Skip to main content

2011 | Buch

Design Methodologies for Secure Embedded Systems

Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

herausgegeben von: Alexander Biedermann, H. Gregor Molter

Verlag: Springer Berlin Heidelberg

Buchreihe : Lecture Notes in Electrical Engineering

insite
SUCHEN

Über dieses Buch

Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.

Inhaltsverzeichnis

Frontmatter
Towards Co-design of HW/SW/Analog Systems
Abstract
We give an overview of methods for modeling and system level design of mixed HW/SW/Analog systems. For abstract, functional modeling we combine Kahn Process Networks and Timed Data Flow Graphs. In order to model concrete architectures, we combine KPN and TDF with transaction level modeling. We describe properties and issues raised by the combination of these models and show how these models can be used for executable specification and architecture exploration. For application in industrial practice we show how these models and methods can be implemented by combining the standardized SystemC AMS and TLM extensions.
Christoph Grimm, Markus Damm, Jan Haase
A Flexible Hierarchical Approach for Controlling the System-Level Design Complexity of Embedded Systems
Abstract
This paper summarizes results of the PhD theses on system-level design of embedded systems at the Institute Integrated Circuits and Systems Lab under the survey of Prof. Dr.-Ing. Sorin Huss. A straightforward identification of suited system-level implementations of distributed embedded systems is increasingly restricted by the complexity of the solution space and the size of modern systems. Therefore, concepts are mandatory, which are able to control the design complexity and assist the reuse of components. A hierarchical, task-based design approach and two algorithms are developed, which allow to derive dynamically partial specification models for design space exploration on different levels of detail as well as task descriptions for IP encapsulation So, the descriptive complexity of specifications is considerably reduced and the execution time of system-level synthesis algorithm can be adopted to the current requirements of the designer. The task behavior is captured by Input/Output Relations, which represent a very general and powerful means of encapsulating internal implementation details and of describing data as well as control-flow information on different levels of detail. The necessity of these concepts are demonstrated by means of an MP3 decoder application example.
Stephan Klaus
Side-Channel Analysis – Mathematics Has Met Engineering
Abstract
We illustrate the relevance of advanced mathematical methods in side-channel analysis by two detailed examples. This emphasizes the central statement of this paper that progress in the field of side-channel analysis demands a close cooperation between mathematicians and engineers.
Werner Schindler
Survey of Methods to Improve Side-Channel Resistance on Partial Reconfigurable Platforms
Abstract
In this survey we introduce a few secure hardware implementation methods for FPGA platforms in the context of side-channel analysis. Side-channel attacks may exploit data-dependent physical leakage to estimate secret parameters like a cryptographic key. In particular, IP-cores for security applications on embedded systems equipped with FPGAs have to be made secure against these attacks. Thus, we discuss how the countermeasures, known from literature, can be applied on FPGA-based systems to improve the side-channel resistance. After introducing the reader to the FPGA technology and the FPGA reconfiguration workflow, we discuss the hiding-based countermeasure against power analysis attacks especially designed for reconfigurable FPGAs.
Marc Stöttinger, Sunil Malipatlolla, Qizhi Tian
Multicast Rekeying: Performance Evaluation
Abstract
This paper presents a new approach for performance evaluation of rekeying algorithms. New system metrics related to rekeying performance are defined: Rekeying Quality of Service and Rekeying Access Control. These metrics are estimated in relation to both group size and group dynamics. A simultor prototype demonstrates the merit of this unified assessment method by means of a comprehensive case study.
Abdulhadi Shoufan, Tolga Arul
Robustness Analysis of Watermark Verification Techniques for FPGA Netlist Cores
Abstract
In this paper we analyze the robustness of watermarking techniques for FPGA IP cores against attacks. Unlike most existing watermarking techniques, the focus of our techniques lies on ease of verification, even if the protected cores are embedded into a product. Moreover, we have concentrated on higher abstraction levels for embedding the watermark, particularly at the logic level, where IP cores are distributed as netlist cores. With the presented watermarking methods, it is possible to watermark IP cores at the logic level and identify them with a high likelihood and in a reproducible way in a purchased product from a company that is suspected to have committed IP fraud. For robustness analysis we enhanced a theoretical watermarking model, originally introduced for multimedia watermarking. Finally, two exemplary watermarking techniques for netlist cores using different verification strategies are described and the robustness against attacks is analyzed.
Daniel Ziener, Moritz Schmid, Jürgen Teich
Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications
Abstract
This work presents a SoC-based co-processor for public key cryptography and server application. Because of the focus on the server side, high throughput was chosen as metric for efficiency instead of low latency as usually done in literature. This becomes important in light of the second goal, which is flexibility regarding the supported cryptographic schemes. Starting with an unified view on the abstraction levels of different public key cryptographic schemes and an overview on their parallelization possibilities, parallelization is applied in a more refined way than usually done in literature: It is examined on each abstraction level which degree of parallelization still aids throughput without sacrificing flexibility.
Ralf Laue
Cellular-Array Implementations of Bio-inspired Self-healing Systems: State of the Art and Future Perspectives
Abstract
This survey aims to give an overview of bio-inspired systems which employ cellular arrays in order to achieve redundancy and self-healing capabilities. In spite of numerous publications in this particular field, only a few fundamentally different architectures exist. After a general introduction to research concerning bio-inspired systems, we describe these fundamental system types and evaluate their advantages and disadvantages. In addition, we identify areas of interest for future research.
André Seffrin, Alexander Biedermann
Combined Man-in-the-Loop and Software-in-the-Loop Simulation
Electronic Stability Program for Trucks on the Daimler Driving Simulator
Abstract
The main targets in commercial vehicle development in the near future will be improving the energy effiency of the vehicles and improving vehicle safety. One of the measures to increase safety is the decision of the European Committee to make electronic stability systems compulsory for nearly all trucks and buses. To guarantee that the system performs well for a wide variety of trucks and buses, new simulation methods are being introduced into the development process. The system functionalities, which are developed by system suppliers, are implemented by Daimler Trucks as software-in-the-loop codes into vehicle dynamics simulation models. By using the multi-body simulation software’s real-time capabilities, it has become possible to investigate the interaction between the vehicle and the electronic stability system on the Daimler driving simulator.
Uwe Baake, Klaus Wüst
Secure Beamforming for Weather Hazard Warning Application in Car-to-X Communication
Abstract
Intelligent networking of cars and infrastructure (Car-to-X, C2X) by means of dedicated short range communication represents one of the most promising attempts towards enhancement of active safety and traffic efficiency in the near future. Nevertheless, as an open and decentralized system, Car-to-X is exposed to various attacks against security and driver’s privacy. This work presents an approach for enhancing security and privacy on physical layer, i.e. already during sending and receiving of messages. The technique is called Secure Beamforming and is based on the radiation patterns produced by the antenna array proposed in [1].
In this work we evaluate the feasibility of this antenna for Weather Hazard Warning, a C2X application which includes communication scenarios among cars and between cars and infrastructure. By means of a dedicated simulator, appropriate beams are explored and beamforming protocols for different communication scenarios are proposed.
Hagen Stübing, Attila Jaeger
Backmatter
Metadaten
Titel
Design Methodologies for Secure Embedded Systems
herausgegeben von
Alexander Biedermann
H. Gregor Molter
Copyright-Jahr
2011
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-16767-6
Print ISBN
978-3-642-16766-9
DOI
https://doi.org/10.1007/978-3-642-16767-6

Neuer Inhalt