Zero-Trust Communication between Chips

被引:1
|
作者
Belwafi, Kais [1 ]
Alshamsi, Hamdan [2 ]
Ahmed, Ashfaq [1 ]
Shoufan, Abdulhadi [1 ]
机构
[1] Khalifa Univ, C2PS Ctr, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept EECS, Abu Dhabi, U Arab Emirates
来源
2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC | 2023年
关键词
Zero-trust; SPDM; Formal verification; SSL/TLS; Chip-to-chip communication;
D O I
10.1109/VLSI-SoC57769.2023.10321927
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing chip production is common among semiconductor vendors to cope with the increasing demand for integrated circuits. This has resulted in several security issues in the chip supply chain, including hardware trojans, intellectual property theft, and overproduction. Zero-trust presents a promising solution for ensuring the authenticity of Integrated Circuits (ICs), particularly in critical systems where adversary attacks can cause significant losses or damage. The Security Protocol and Data Model (SPDM) is a reliable protocol that uses certificates to ensure the authenticity of ICs. Based on this protocol, the presented paper proposes a chip-to-chip zero-trust security architecture that aims to verify the authenticity of any connected peripheral before its use. The contributions include an overview of the proposed architecture, implementation and formal verification of the SPDM protocol, and analysis of the challenges encountered during the implementation and execution.
引用
收藏
页码:27 / 31
页数:5
相关论文
共 50 条
  • [31] Stability Analysis for Heterogeneous Vehicle Platoon in A Zero-Trust Environment
    Bao, Yibo
    Huang, Darong
    Na, Yuhong
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 372 - 377
  • [32] The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm
    Bartakke, Jyoti
    Kashyap, Rajeshkumar
    JOURNAL OF INFORMATION AND ORGANIZATIONAL SCIENCES, 2024, 48 (01) : 149 - 165
  • [33] Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
    Tyler, Dan
    Viana, Thiago
    APPLIED SCIENCES-BASEL, 2021, 11 (16):
  • [34] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Hao, Min
    Tan, Beihai
    Wang, Siming
    Yu, Rong
    Liu, Ryan Wen
    Yu, Lisu
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [35] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Min Hao
    Beihai Tan
    Siming Wang
    Rong Yu
    Ryan Wen Liu
    Lisu Yu
    Frontiers of Computer Science, 2024, 18
  • [36] eZTrust: Network-Independent Zero-Trust Perimeterization for Microservices
    Zaheer, Zirak
    Chang, Hyunseok
    Mukherjee, Sarit
    Van der Merwe, Jacobus
    SOSR '19: PROCEEDINGS OF THE 2019 ACM SYMPOSIUM ON SDN RESEARCH, 2019, : 49 - 61
  • [37] Zero-Trust Zero-Communication Defence against Hybrid Cyberattacks in Distributed Energy Resources Using Mean Field Reinforcement Leaning
    Zhou, Zejian
    Duan, Dongliang
    Xu, Hao
    ENERGIES, 2024, 17 (20)
  • [38] Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams
    Sasada, Taisho
    Masuda, Yuto
    Taenaka, Yuzo
    Kadobayashi, Youki
    Fall, Doudou
    2021 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2021, : 24 - 31
  • [39] Achieving Reconciliation Between Privacy Preservation and Auditability in Zero-Trust Cloud Storage Using Intel SGX
    Wu, Liangshun
    Cai, Hengjin
    Li, Han
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [40] A New Zero-Trust Aided Smart Key Authentication Scheme in IoV
    Song, Yangxu
    Jiang, Frank
    Shah, Syed Wajid Ali
    Doss, Robin
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,