Zero-Trust Communication between Chips

被引:1
|
作者
Belwafi, Kais [1 ]
Alshamsi, Hamdan [2 ]
Ahmed, Ashfaq [1 ]
Shoufan, Abdulhadi [1 ]
机构
[1] Khalifa Univ, C2PS Ctr, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept EECS, Abu Dhabi, U Arab Emirates
来源
2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC | 2023年
关键词
Zero-trust; SPDM; Formal verification; SSL/TLS; Chip-to-chip communication;
D O I
10.1109/VLSI-SoC57769.2023.10321927
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing chip production is common among semiconductor vendors to cope with the increasing demand for integrated circuits. This has resulted in several security issues in the chip supply chain, including hardware trojans, intellectual property theft, and overproduction. Zero-trust presents a promising solution for ensuring the authenticity of Integrated Circuits (ICs), particularly in critical systems where adversary attacks can cause significant losses or damage. The Security Protocol and Data Model (SPDM) is a reliable protocol that uses certificates to ensure the authenticity of ICs. Based on this protocol, the presented paper proposes a chip-to-chip zero-trust security architecture that aims to verify the authenticity of any connected peripheral before its use. The contributions include an overview of the proposed architecture, implementation and formal verification of the SPDM protocol, and analysis of the challenges encountered during the implementation and execution.
引用
收藏
页码:27 / 31
页数:5
相关论文
共 50 条
  • [21] Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks
    Ge, Yunfei
    Zhu, Quanyan
    2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2022, : 359 - 364
  • [22] dNextG: A Zero-Trust Decentralized Mobile Network User Plane
    West, Ryan W.
    Van der Merwe, Jacobus
    PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 15 - 24
  • [23] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [24] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (23):
  • [25] A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT
    Tian, Minqiu
    Li, Zifu
    Li, Fenghua
    Cao, Jin
    Guo, Chao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 299 - 306
  • [26] A Maturity Framework for Zero-Trust Security in Multiaccess Edge Computing
    Ali, Belal
    Hijjawi, Simsam
    Campbell, Leith H.
    Gregory, Mark A.
    Li, Shuo
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] Identity authentication for edge devices based on zero-trust architecture
    Liu, Haiqing
    Ai, Ming
    Huang, Rong
    Qiu, Rixuan
    Li, Yuancheng
    Concurrency and Computation: Practice and Experience, 2022, 34 (23)
  • [28] ZETA: Transparent Zero-Trust Security Add-on for RDMA
    Chang, Hyunseok
    Mukherjee, Sarit
    IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 1041 - 1050
  • [29] A Zero-Trust Architecture for Remote Access in Industrial IoT Infrastructures
    Federici, Fabio
    Martintoni, Davide
    Senni, Valerio
    ELECTRONICS, 2023, 12 (03)
  • [30] OZTrust: An O-RAN Zero-Trust Security System
    Jiang, Hao
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN, 2023, : 129 - 134