13.07.2015 Views

System Architecture Design

System Architecture Design

System Architecture Design

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

pSHIELD<strong>System</strong> <strong>Architecture</strong> <strong>Design</strong>PU2002; Kelsey et al. 1998]. Tamper resistance measures must, therefore, secure the systemimplementation when it is subject to various physical and side-channel attacks. Later in this paper (seeSection 6), we will discuss some examples of embedded system attacks and related countermeasures.Assurance Gap: It is well known that truly reliable systems are much more difficult to build than thosethat merely work most of the time. Reliable systems must be able to handle the wide range of situationsthat may occur by chance. Secure systems face an even greater challenge: they must continue to operatereliably despite attacks from intelligent adversaries who intentionally seek out undesirable failure modes.As systems become more complicated, there are inevitably more possible failure modes that need to beaddressed. Increases in embedded system complexity are making it more and more difficult forembedded system designers to be confident that they have not overlooked a serious weakness.Cost: One of the fundamental factors that influence the security architecture of an embedded system iscost. To understand the implications of a security related design choice on the overall system cost,consider the decision of incorporating physical security mechanisms in a single-chip cryptographicmodule. The Federal Information Processing Standard (FIPS 140-2) [FIPS] specifies four increasinglevels of physical (as well as other) security requirements that can be satisfied by a secure system.Security Level 1 requires minimum physical protection, Level 2 requires the addition of tamper-evidentmechanisms such as a seal or enclosure, while Level 3 specifies stronger detection and responsemechanisms. Finally, Level 4 mandates environmental failure protection and testing (EFP and EFT), aswell as highly rigorous design processes. Thus, we can choose to provide increasing levels of securityusing increasingly advanced measures, albeit at higher system costs, design effort, and design time. It isthe designer’s responsibility to balance the security requirements of an embedded system against the costof implementing the corresponding security measures.4.1.2 DependabilityThe protection and survival of networked systems and services that are running on those systems is themain concern of an SPD driven architecture. In different circumstances, different properties of suchservices are the ones that we focus on sustaining. These are, per example, the average response time ofthe service, the capability to prevent intrusions, the ability to produce the required output and the ability tosurvive a catastrophic failure.Dependability sums up those concerns under a common framework. We can identify three main parts tothe concept of dependability.• The threats• The attributes• The meansPUD2.3.2Issue 5 Page 50 of 122

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!