Visible to the public System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats

TitleSystem on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats
Publication TypeConference Paper
Year of Publication2022
AuthorsHaque, Siam, Mirzaei, Shahnam
Conference Name2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
KeywordsARM, Collaboration, composability, Computer architecture, embedded system, Embedded systems, Hardware, isolated domains, policy governance, pubcrawl, Robustness, Safety, Sandboxing, secure system, security, side-channel attacks, SoC, system-on-chip, threats
AbstractThis paper presents a definition of a secure system and design principles, which help govern security policies within an embedded system. By understanding a secure system, a common system on chip (SoC) architecture is evaluated and their vulnerabilities explored. This effort helped define requirements for a framework for a secure and isolated SoC architecture for users to develop in. Throughout this paper, a SoC architecture framework for isolated domains has been proposed and its robustness verified against different attack scenarios. To support different levels of criticality and complexity in developing user applications, three computing domains were proposed: security and safety critical (SSC) domain, high performance (HP) domain, and sandbox domain. These domains allow for complex applications to be realized with varying levels of security. Isolation between different computing domains is established using consumer off the shelf (COTS) techniques and architectural components provided by the Zynq Ultrascale+ (ZU+) multiprocessor SoC (MPSoC). To the best of our knowledge, this is the first work that implements a secure system design on the ZU+ platform. There have been many other implementations in hardware security to mitigate certain attack scenarios such as side channel attacks, temporal attacks, hardware trojans, etc. However, our work is different than others, as it establishes the framework for isolated computing domains for secure applications and also verifies system security by attacking one domain from the others.
DOI10.1109/HOST54066.2022.9840295
Citation Keyhaque_system_2022