safe architecture
TRANSCRIPT
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 1/15
Reconfigurable Hardware for High-Security/
High-Performance Embedded Systems:The SAFES Persecti!e
Presented By:
T.A.deshpande
Guided By:
Prof.R.R.Dube
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 2/15
Contents: Introduction
Need Of SA!S
SA!S:Security Architecture For E"beddedSyste"
Security Pri"iti#es $ %onitors: T&! A!S $RC'
uture Scope
Conc(usion
Refenceses
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 3/15
The SA!S:Security Architecture For E"bedded
Syste"
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 4/15
Need:&ard)are Attac*s
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 5/15
SA!S Architecture:
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 6/15
I"p(e"entation of one of thepri"iti#es on PGA:A!S +Ad#anced
!ncryption Standard,
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 7/15
S% for Architecture
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 8/15
Security Pri"iti#es:RC'
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 10/15
Di-erent con/urations for A!S
0.R.T. Datapath I"p(e"entation
A!S )ithout security
eedbac* "ode )ith au(t Detection
eedbac* "ode )ith au(t To(erence
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 12/15
uture Scope:
uture )or* inc(udes the denition of other "onitors todetect attac*s +contro( 1o) "onitor )ithin e"beddedprocessor,. This point is i"portant as (o) co"p(e2ityso(utions ha#e to be dened to *eep the tota( syste" cost
reasonab(e.
So(utions based on si/natures +usin/ o3ine pro(in/techni4ues, see" pro"isin/.
%any 4uestions sti(( re"ain open on ho) to "a*e security
co""onp(ace in e"bedded syste"s. In particu(ar5 dea(in/)ith
recon/urab(e hard)are and denin/ the o#erhead costfor security "echanis"s at the hard)are (e#e( arecha((en/in/ 4uestions.
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 13/15
Conc(usion: In this paper5 an ana(ysis of the "a6or issues dea(in/ )ith
security at the hard)are (e#e( is proposed. 0e ha#e presented the SA!S architecture )hich re(ies on
dyna"ic recon/uration to i"pro#e the security )ithin !S.
This architecture are to continuous(y "onitor theoperation of the syste" to detect abnor"a( beha#ior andto use recon/urab(e hard)are to pro#ide #arious (e#e(s ofprotection and perfor"ance.
Resu(ts on the A!S and RC' a(/orith"s sho) that the
1e2ibi(ity of this so(ution enab(es the denition of anener/y7e8cient so(ution )hi(e addressin/ the securityissue.
7/26/2019 SAFE Architecture
http://slidepdf.com/reader/full/safe-architecture 14/15
References: Guy Go/niat, Member, IEEE5 Ti("an 0o(f , Senior Member, IEEE5 0ayne
Bur(eson, Senior Member, IEEE5 9ean7Phi(ippe Di/uet, Member, IEEE5i(ian Bossuet5 and Ro"ain ;as(in5 <Recon/urab(e &ard)are for &i/h7Security= &i/h7Perfor"ance !"bedded Syste"s:The SA!S
Perspecti#e> IEEE TRANSACTIONS ON VERY LARGE SCALEINTEGRATION (VLSI) SYSTEMS, VOL. 16, NO. 2, FEBRARY 2!!"
# An PGA7Based Perfor"ance !#a(uation of the A!Sn B(oc* CipherCandidate A(/orith" ina(ists> Ada" 9. !(birt5 0. ?ip5 B. Chet)ynd5 andC. Paar IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION(VLSI) SYSTEMS, VOL. $, NO. %, AGST 2!!1.
))).)i*ipedia.co" S. Ra#i5 A. Ra/hunathan5 and S. Cha*radhar5 <Ta"per resistance
"echanis"s for secure e"bedded syste"s5> in &ro'. IEEE In. Con.VLSI *e+in5 @5 pp. ''EE.