A Hardware/Software Co-integration Approach for Securing Network Infrastructure Using Reconfigurable Computing

A Hardware/Software Co-integration Approach for Securing Network Infrastructure Using Reconfigurable Computing
Title A Hardware/Software Co-integration Approach for Securing Network Infrastructure Using Reconfigurable Computing PDF eBook
Author Wafi Danesh
Publisher
Pages 0
Release 2022
Genre Computer networks
ISBN

Download A Hardware/Software Co-integration Approach for Securing Network Infrastructure Using Reconfigurable Computing Book in PDF, Epub and Kindle

In the last two decades, there has been a rapid proliferation of connected devices spanning various application domains. Coupled with the rise of novel computer networking paradigms, such as Internet-of-Things (IoT), edge computing, fog computing, cloud computing among others, experts predicted an estimated 50 billion connected devices by the year 2020. The emergence of these networking paradigms, however, raises critical security vulnerabilities. Such vulnerabilities, as a result, exposes new attack vectors to exploitation by increasingly competent attackers, with ever more sophisticated means at their disposal, at both the software and hardware level. The key reasons for the existence of such vulnerabilities in modern computer networks, arise due to the multifaceted constraints that need to be incorporated. Many current networking applications work under operating conditions of severe cost, power, and resource constraints. As a consequence of these constraints, the requisite computational resources required to incorporate critical security countermeasures are significantly reduced. Developers and system designers for the varied modern computer networking systems are often forced into a tradeoff of conventional security features, such as encryption, authentication, access control, network, and access security. At the software level, these vulnerabilities manifest in the form of unforeseen network intrusions, such as zero-day attacks. At the hardware level, a very serious threat are hardware Trojans (HT), which are clandestine, malicious circuits that can be inserted during runtime in the network infrastructure. In this dissertation, two key security countermeasures are proposed against vulnerabilities at both the hardware and software levels. Based on these countermeasures, an attempt is made to synthesize both countermeasures and propose a unified security paradigm, which can tackle both threat scenarios simultaneously. At the hardware level, this dissertation focuses on the serious threat posed by hardware Trojan (HT) insertion in the field programmable gate array (FPGA) configuration bitstream. Low-end FPGAs are widely used in networking infrastructure and forego critical security features such as encryption of bitstreams to optimize resource constrained deployment. An attacker can reverse engineer the configuration bitstream to insert HTs, which are clandestine malicious circuits, in the FPGA. The proposed countermeasure uses bitstream reverse engineering to perform HT detection and is scalable to any circuit size and topology. With regards to the software level, this dissertation focuses on the vulnerability of deep learning (DL) based network intrusion detection to adversarial examples in IoT networks. Even though DL approaches have proven extremely effective in intrusion detection given the high volume of network traffic in modern IoT networks, DL models are prone to misclassification to minute perturbations in input samples, called adversarial examples. In this dissertation, an unsupervised adversarial example detection approach is proposed which does not require extra hardware overhead for implementation and is based on the intrinsic characteristics of the DL model implemented. As an additional research focus, this dissertation investigates the use of multi-valued logic (MVL) in a circuit decomposition and synthesis approach for beyond Moore circuit implementations. MVL computing provides a larger information capacity compared to binary CMOS logic and is suitable for providing efficient data compression, processing, and communication with the massive network traffic volumes in modern computer networks. Some of the key issues preventing widespread adoption of MVL computing are the complex MVL expressions obtained from traditional logic decomposition approaches and the inefficient usage of binary switches for MVL data representation, communication, and processing. Therefore, this dissertation proposes a logic decomposition and synthesis algorithm for MVL, which combines concepts from machine learning and nanoelectronics. The proposed algorithm decomposes a MVL function to a set of linear expressions implemented by simple output summations, is adaptable to any device technology and radix of representation, and scalable with circuit size and topology. Compared to other popular MVL decomposition methods, the proposed algorithm presents significant savings in hardware overhead and computational complexity. In recent years, small but significant research efforts have been dedicated to usage of MVL in DL classifier design and HT detection. These innovations can pave the way for integrating MVL approaches in the security context at both the hardware and software level. In summary, this dissertation provides a detailed investigation of key security vulnerabilities at the software and hardware levels for modern computer networks, proposes adept and effective countermeasures and in addition, provides a proof-of-concept for a MVL decomposition and synthesis approach for beyond Moore circuits.

Trustworthy Reconfigurable Systems

Trustworthy Reconfigurable Systems
Title Trustworthy Reconfigurable Systems PDF eBook
Author Thomas Feller
Publisher Springer
Pages 228
Release 2014-08-25
Genre Computers
ISBN 3658070056

Download Trustworthy Reconfigurable Systems Book in PDF, Epub and Kindle

​Thomas Feller sheds some light on trust anchor architectures for trustworthy reconfigurable systems. He is presenting novel concepts enhancing the security capabilities of reconfigurable hardware. Almost invisible to the user, many computer systems are embedded into everyday artifacts, such as cars, ATMs, and pacemakers. The significant growth of this market segment within the recent years enforced a rethinking with respect to the security properties and the trustworthiness of these systems. The trustworthiness of a system in general equates to the integrity of its system components. Hardware-based trust anchors provide measures to compare the system configuration to reference measurements. Reconfigurable architectures represent a special case in this regard, as in addition to the software implementation, the underlying hardware architecture may be exchanged, even during runtime.

Introduction to Reconfigurable Computing

Introduction to Reconfigurable Computing
Title Introduction to Reconfigurable Computing PDF eBook
Author Christophe Bobda
Publisher Springer Verlag
Pages 359
Release 2007-11-09
Genre Computers
ISBN 9781402060885

Download Introduction to Reconfigurable Computing Book in PDF, Epub and Kindle

This work is a comprehensive study of the field. It provides an entry point to the novice willing to move in the research field reconfigurable computing, FPGA and system on programmable chip design. The book can also be used as teaching reference for a graduate course in computer engineering, or as reference to advance electrical and computer engineers. It provides a very strong theoretical and practical background to the field, from the early Estrin’s machine to the very modern architecture such as embedded logic devices.

Applied Reconfigurable Computing. Architectures, Tools, and Applications

Applied Reconfigurable Computing. Architectures, Tools, and Applications
Title Applied Reconfigurable Computing. Architectures, Tools, and Applications PDF eBook
Author Steven Derrien
Publisher Springer Nature
Pages 338
Release 2021-06-23
Genre Computers
ISBN 3030790258

Download Applied Reconfigurable Computing. Architectures, Tools, and Applications Book in PDF, Epub and Kindle

This book constitutes the proceedings of the 17th International Symposium on Applied Reconfigurable Computing, ARC 2021, held as a virtual event, in June 2021. The 14 full papers and 11 short presentations presented in this volume were carefully reviewed and selected from 40 submissions. The papers cover a broad spectrum of applications of reconfigurable computing, from driving assistance, data and graph processing acceleration, computer security to the societal relevant topic of supporting early diagnosis of Covid infectious conditions.

Network-on-Chip Security and Privacy

Network-on-Chip Security and Privacy
Title Network-on-Chip Security and Privacy PDF eBook
Author Prabhat Mishra
Publisher Springer Nature
Pages 496
Release 2021-06-04
Genre Technology & Engineering
ISBN 3030691314

Download Network-on-Chip Security and Privacy Book in PDF, Epub and Kindle

This book provides comprehensive coverage of Network-on-Chip (NoC) security vulnerabilities and state-of-the-art countermeasures, with contributions from System-on-Chip (SoC) designers, academic researchers and hardware security experts. Readers will gain a clear understanding of the existing security solutions for on-chip communication architectures and how they can be utilized effectively to design secure and trustworthy systems.

Applied Reconfigurable Computing. Architectures, Tools, and Applications

Applied Reconfigurable Computing. Architectures, Tools, and Applications
Title Applied Reconfigurable Computing. Architectures, Tools, and Applications PDF eBook
Author Iouliia Skliarova
Publisher Springer Nature
Pages 311
Release
Genre
ISBN 3031556739

Download Applied Reconfigurable Computing. Architectures, Tools, and Applications Book in PDF, Epub and Kindle

Reconfigurable Computing Environment for Hardware-software Co-design

Reconfigurable Computing Environment for Hardware-software Co-design
Title Reconfigurable Computing Environment for Hardware-software Co-design PDF eBook
Author Tejas Jitendra Mistry
Publisher
Pages 422
Release 1998
Genre Computer architecture
ISBN

Download Reconfigurable Computing Environment for Hardware-software Co-design Book in PDF, Epub and Kindle