: Alexander Biedermann, H. Gregor Molter
: Alexander Biedermann, Gregor H Molter
: Design Methodologies for Secure Embedded Systems Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
: Springer-Verlag
: 9783642167676
: 1
: CHF 134.00
:
: Elektronik, Elektrotechnik, Nachrichtentechnik
: English
: 207
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF
Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? How can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration of design methodologies for secure embedded systems. This Festschrift is dedicated to him and his research on the occasion of his 60th birthday.
Preface6
Table of Contents11
Towards Co-design of HW/SW/Analog Systems12
Introduction12
Related Work14
Kahn Process Networks, Timed Data Flow, and TLM15
Executable Specification17
Combination of KPN and TDF17
Modeling and Simulation of KPN and TDF with SystemC18
Architecture Exploration21
Architecture Mapping to Analog and HW/SW Processors22
Estimation of Quantitative Properties by System Simulation26
Coupling of TDF and TLM Models of Computation27
Example30
Conclusion33
References34
A Flexible Hierarchical Approach for Controlling the System-Level Design Complexity of Embedded Systems36
Introduction36
Related Work38
Computational Model39
Hierarchical Specification Method40
Dynamic System Behavior42
Task Behavior44
Generating Current Model Views46
Results48
Conclusion52
References52
Side-Channel Analysis – Mathematics Has Met Engineering54
Introduction54
My Personal Relation to Side-Channel Analysis55
Timing Attack from CARDIS 199856
The Original Attack DKL+9857
A Closer Look on Montgomery's Multiplication Algorithm59
The Optimised CARDIS Timing Attack60
Stochastic Properties of Montgomery's Multiplication Algorithm: Further Consequences64
A New Method in Power Analysis65
The Stochastic Approach66
The Stochastic Approach Supports Design70
Conclusion71
References71
Survey of Methods to Improve Side-Channel Resistance on Partial Reconfigurable Platforms74
Introduction74
Reconfigurable Hardware75
FPGA Platform Technology75
Terminology77
GeneralWorkflow for Partial Reconfiguration79
Workflow for PR in Xilinx FPGAs81
Side-Channel Attacks82
Countermeasures against Power Attacks85
Masking85
Hiding86
Reconfigurable Technology-Based Countermeasure88
Mutating the Data Path89
Summary and Conclusion93
References93
Multicast Rekeying: Performance Evaluation96
Introduction96
Rekeying Benchmark Design Concept97
Benchmark Abstraction Model98
Benchmark Data Flow99
Rekeying Benchmark as a Simulation Environment100
Cost Metrics and Group Parameters100
Evaluation Criteria and Simulation Modes101
Rekeying Benchmark Design102
Request Generator103
Algorithm Manager107
Performance Evaluator110
Case Study112
Conclusion114
References114
Robustness Analysis of Watermark Verification Techniques for FPGA Netlist Cores116
Introduction116
Related Work118
Theoretical Watermark Model for Robustness Analysis against Attacks119
Definitions122
Threat Model124
Watermark Verification Strategies for Embedded FPGAs126
Watermark Verification Using the FPGA Bitfile127
Lookup Table Content Extraction127
Watermarks in Functional LUTs for Netlist Cores128
PowerWatermarking131
Conclusions136
References136
Efficient and Flexible Co-processor for Server-Based Public Key Cryptography Applications139
Introduction139
Related Work140