Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Embedded multiprocessor system-on-chip (MPSoC) architectures allow implementation of mixed critical applications and provide security mechanisms to segregate and protect system resources such as ARM TrustZone. These architectures enforce strict security measures right from the powering on of the system, to prevent misuse and compromise. However, such security mea- sures have been found vulnerable where security design practices are not considered or are poorly implemented, particularly at software and hardware stack boundaries. Also, the embedded solutions developed using these MPSoC platforms are vulnerable to single points of failure and do not contain active response or mitigations for circumstances where a compromise occurs.
This paper proposes pro-active hardware based policing and policy enforcement approach, along with system architecture and its hardware components, to this research problem. The architecture is physically isolated from the rich computing resources which actively monitors communications of system resources on the ARM AMBA-AXI4 bus. It detects anomalous system behaviours such as policy violation or compromised bus communication responses, and responds with predefined active countermeasures, such as deletion of secret data or disabling of the device to tackle security vulnerabilities and attacks at run- time. This proposed solution complements existing embedded hardware and software security technologies and provides an additional layer of hardware security when a vulnerability is found and exploited. This contribution lends itself to the principle of least privilege, implemented in software-based access control solutions like SELinux to mitigate when other protections have failed. This paper presents a proof-of-concept work supported by preliminary synthesis results on Xilinx Zynq-7000 and Ultra- Scale+ MPSoC chips.
LanguageEnglish
Title of host publication2018 31st IEEE International System-on-Chip Conference (SOCC)
Publisher IEEE
Pages130-135
Number of pages6
ISBN (Electronic)978-1-5386-1491-4
DOIs
Publication statusPublished - 21 Jan 2019
Event31st International IEEE System-on-Chip Conference - Washington, United States
Duration: 04 Sep 201807 Sep 2018
Conference number: 31
https://www.ieee-socc.org/

Publication series

Name
ISSN (Electronic)2164-1706

Conference

Conference31st International IEEE System-on-Chip Conference
Abbreviated titleIEEE SoCC
CountryUnited States
CityWashington
Period04/09/201807/09/2018
Internet address

Fingerprint

Hardware
Communication
Access control
System-on-chip
Hardware security

Keywords

  • FPGA
  • MPSoC
  • SoC
  • Zynq
  • ARM AMBA AXI4
  • ARM TrustZone
  • Hardware Trojan
  • Active Policing

Cite this

Siddiqui, F. M., Hagan, M., & Sezer, S. (2019). Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. In 2018 31st IEEE International System-on-Chip Conference (SOCC) (pp. 130-135). [8618531] IEEE . https://doi.org/10.1109/SOCC.2018.8618531
Siddiqui, Fahad Manzoor ; Hagan, Matthew ; Sezer, Sakir. / Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE , 2019. pp. 130-135
@inproceedings{5422033e02d84585956c31e64eedcc45,
title = "Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs",
abstract = "Embedded multiprocessor system-on-chip (MPSoC) architectures allow implementation of mixed critical applications and provide security mechanisms to segregate and protect system resources such as ARM TrustZone. These architectures enforce strict security measures right from the powering on of the system, to prevent misuse and compromise. However, such security mea- sures have been found vulnerable where security design practices are not considered or are poorly implemented, particularly at software and hardware stack boundaries. Also, the embedded solutions developed using these MPSoC platforms are vulnerable to single points of failure and do not contain active response or mitigations for circumstances where a compromise occurs.This paper proposes pro-active hardware based policing and policy enforcement approach, along with system architecture and its hardware components, to this research problem. The architecture is physically isolated from the rich computing resources which actively monitors communications of system resources on the ARM AMBA-AXI4 bus. It detects anomalous system behaviours such as policy violation or compromised bus communication responses, and responds with predefined active countermeasures, such as deletion of secret data or disabling of the device to tackle security vulnerabilities and attacks at run- time. This proposed solution complements existing embedded hardware and software security technologies and provides an additional layer of hardware security when a vulnerability is found and exploited. This contribution lends itself to the principle of least privilege, implemented in software-based access control solutions like SELinux to mitigate when other protections have failed. This paper presents a proof-of-concept work supported by preliminary synthesis results on Xilinx Zynq-7000 and Ultra- Scale+ MPSoC chips.",
keywords = "FPGA, MPSoC, SoC, Zynq, ARM AMBA AXI4, ARM TrustZone, Hardware Trojan, Active Policing",
author = "Siddiqui, {Fahad Manzoor} and Matthew Hagan and Sakir Sezer",
year = "2019",
month = "1",
day = "21",
doi = "10.1109/SOCC.2018.8618531",
language = "English",
publisher = "IEEE",
pages = "130--135",
booktitle = "2018 31st IEEE International System-on-Chip Conference (SOCC)",

}

Siddiqui, FM, Hagan, M & Sezer, S 2019, Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. in 2018 31st IEEE International System-on-Chip Conference (SOCC)., 8618531, IEEE , pp. 130-135, 31st International IEEE System-on-Chip Conference, Washington, United States, 04/09/2018. https://doi.org/10.1109/SOCC.2018.8618531

Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. / Siddiqui, Fahad Manzoor; Hagan, Matthew; Sezer, Sakir.

2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE , 2019. p. 130-135 8618531.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs

AU - Siddiqui, Fahad Manzoor

AU - Hagan, Matthew

AU - Sezer, Sakir

PY - 2019/1/21

Y1 - 2019/1/21

N2 - Embedded multiprocessor system-on-chip (MPSoC) architectures allow implementation of mixed critical applications and provide security mechanisms to segregate and protect system resources such as ARM TrustZone. These architectures enforce strict security measures right from the powering on of the system, to prevent misuse and compromise. However, such security mea- sures have been found vulnerable where security design practices are not considered or are poorly implemented, particularly at software and hardware stack boundaries. Also, the embedded solutions developed using these MPSoC platforms are vulnerable to single points of failure and do not contain active response or mitigations for circumstances where a compromise occurs.This paper proposes pro-active hardware based policing and policy enforcement approach, along with system architecture and its hardware components, to this research problem. The architecture is physically isolated from the rich computing resources which actively monitors communications of system resources on the ARM AMBA-AXI4 bus. It detects anomalous system behaviours such as policy violation or compromised bus communication responses, and responds with predefined active countermeasures, such as deletion of secret data or disabling of the device to tackle security vulnerabilities and attacks at run- time. This proposed solution complements existing embedded hardware and software security technologies and provides an additional layer of hardware security when a vulnerability is found and exploited. This contribution lends itself to the principle of least privilege, implemented in software-based access control solutions like SELinux to mitigate when other protections have failed. This paper presents a proof-of-concept work supported by preliminary synthesis results on Xilinx Zynq-7000 and Ultra- Scale+ MPSoC chips.

AB - Embedded multiprocessor system-on-chip (MPSoC) architectures allow implementation of mixed critical applications and provide security mechanisms to segregate and protect system resources such as ARM TrustZone. These architectures enforce strict security measures right from the powering on of the system, to prevent misuse and compromise. However, such security mea- sures have been found vulnerable where security design practices are not considered or are poorly implemented, particularly at software and hardware stack boundaries. Also, the embedded solutions developed using these MPSoC platforms are vulnerable to single points of failure and do not contain active response or mitigations for circumstances where a compromise occurs.This paper proposes pro-active hardware based policing and policy enforcement approach, along with system architecture and its hardware components, to this research problem. The architecture is physically isolated from the rich computing resources which actively monitors communications of system resources on the ARM AMBA-AXI4 bus. It detects anomalous system behaviours such as policy violation or compromised bus communication responses, and responds with predefined active countermeasures, such as deletion of secret data or disabling of the device to tackle security vulnerabilities and attacks at run- time. This proposed solution complements existing embedded hardware and software security technologies and provides an additional layer of hardware security when a vulnerability is found and exploited. This contribution lends itself to the principle of least privilege, implemented in software-based access control solutions like SELinux to mitigate when other protections have failed. This paper presents a proof-of-concept work supported by preliminary synthesis results on Xilinx Zynq-7000 and Ultra- Scale+ MPSoC chips.

KW - FPGA

KW - MPSoC

KW - SoC

KW - Zynq

KW - ARM AMBA AXI4

KW - ARM TrustZone

KW - Hardware Trojan

KW - Active Policing

U2 - 10.1109/SOCC.2018.8618531

DO - 10.1109/SOCC.2018.8618531

M3 - Conference contribution

SP - 130

EP - 135

BT - 2018 31st IEEE International System-on-Chip Conference (SOCC)

PB - IEEE

ER -

Siddiqui FM, Hagan M, Sezer S. Pro-Active Policing and Policy Enforcement Architecture for Securing MPSoCs. In 2018 31st IEEE International System-on-Chip Conference (SOCC). IEEE . 2019. p. 130-135. 8618531 https://doi.org/10.1109/SOCC.2018.8618531