论文标题
将启动免受非易失性存储器的可编程架构
Secure Boot from Non-Volatile Memory for Programmable SoC Architectures
论文作者
论文摘要
在现代嵌入式系统中,整个产品生命周期中对综合安全标准的信任已成为越来越重要的访问市场要求。但是,这些安全标准依赖于强制性免疫假设,例如通常从非挥发存储器(NVM)加载的初始系统配置的完整性和真实性。这尤其适用于基于FPGA的可编程芯片(PSOC)体系结构,因为对象代码以及配置数据很容易超过安全启动的容量。在这种情况下,攻击者可以尝试更改NVM设备的内容以操纵系统。因此,PSOC依赖于NVM的完整性,尤其是在启动时间时。在本文中,我们提出了一种方法,用于通过利用FPGA的可重构逻辑来在潜在的不安全环境中安全启动。在这里,FPGA通过在PSOC上从NVM加载的任何用户应用程序进行配置和执行之前,通过执行所需的完整性和真实性验证来充当安全的锚点。提出的安全启动过程基于以下假设和步骤:1)存储在完全加密的安全数字存储卡(SD卡)上的启动配置或闪存为NVM。 2)在启动时,加载了称为可信赖的内存界面单元(TMIU)的硬件设计,以验证已部署的NVM的真实性,然后在解密其内容的完整性后。为了证明我们的方法的实用性,我们将方法集成到了Xilinx Zynq PSOC的供应商特定的安全启动过程中,并评估了设计目标的性能,功率和资源成本。
In modern embedded systems, the trust in comprehensive security standards all along the product life cycle has become an increasingly important access-to-market requirement. However, these security standards rely on mandatory immunity assumptions such as the integrity and authenticity of an initial system configuration typically loaded from Non-Volatile Memory (NVM). This applies especially to FPGA-based Programmable System-on-Chip (PSoC) architectures, since object codes as well as configuration data easily exceed the capacity of a secure bootROM. In this context, an attacker could try to alter the content of the NVM device in order to manipulate the system. The PSoC therefore relies on the integrity of the NVM particularly at boot-time. In this paper, we propose a methodology for securely booting from an NVM in a potentially unsecure environment by exploiting the reconfigurable logic of the FPGA. Here, the FPGA serves as a secure anchor point by performing required integrity and authenticity verifications prior to the configuration and execution of any user application loaded from the NVM on the PSoC. The proposed secure boot process is based on the following assumptions and steps: 1) The boot configurationis stored on a fully encrypted Secure Digital memory card (SD card) or alternatively Flash acting as NVM. 2) At boot time, a hardware design called Trusted Memory-Interface Unit (TMIU) is loaded to verify first the authenticity of the deployed NVM and then after decryption the integrity of its content. To demonstrate the practicability of our approach, we integrated the methodology into the vendor-specific secure boot process of a Xilinx Zynq PSoC and evaluated the design objectives performance, power and resource costs.