SeReCon: a secure reconfiguration controller for self-reconfigurable systems

  • Authors:
  • Krzysztof Kepa;Fearghal Morgan;Krzysztof Kosciuszkiewicz;Tomasz Surmacz

  • Affiliations:
  • Bio-Inspired and Reconfigurable Computing (BIRC) Group, Electrical and Electronic Engineering, National University of Ireland, Nun;s Island, Galway, Ireland.;Bio-Inspired and Reconfigurable Computing (BIRC) Group, Electrical and Electronic Engineering, National University of Ireland, Nun;s Island, Galway, Ireland.

  • Venue:
  • International Journal of Critical Computer-Based Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

A risk of covert insertion of circuitry into reconfigurable computing (RC) systems exists. This paper reviews risks of hardware attack on field programmable gate array (FPGA)-based RC systems and proposes a method for secure system credentials generation (unique, random and partially anonymous) and trusted self-reconfiguration, using a secure reconfiguration controller (SeReCon) and partial reconfiguration (PR). SeReCon provides a root of trust (RoT) for RC systems, incorporating novel algorithms for security credentials generation and trusted design verification. Credentials are generated internally, during system certification. The private credential element never leaves the SeReCon security perimeter. To provide integrity-maintaining self-reconfiguration, SeReCon performs analysis of each new IP core structure prior to reconfiguration. An unverified IP core can be used provided that its spatial isolation is retained. SeReCon provides encrypted storage for installed IP cores. Resource usage for a prototype SeReCon system is presented. The protection provided by SeReCon is illustrated in a number of security attack scenarios.