License: Creative Commons Attribution 3.0 Unported license (CC BY 3.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagRep.9.7.94
URN: urn:nbn:de:0030-drops-116377
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2019/11637/
Go back to Dagstuhl Reports


Arora, Divya ; Polian, Ilia ; Regazzoni, Francesco ; Schaumont, Patrick
Weitere Beteiligte (Hrsg. etc.): Divya Arora and Ilia Polian and Francesco Regazzoni and Patrick Schaumont

Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)

pdf-format:
dagrep_v009_i007_p094_19301.pdf (4 MB)


Abstract

The goal of the Dagstuhl Seminar 19301 ``Secure Composition for Hardware System'' was to establish a common understanding of principles and techniques that can facilitate composition and integration of hardware systems to achieve specified security guarantees.

Theoretical foundations of secure composition have been laid out in the past, but they are limited to software systems. New and unique security challenges arise when a real system composed of a range of hardware components, including application-specific blocks, programmable microcontrollers, and reconfigurable fabrics, are put together. For example, these components may have different owners, different trust assumptions and may not even have a common language to describe their security properties to each other. Physical and side-channel attacks that take advantage of various physical properties to undermine a system's security objectives add another level of complexity to the secure composition problem. Moreover, practical hardware systems include software of tremendous size and complexity, and hardware-software interaction can create new security challenges.

The seminar considered secure composition both from a pure hardware perspective, where multiple hardware blocks are composed in, e.g., a system on chip (SoC), and from a hardware-software perspective where hardware is integrated within a system that includes software. The seminar brought together researchers and industry practitioners from fields that have to deal with secure composition: Secure hardware architectures, hardware-oriented security, applied cryptography, test and verification of security properties. By involving industrial participants, we were able to get insights on real-world challenges, heuristics, and methodologies employed to address them and initiate a discussion towards new solutions.

BibTeX - Entry

@Article{arora_et_al:DR:2019:11637,
  author =	{Divya Arora and Ilia Polian and Francesco Regazzoni and Patrick Schaumont},
  title =	{{Secure Composition for Hardware Systems (Dagstuhl Seminar 19301)}},
  pages =	{94--116},
  journal =	{Dagstuhl Reports},
  ISSN =	{2192-5283},
  year =	{2019},
  volume =	{9},
  number =	{7},
  editor =	{Divya Arora and Ilia Polian and Francesco Regazzoni and Patrick Schaumont},
  publisher =	{Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik},
  address =	{Dagstuhl, Germany},
  URL =		{https://drops.dagstuhl.de/opus/volltexte/2019/11637},
  URN =		{urn:nbn:de:0030-drops-116377},
  doi =		{10.4230/DagRep.9.7.94},
  annote =	{Keywords: Hardware, Secure composition, Security, Software}
}

Keywords: Hardware, Secure composition, Security, Software
Collection: Dagstuhl Reports, Volume 9, Issue 7
Issue Date: 2019
Date of publication: 18.12.2019


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI