Reference Architecture for IV&V

AISS Tool Workflow

CEP Baseline Design AISS-secured CEP

IV&V TeamThreat Emulation

Assessment & Reports

Metrics Collection

Baseline Secure

Performance

Area

Power

Security

Total LOE

Assessment ReportsAssessment

ReportsAssessment Reports

+

• CEP reference architecture can be run through AISS tool workflow

• Independent Verification & Validation (IV&V) team collects metrics (performance, security, and

design efficiency)

• Assessments and reports facilitated by reference architecture comparison

Page 11: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 11BRWC 4/2019

DARPA On-chip Security Reference Model Security Objectives

Malicious Hardwareinsertion of hidden functionality secretly triggered to deliver disruptive payloads

1. Design IntegrityUSG seeks to make make malicious modifications either infeasible or readily detectable

Reverse Engineeringinterpret design intent from available and derived representation to understand secret or confidential algorithms

2. Design ConfidentialityUSG seeks to make:2.a. The SoC not available to non-approved users, or2.b. RE intractable for the lifetime of the IP block

Side Channelextract secret information from the IC through communication channels other than those intended by the design

3. Data ConfidentialityUSG seeks to protect data running on the deployed chip, protecting critical information in situ.

Supply Chainnon-genuine IC sold as real, but realized through cloning, counterfeiting, recycling, remarking

4. Device IntegrityUSG seeks to detect and prevent deployment of non-authentic or non-genuine parts

IC Security Challenges & CEP Role

IC – Integrated Circuit

Page 12: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 12BRWC 4/2019

DARPA On-chip Security Reference Model Security Objectives

Malicious Hardwareinsertion of hidden functionality secretly triggered to deliver disruptive payloads

1. Design IntegrityUSG seeks to make make malicious modifications either infeasible or readily detectable

Reverse Engineeringinterpret design intent from available and derived representation to understand secret or confidential algorithms

2. Design ConfidentialityUSG seeks to make:2.a. The SoC not available to non-approved users, or2.b. RE intractable for the lifetime of the IP block

Side Channelextract secret information from the IC through communication channels other than those intended by the design

3. Data ConfidentialityUSG seeks to protect data running on the deployed chip, protecting critical information in situ.

Supply Chainnon-genuine IC sold as real, but realized through cloning, counterfeiting, recycling, remarking

4. Device IntegrityUSG seeks to detect and prevent deployment of non-authentic or non-genuine parts

IC Security Challenges & CEP Role

USG – United States Government, RE – Reverse Engineering, IP – Intellectual Property

Page 13: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 13BRWC 4/2019

DARPA On-chip Security Reference Model Security Objectives

Malicious Hardwareinsertion of hidden functionality secretly triggered to deliver disruptive payloads

1. Design IntegrityUSG seeks to make make malicious modifications either infeasible or readily detectable

Reverse Engineeringinterpret design intent from available and derived representation to understand secret or confidential algorithms

2. Design ConfidentialityUSG seeks to make:2.a. The SoC not available to non-approved users, or2.b. RE intractable for the lifetime of the IP block

Side Channelextract secret information from the IC through communication channels other than those intended by the design

3. Data ConfidentialityUSG seeks to protect data running on the deployed chip, protecting critical information in situ.

Supply Chainnon-genuine IC sold as real, but realized through cloning, counterfeiting, recycling, remarking

4. Device IntegrityUSG seeks to detect and prevent deployment of non-authentic or non-genuine parts

IC Security Challenges & CEP Role

Common Evaluation Platform

Page 14: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 14BRWC 4/2019

AISS Application: Benchmarking Security Techniques w/ Evaluation Targets

Enables evaluation of AISS technique’s ability to protect security-critical wires from modification, i.e. “Malicious Hardware”

1: Design Integrity: Labeled security-critical (SC) wires identify targets for Trojan to influence or effect

2: Design Confidentiality

3: Data Confidentiality

4: Device Integrity

Example: automated application of guard wires during routing, scaled to the available size tolerance

Increased quantity and diversity of guard wires

Bush, Hicks, Trippel, “Defensive Routing and Related Techniques”, USPTO Provisional 62792012

Page 15: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 15BRWC 4/2019

AISS Application: Benchmarking Security Techniques w/ Evaluation Targets

1: Design Integrity

2: Design Confidentiality: Labeled accelerators representative of DoD protected designs

3: Data Confidentiality

4: Device Integrity

Enables evaluation of AISS technique’s ability to prevent IP theft or mis-use, i.e. “Reverse Engineering”

Example: automated application of Logic Locking, scaled to the available size, area, and performance constraints

Muhammad Yasin and Ozgur Sinanoglu, “Evolution of Logic Locking,” CHES, 2016

Scaled quantity and position of inverters and bits

Page 16: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 16BRWC 4/2019

AISS Application: Benchmarking Security Techniques w/ Evaluation Targets

1: Design Integrity

2: Design Confidentiality

3: Data Confidentiality: Labeled storage areas of crypto keys identify likely targets of an AT threat

4: Device Integrity

Enables evaluation of AISS technique’s ability to protect registers/wires with sensitive data from attacker, i.e. “Side Channel”

Example: automated synthesis / mapping tradeoffs between size + power vs. side channel leakage

Popp, Thomas, et al. "Evaluation of the masked logic style MDPL on a prototype chip." CHES, 2007Batina, Lejla, Nele Mentens, and Ingrid Verbauwhede. "Side-channel issues for designing secure hardware implementations." 11th IEEE International On-Line Testing Symposium. IEEE, 2005

Q

Q

Standard

WDDL iMDPL

Scaled overhead of side channel reduction cell size

AT – Anti-Tamper, WDDL – Wave Dynamic Differential Logic, iMDPL – Improved Masked Dual-Rail Precharge Logic

Page 17: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 17BRWC 4/2019

AISS Application: Benchmarking Security Techniques w/ Evaluation Targets

1: Design Integrity

2: Design Confidentiality

3: Data Confidentiality

4: Device Integrity: Labeled device versions and pedigree

Enables evaluation of AISS techniques to protect device integrity, i.e. “Supply Chain”

Example: automated design watermarking techniques during synthesis

Scaled robustness vs. SWaP impact

Koushanfar, Farinaz, Inki Hong, and Miodrag Potkonjak. "Behavioral synthesis techniques for intellectual property protection." ACM Transactions on Design Automation of Electronic Systems (TODAES) 10.3 (2005): 523-545.SWaP – Size, Weight, and Power

Page 18: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 18BRWC 4/2019

Outline

• CEP Background• AISS Role• Next Steps• Summary

Page 19: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 19BRWC 4/2019

Representative AISS and generator-based CEP enabled tool-flow

Generator-based CEP

Generator-based CEP enables parametric SoC configuration

• Better supports security-centric design optimization through parametric inclusion and enabling of security features

SpecifyArchitecture

Develop Behavioral Code Synthesize Design Place and Route

Designe.g.,

Provenance featurese.g.,

Side-channel resistancee.g.,

Circuit obfuscatione.g.,

Guard wires

f(Performance, Size, Power, Security)

Goal: Parameterized tool flow allowing optimization tradeoff between: Performance, Size, Power, and Security

+& Chisel

Page 20: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 20BRWC 4/2019

CEP – Dual Baseline

DoDTransition

CommercialTransition

Provides dual platform independent validation paths

Common core base and verification suite

Page 21: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 21BRWC 4/2019

CEP Roadmap – Next Steps

CEP Version v2.1 v2.2 v2.3Processor RISC-V* RISC-V* RISC-V*

Bus AXI4-Lite AXI4-Lite AXI4-Lite

OS Support Transitional (See notes) Linux Linux

ASIC Optimized • Optimized AES Core• Boot via SPI-based Flash• Design for Test

• Optimized AES Core• Boot via SPI-based Flash• Design for Test

• Optimized AES Core• Boot via SPI-based Flash• Design for Test

Test Suite / Documentation /

Other

• Unit C code (sim + HW)• Waveforms (sim)• Regression (sim + HW)

• Unit C code (sim + HW)• Waveforms (sim)• Regression (sim + HW)

• Unit C code (sim + HW)• Waveforms (sim)• Regression (sim + HW)

Languages Mixed + Chisel Mixed + Chisel Chisel + Verilog

Release Date Aug ’19 TBD TBD

Notes • Additional hooks to enable future Linux support • Accelerator cores ported to Chisel

*Air Force Research Lab RISC-V / University of California Berkley Rocket Chip AES – Advanced Encryption Standard, SPI – Serial Peripheral Interface, TBD – To be determined

Page 22: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 22BRWC 4/2019

Outline

• CEP Background• AISS Role• Next Steps• Summary

Page 23: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 23BRWC 4/2019

Summary

• CEP is a surrogate SoC that enables:– AISS IV&V activities– Development and test of AISS toolflows and techniques

• RISC-V based CEP release pending:– Leverages modified version of UCB Rocket Chip– Supports broad range of verification options– Contains labeled security targets

• Incremental CEP release schedule to deliver features to AISS performers

Page 24: A Surrogate System on Chip (SoC) for Security … Chetwynd...Muhammad Yasin and OzgurSinanoglu, “Evolution of Logic Locking,” CHES, 2016 Scaled quantity and position of inverters

AISS CEP- 24BRWC 4/2019

Contact Information

CEP Repository: www.github.com/mit-ll/CEP.git

MIT LL Contact Information:

Brendon Chetwynd (781) 981-8212, [email protected] Bush (781) 981-7512, [email protected]