DocumentCode :
3701711
Title :
Secure design-for-debug for Systems-on-Chip
Author :
Jerry Backer;David H?ly;Ramesh Karri
Author_Institution :
Polytechnic School of Engineering, New York University, Brooklyn, NY 11201
fYear :
2015
Firstpage :
1
Lastpage :
8
Abstract :
This work tackles the conflict between security and debugging of modern Systems-on-Chip (SoC). On one hand, security objectives require confidentiality of assets such as cryptographic keys, configuration and calibration data, and proprietary firmware. On the other hand, debugging instrumentation enables tracing of internal SoC signals that expose these assets via a debug port or debug memory. Mechanisms proposed to tackle this conflict either disable debugging before the SoC is released, or provide binary (all-or-nothing) access to the debugging instrumentation based on an authentication mechanism. The first approach is not practical because the debugging instrumentation is needed for in-field maintenance. The second approach does not protect against a rogue insider in a debugging team. We enhance the debugging instrumentation with security features to ensure that assets are only exposed to their owners during debug. The features first tag each asset with a unique ID of its owner, authenticate each debugger to verify access privileges, and filter the assets to determine which ones to expose given the debugger privileges. The proposed features incur 6% area and power costs, and do not impact firmware execution during debug.
Keywords :
"Authentication","Microprogramming","Debugging","IP networks","Servers","Fabrics"
Publisher :
ieee
Conference_Titel :
Test Conference (ITC), 2015 IEEE International
Type :
conf
DOI :
10.1109/TEST.2015.7342418
Filename :
7342418
Link To Document :
بازگشت