Skip to main content

Reliable Testable Secure Systems

  • Chapter
  • First Online:
Security in Embedded Devices

Part of the book series: Embedded Systems ((EMSY))

  • 1580 Accesses

Abstract

Although reliability has been extensively studied for decades in the space industry, it is now becoming evident that even ground-based embedded systems are facing similar reliability issues. This chapter will briefly discuss the single-event-upset (SEU) phenomena, also known as soft errors, and provide several examples of how reliability can be designed into secure embedded systems. The chapter will also discuss testability issues that relate to security and present some recent research in this area.

Reliable security is an extremely important area of engineering. Failure of a security application may have significant consequences, such as significant financial losses, personal injury in automobiles, losing control of a nuclear station, etc. Not only do security functions require rigorous testing before being put into the field but they also should be as reliable as possible. There is no room for errors in security. For example, a single error in AES causing one bit flip causes over 50% of the ciphertext bits to be in error. This is a result of the diffusion property of ciphers, which increases the effect of one bit over many bits in the output.

Ross Anderson reported the interesting case of a credit card, which was read by a misaligned card reader (Anderson 2001). The card reader should have detected errors in both the cryptographic computation (to detect forgery) as well as the simpler exclusive-or checksum computation (to detect errors). Instead and most unfortunate for the card owner, the cryptographic checksum successfully detected errors but the simpler checksum did not. This indicated incorrectly that the card was a forged card and the owner was “…arrested…and beaten up by the police.” ( Anderson 2001). The error apparently had been masked in the checksum causing much pain for the owner. This is likely not the first example of the disastrous impact of unreliablesecurity. Clearly designing for security includes designing for reactions to errors as well as resistance to attacks.

The problems of single-event-induced errors in integrated circuits riveted the attention of the commercial IC industry in the late 1970s, when it was recognized that the random, correctable errors in DRAMs within ground-based computers were due to single α-particles (May and Woods 1978)

Ma and Dressendorfer (1989)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Actel (2005) Radiation-hardened FPGAs. http://www.actel.com/documents/RadHard_DS.pdf

  2. Actel (2009) RTAX-S/SL RadTolerant FPGAs. http://www.actel.com/documents/RTAXS_DS.pdf

  3. Aeroflex Gaisler (2009) Leon3 Processor. http://www.gaisler.com/cms/index.php?option=com_content\&task=view\&id=194\&Itemid=139

  4. Ahmad I, Das AS (2007) Analysis and detection of errors in implementation of SHA-512 algorithms on FPGAs. Comput J 50(6):728–738

    Article  Google Scholar 

  5. Altera (2008) Error detection and recovery using CRC in Altera FPGA devices. Application Note 357, Vers. 1.4, http://www.altera.com/literature/an/an357.pdf

  6. Anderson R (2001) Security engineering a guide to building dependable distributed systems. John Wiley, New York

    Google Scholar 

  7. Arslan M, Alagoz F (2006) Security issues and performance study of key management techniques over satellite links. In: 11th intenational workshop on computer-aided modeling, analysis and design of communication links and networks, 122–128

    Google Scholar 

  8. Badrignans B, Elbaz R, Torres L (2008) Secure FPGA configuration technique preventing system downgrade. In: Proc. of the 18th IEEE international conference on field programmable logic and applications (FPL)

    Google Scholar 

  9. Baumann R (2005) Soft errors in advanced computer systems. IEEE Des test comput 22(3): 258–266

    Article  Google Scholar 

  10. Bertoni G, Breveglieri L, Koren I, Maistri P, Piuri V (2003) Error analysis and detection procedures for a hardware implementation of the advanced encryption standard, IEEE Trans Comput 52(4):492–505

    Article  Google Scholar 

  11. Blain P, Carmichael C, Fuller E, Caffrey M (1999) SEU mitigation techniques for Virtex FPGAs in space applications. In: MAPLD Proceedings, September 1999

    Google Scholar 

  12. Breveglieri L and Maistri P (2007) An operation-centered approach to fault detection in symmetric cryptography ciphers, IEEE Transactions on Computers, 56(5):635–649

    Article  MathSciNet  Google Scholar 

  13. Butterworth P and Palmer D (2005) Ask an Astrophysicist. http://imagine.gsfc.nasa.gov/docs/ask_astro/answers/980202e.html

  14. Carmichael C et al (1999) SEU Mitigation techniques for Virtex FPGAs in space applications. MAPLD 1999, http://china.xilinx.com/esp/mil_aero/collateral/presentations/SEU_mitigation_technique.pdf

  15. Cataldo A (2004) In Hot market, only reliable Rad-hard need apply. EE Times 05/24/04 articleID=20900592

    Google Scholar 

  16. Dodd P, Massengill L (2003) Basic mechanisms and modeling of singe-event upset in digital microelectronics. IEEE Trans Nucl sci 50:583–602

    Article  Google Scholar 

  17. Drimer S (2007) Volatile FPGA design security – a survey, http://www.cl.cam.ac.uk/~sd410

  18. Eisenbarth T, Güneysu T, Paar C, Sadeghi A, Schellekens D, Wolf M (2007) Reconfigurable trusted computing in hardware. In: Proc. of the ACM workshop on scalable trusted computing, 15–20, 2007

    Google Scholar 

  19. Flanigan J (2007) U.S. working to develop and launch cheaper satellites. New York Times, http://www.nytimes.com/2007/11/15/business/smallbusiness/15edge.html

  20. Gaisler J (2005) LEON3-FT-RTAX SEU Test results. Issue 1, Gaisler research http://gaisler.com/doc/leon3ft-rtax.pdf

  21. Ghaznavi S, Gebotys C (2008) A SEU-resistant, FPGA-based implementation of the substitution transformation in AES for security on satellites. In: Proc of Int’l workshop on Signal processing for space communications, SPSC 2008:1–5

    Article  Google Scholar 

  22. Ghaznavi S, Gebotys C (2009) Error Detectino of AES implemented on an SRAM FPGA. CACR Tech Rept, University of Waterloo

    Google Scholar 

  23. Gold M (2007) Atmel offers Rad-Hard 16-Mbit SRAM for space apps. http://www.eeproductcenter.com/memory/brief/showArticle.jhtml?articleID=196802389

  24. Helvajian (1997) Microengineering technology for space systems. Aerospace press.

    Google Scholar 

  25. Ingemarsson I, Wong C (1981) Encryption and authentication in on-board processing satellite communication systems. IEEE Trans Commun 29(11):1684–1687

    Article  Google Scholar 

  26. Johnston AH (2000) Scaling and technology issues for soft error rates. 4th Annual Research Conference on Reliability, Stanford University, http://nepp.nasa.gov/docuploads/40d7d6c9-d5aa-40fc-829dc2f6a71b02e9/scal-00.pdf

  27. Juliato M, Gebotys C (2008) An approach for recovering satellites and their cryptographic capabilities in the presence of SEUs and attacks. In: Proc of NASA/ESA conference on adaptive hardware and systems, AHS, Issue 22–25, doi 10.1109/AHS.2008.57, pp 101–108

    Google Scholar 

  28. Juliato M, Gebotys C, Elbaz R (2009) Efficient fault tolerant SHA-2 hash functions for space applications. Proc of IEEE Aerosp Conf. doi 10.1109/AERO.2009.4839503, pp 1–16

    Google Scholar 

  29. Karri R, Wu K, Mishra P, Kim Y (2001) fault-based side-channel crypto-analysis tolerant Rijndael symmetric block cipher architecture, DFT’01, IEEE Int’l Symp on defect and fault tolerance in VLSI Sys. 427–435

    Google Scholar 

  30. Kent J (2006) Security fears raised at conference, http://news.bbc.co.uk/2/hi/technology/5399050.stm

  31. Kent, Williams (1993) Encyclopedia of microcomputers, CRC Press

    Google Scholar 

  32. Ma TP, Dressendorfer PV (1989) Ionizing radiation effects in MOS devices and circuits. Chapter 9. Transient-ionization and single-event phenomena by Kerns SE with contributions by Shafer BD.

    Google Scholar 

  33. MILSTD (1996) Department of defense test method standard microcircuits, http://scipp.ucsc.edu/groups/glast/electronics/mil-std-883.pdf

  34. Nystedt D (2007) DRAM price crashes through $2. http://www.infoworld.com/t/hardware/dram-price-crashes-through-2--002

  35. Ohring M (1998) Reliability and failure of electronic materials and devices. Academic Press, USA

    Google Scholar 

  36. Papoutsis E, Howells G, Hopkins A, McDonald- Maier K (2007) Key generation for secure inter-satellite communication. In: Second NASA/ESA conference on adaptive hardware and systems, AHS 2007, IEEE Computer Society, 671–681

    Google Scholar 

  37. Roosta R (2004) A comparison of radiation-hard and radiation-tolerant FPGAs for space applications, NASA JPL, JPL D-31228

    Google Scholar 

  38. Roy-Chowdhury A, Baras J, Hadjitheodosiou M, Papademetriou S (2005) Security issues in hybrid networks with a satellite component. IEEE Wireless Commun 12(6):50–61

    Article  Google Scholar 

  39. Samudrala P, Ramos J, Katkoori S (2004) Selective triple modular redundancy (STMR) based single-event upset (SEU) tolerant synthesis for FPGAs. IEEE Trans Nucl Sci 51:2957–2969

    Article  Google Scholar 

  40. Satoh A, Morioka S, Takano K, Munetoh S (2001) A compact rijndael hardware architecture with s-box optimization. ASIACRYPT’01: Proceedings of the 7th international conference on the theory and application of cryptology and information security. Springer, London, UK, 239–254

    Google Scholar 

  41. Schellekens D, Tuyls T, Preneel B (2008) Embedded trusted computing with authenticated non-volatile memory, In Proc. of TRUST 2008, LNCS 4968, Springer, New York

    Google Scholar 

  42. UCS (2008) U. of Concerned Scientists satellite database, http://www.ucsusa.org/globalsecurity/spaceweapons

  43. USGAO (2002) Critical infrastructure protection: commercial satellite security should be more fully addressed. Technical Report GAO-02–781, United States General Accounting Office. http://www.gao.gov/new.items/d02781.pdf

  44. Vladimirova T, Banu R, Sweeting M (2005) On-board security services in small satellites. In MAPLD Proceedings, 2005

    Google Scholar 

  45. Zhang X, Parhi K (2006) On the optimum constructions of composite field for the AES algorithm, IEEE Trans Circuits Syst II Express Briefs 53(10):1153–1157

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Catherine H. Gebotys .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Gebotys, C.H. (2010). Reliable Testable Secure Systems. In: Security in Embedded Devices. Embedded Systems. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-1530-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-1530-6_10

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4419-1529-0

  • Online ISBN: 978-1-4419-1530-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics