Title | System on Chip (SoC) Security Architecture Framework for Isolated Domains Against Threats |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Haque, Siam, Mirzaei, Shahnam |
Conference Name | 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
Keywords | ARM, Collaboration, composability, Computer architecture, embedded system, Embedded systems, Hardware, isolated domains, policy governance, pubcrawl, Robustness, Safety, Sandboxing, secure system, security, side-channel attacks, SoC, system-on-chip, threats |
Abstract | This paper presents a definition of a secure system and design principles, which help govern security policies within an embedded system. By understanding a secure system, a common system on chip (SoC) architecture is evaluated and their vulnerabilities explored. This effort helped define requirements for a framework for a secure and isolated SoC architecture for users to develop in. Throughout this paper, a SoC architecture framework for isolated domains has been proposed and its robustness verified against different attack scenarios. To support different levels of criticality and complexity in developing user applications, three computing domains were proposed: security and safety critical (SSC) domain, high performance (HP) domain, and sandbox domain. These domains allow for complex applications to be realized with varying levels of security. Isolation between different computing domains is established using consumer off the shelf (COTS) techniques and architectural components provided by the Zynq Ultrascale+ (ZU+) multiprocessor SoC (MPSoC). To the best of our knowledge, this is the first work that implements a secure system design on the ZU+ platform. There have been many other implementations in hardware security to mitigate certain attack scenarios such as side channel attacks, temporal attacks, hardware trojans, etc. However, our work is different than others, as it establishes the framework for isolated computing domains for secure applications and also verifies system security by attacking one domain from the others. |
DOI | 10.1109/HOST54066.2022.9840295 |
Citation Key | haque_system_2022 |