Zero-Trust Communication between Chips

被引:1
|
作者
Belwafi, Kais [1 ]
Alshamsi, Hamdan [2 ]
Ahmed, Ashfaq [1 ]
Shoufan, Abdulhadi [1 ]
机构
[1] Khalifa Univ, C2PS Ctr, Abu Dhabi, U Arab Emirates
[2] Khalifa Univ, Dept EECS, Abu Dhabi, U Arab Emirates
来源
2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC | 2023年
关键词
Zero-trust; SPDM; Formal verification; SSL/TLS; Chip-to-chip communication;
D O I
10.1109/VLSI-SoC57769.2023.10321927
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Outsourcing chip production is common among semiconductor vendors to cope with the increasing demand for integrated circuits. This has resulted in several security issues in the chip supply chain, including hardware trojans, intellectual property theft, and overproduction. Zero-trust presents a promising solution for ensuring the authenticity of Integrated Circuits (ICs), particularly in critical systems where adversary attacks can cause significant losses or damage. The Security Protocol and Data Model (SPDM) is a reliable protocol that uses certificates to ensure the authenticity of ICs. Based on this protocol, the presented paper proposes a chip-to-chip zero-trust security architecture that aims to verify the authenticity of any connected peripheral before its use. The contributions include an overview of the proposed architecture, implementation and formal verification of the SPDM protocol, and analysis of the challenges encountered during the implementation and execution.
引用
收藏
页码:27 / 31
页数:5
相关论文
共 50 条
  • [41] Tamperproof Data Transmission to Offline IoT Devices in a Zero-Trust Environment
    Vogel, Richard
    Manthey, Robert
    Baumgart, Matthias
    Roschke, Christian
    Ritter, Marc
    Vodel, Matthias
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 817 - 822
  • [42] NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures
    Katsis, Charalampos
    Cicala, Fabrizio
    Thomsen, Dan
    Ringo, Nathan
    Bertino, Elisa
    CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 167 - 178
  • [43] A Zero-Trust Satellite Services Marketplace Enabling Space Infrastructure as a Service
    Falco, Gregory
    Gordon, Nathaniel G.
    IEEE ACCESS, 2024, 12 : 71066 - 71075
  • [44] Zero-trust design and assurance patterns for cyber-physical systems
    Hasan, Saqib
    Amundson, Isaac
    Hardin, David
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 155
  • [45] A Zero-Trust Approach for Cooperative Vehicular Networks: A Motorway Use Case
    Dawson, Ben
    Malazi, Hadi Tabatabaee
    Kazmi, Aqeel
    Chaudhry, Saqib Rasool
    IEEE SYSTEMS MAN AND CYBERNETICS MAGAZINE, 2025, 11 (01): : 11 - 22
  • [46] Zero-Trust Enabling Intrusion Detection Protection for Software Defined Vehicles
    Kaster, Robert
    Ma, Di
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [47] Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV
    Fang, He
    Zhu, Yongxu
    Zhang, Yan
    Wang, Xianbin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (08) : 8760 - 8772
  • [48] Poster: Toward Zero-Trust Path-Aware Access Control
    Seaton, Joshua H.
    Hounsinou, Sena
    Wood, Timothy
    Xu, Shouhuai
    Brown, Philip N.
    Bloom, Gedare
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 267 - 269
  • [49] ZeTA - Zero-Trust Authentication: Relying on Innate Human Ability, not Technology
    Gutmann, Andreas
    Renaud, Karen
    Maguire, Joseph
    Mayer, Peter
    Volkamer, Melanie
    Matsuura, Kanta
    Mueller-Quade, Jorn
    1ST IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, 2016, : 357 - 371
  • [50] Applying the principles of zero-trust architecture to protect sensitive and critical data
    Greenwood D.
    Network Security, 2021, 2021 (06) : 7 - 9