TrustToken, a Trusted SoC solution for Non-Trusted Intellectual Property (IP)s

09/26/2022
by   Muhammed Kawser Ahmed, et al.
0

Secure and trustworthy execution in heterogeneous SoCs is a major priority in the modern computing system. Security of SoCs mainly addresses two broad layers of trust issues: 1. Protection against hardware security threats(Side-channel, IP Privacy, Cloning, Fault Injection, and Denial of Service); and 2. Protection against malicious software attacks running on SoC processors. To resist malicious software-level attackers from gaining unauthorized access and compromising security, we propose a root of trust-based trusted execution mechanism (named as TrustToken) . TrustToken builds a security block to provide a root of trust-based IP security: secure key generation and truly random source. TrustToken only allows trusted communication between the non-trusted third-party IP and the rest of the SoC world by providing essential security features, i.e., secure, isolated execution, and trusted user interaction. The proposed design achieves this by interconnecting the third-party IP interface to TrustToken Controller and checking IP authorization(Token) signals at run-time. TrustToken architecture shows a very low overhead resource utilization LUT (618, 1.16 %), FF (44, 0.04 %), and BUFG (2 , 6.25%) in implementation. The experiment results show that TrustToken can provide a secure, low-cost, and trusted solution for non-trusted SoC IPs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/22/2022

Trusted IP solution in multi-tenant cloud FPGA platform

Because FPGAs outperform traditional processing cores like CPUs and GPUs...
research
03/31/2020

Trust Management as a Service: Enabling Trusted Execution in the Face of Byzantine Stakeholders

Trust is arguably the most important challenge for critical services bot...
research
02/13/2023

Lightweight Encryption and Anonymous Routing in NoC based SoCs

Advances in manufacturing technologies have enabled System-on-Chip (SoC)...
research
05/06/2021

Interposer-Based Root of Trust

Industry is moving towards large-scale system-on-chip (SoC) designs wher...
research
08/07/2022

Garbled EDA: Privacy Preserving Electronic Design Automation

The complexity of modern integrated circuits (ICs) necessitates collabor...
research
05/18/2019

Methodically Defeating Nintendo Switch Security

We explain, step by step, how we strategically circumvented the Nintendo...
research
09/13/2018

Fidelius: Protecting User Secrets from Compromised Browsers

Users regularly enter sensitive data, such as passwords, credit card num...

Please sign up or login with your details

Forgot password? Click here to reset