Embedded Tutorial: Emerging Frontiers in Embedded Security

3 downloads 55 Views 135KB Size Report
challenges that are commonly addressed in secure embedded system research include efficient cryptography and security processing, and designing hardware ...
2013 26th International Conference on VLSI Design (VLSID 2013)

Embedded Tutorial

Emerging Frontiers in Embedded Security

Mehran Mozaffari Kermani, Princeton University Meng Zhang, Princeton University Anand Raghunathan, Purdue University Niraj K. Jha, Princeton University

Abstract Traditionally, embedded computing platforms have primarily been used in a few application domains such as consumer electronics, mobile appliances (phones/PDAs/tablets), communications infrastructure, automotive, and industrial automation and control. The collective and individual security challenges of these application domains have been the subject of considerable research over the last decade. Key challenges that are commonly addressed in secure embedded system research include efficient cryptography and security processing, and designing hardware and software that are immune to physical and side-channel attacks. These are worthwhile challenges and efforts to address them have led to (and will continue to lead to) several useful innovations. However, the evolving characteristics and usage models of emerging embedded computing platforms necessitate a fresh look at embedded security and new approaches to secure embedded system design. In the future, computing platforms are expected to be deeply embedded within physical objects and spaces, creating an Internet of Things. These embedded computing platforms will enable a wide spectrum of applications, including implantable and wearable medical devices, smart homes, smart meters, brainmachine interfaces, physical infrastructure monitoring, and intelligent transportation systems. Unfortunately, the explosion in devices and connectivity creates a much larger attack surface, while the unprecedented coupling of computing systems with the physical world threatens to blur the boundaries between cyber and physical crimes. Unless significant attention is paid to security, the Internet of Things could well be turned into an Internet of “Things to be Hacked”! In this tutorial, we provide an overview of trends in embedded computing and highlight their implications on secure embedded system design. We illustrate new challenges in embedded system security using case studies such as medical devices and smart homes, provide examples of security attacks, and describe some initial efforts towards addressing them.

Speaker Biographies Mehran Mozaffari-Kermani received the B.Sc. degree in electrical and computer engineering from the University of Tehran in 2005, and the M.E.Sc. and Ph.D. degrees from the Department of Electrical and Computer Engineering at The University of Western Ontario in 2007 and 2011, respectively. After the lxviii

completion of his Ph.D., he worked at the Advanced Micro Devices (AMD) as a senior ASIC/layout designer, integrating sophisticated security/cryptographic capabilities into a single chip. Dr. MozaffariKermani was awarded a Natural Sciences and Engineering Research Council of Canada (NSERC) postdoctoral fellowship in 2011. Currently, he is an NSERC postdoctoral research fellow at the Electrical Engineering Department of Princeton University. His research interests include emerging security/privacy measures for embedded systems, cryptographic hardware systems, fault diagnosis and tolerance in cryptographic hardware, VLSI reliability, and low-power secure and efficient FPGA and ASIC designs.

Meng Zhang received his B.S. degree in Electronics from Beijing University, China, in 2008, and M.A. degree in Electrical Engineering from Princeton, NJ, in 2010. He is currently pursuing a Ph.D. degree in Electrical Engineering at Princeton University, NJ. His research interests include low-power system design, computer security, and body area networks.

Anand Raghunathan received the B.Tech. degree in electrical and electronics engineering from the Indian Institute of Technology, Madras, India, in 1992 and the M.A. and Ph.D. degrees in electrical engineering from Princeton University, Princeton, NJ in 1994 and 1997, respectively. He is currently a Professor in the School of Electrical and Computer Engineering at Purdue University, West Lafayette, IN. Previously, he was a Senior Research Staff Member at NEC Laboratories America in Princeton, NJ, where he led research projects related to embedded security, System-on-Chip architectures, design methodologies, and design tools. He has co-authored a book and six book chapters, over 190 papers, holds or has filed for 24 U.S. patents, and presented several full-day and embedded conference tutorials in the above areas. He has received seven best paper awards and five best paper nominations at leading conferences. He received a Patent of the Year Award (an award recognizing the invention that has achieved the highest impact), and two Technology Commercialization Awards from NEC. He was chosen by MIT's Technology Review among the TR35 (top 35 innovators under 35 years, across various disciplines of science and technology) in 2006, for his work on "making mobile secure".

Niraj K. Jha received his B.Tech. degree in Electronics and Electrical Communication Engineering from Indian Institute of Technology, Kharagpur, India in 1981, M.S. degree in Electrical Engineering from S.U.N.Y. at Stony Brook, NY in 1982, and Ph.D. degree in Electrical Engineering from University of Illinois, Urbana, IL in 1985. He is a Professor of Electrical Engineering at Princeton University. He is a Fellow of IEEE and ACM. He has served as the editor-in-chief of IEEE Transactions on VLSI Systems and an Associate Editor of IEEE Transactions on CAD, IEEE Transactions on Circuits & Systems I and II, IEEE Transactions on VLSI Systems, and Journal of Electronic Testing: Theory and Applications, and is currently serving as an Associate Editor of IEEE Transactions on Computers, Journal of Low Power Electronics, and Journal of Nanotechnology. He has published over 360 papers out of which 14 have received various awards, and six have received best paper award nominations. He is also a co-author/coeditor of five books, 12 book chapters, and 13 patents. His research interests include FinFETs, IC power/thermal analysis and optimization, computer-aided design of integrated circuits and systems, digital system testing, computer architecture, quantum computing, and computer security.

lxix