{"id":156,"date":"2018-01-18T12:49:59","date_gmt":"2018-01-18T17:49:59","guid":{"rendered":"http:\/\/mooney.gatech.edu\/security\/?page_id=156"},"modified":"2023-05-25T17:04:23","modified_gmt":"2023-05-25T21:04:23","slug":"multi-party-remote-update-for-hardwaresoftware-systems","status":"publish","type":"page","link":"https:\/\/mooney.gatech.edu\/security\/projects\/multi-party-remote-update-for-hardwaresoftware-systems\/","title":{"rendered":"Multi-Party Remote Update for Hardware\/Software Systems"},"content":{"rendered":"<p>Hardware\/software co-designed systems are increasingly prevalent due to trends such as the adoption of hardware accelerators and the availability of heterogeneous system-on-chip (SoC) architectures. A potential security concern arising from hardware\/software interaction in heterogeneous computing architectures is the possibility of software-based attacks on reconfigurable hardware, and vice versa. This is especially important when considering remote updates of the software, hardware, or both combined. In this work, we propose a remote update scheme that relies on a hardware root-of-trust and multiple updating parties to deliver hardware\/software updates in a secure fashion. The root-of-trust secures all cryptographic computations, as well as remote authentication, key storage, and update image integrity verification. By moving these operations down to a root-of-trust, the attack surface is limited such that, in the event of an attack from outside the root-of-trust (either from software or reconfigurable hardware), all security-critical computations and data remain inaccessible to the attacker. Furthermore, the proposed scheme aims to provide a high level of assurance that the system only accepts updates from approved entities while also preventing common remote attacks from compromising the security of the update process.<\/p>\n<h2>Collaborators<\/h2>\n<ul>\n<li><a href=\"http:\/\/mooney.gatech.edu\/\">Dr. Vincent Mooney<\/a><\/li>\n<li><a href=\"_wp_link_placeholder\" data-wplink-edit=\"true\">Dr. Santiago Grijalva<\/a><\/li>\n<li><a href=\"https:\/\/cdait.gatech.edu\/people\/lee-w-lerner\">Dr. Lee W. Lerner<\/a><\/li>\n<\/ul>\n<h2>Publications<\/h2>\n<p>K. Hutto, S. Paul, B. Newberg, V. Boyapati, Y. Vunnam, S. Grijalva, V. Mooney, &#8220;<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9814751\">PUF-Based Two-Factor Authentication Protocol for Securing the Power Grid Against Insider Threat<\/a>,&#8221; Kansas Power and Energy Conference (KPEC&#8217;22), April 2022.<\/p>\n<p>B. Newberg, S. Grijalva, V. Mooney, &#8220;<a href=\"http:\/\/mooney.gatech.edu\/security\/wp-content\/uploads\/2022\/02\/2022006176_revised.pdf\">Open-Source Architecture for Multi-Party Update<\/a><br \/>\nVerification for Data Acquisition Devices,&#8221; Power and Energy Conference at Illinois, March 2022.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hardware\/software co-designed systems are increasingly prevalent due to trends such as the adoption of hardware accelerators and the availability of heterogeneous system-on-chip (SoC) architectures. A potential security concern arising from hardware\/software interaction in heterogeneous computing architectures is the possibility of software-based attacks on reconfigurable hardware, and vice versa. This is especially important when considering remote &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/mooney.gatech.edu\/security\/projects\/multi-party-remote-update-for-hardwaresoftware-systems\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Multi-Party Remote Update for Hardware\/Software Systems&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":26,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"folder":[],"class_list":["post-156","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/comments?post=156"}],"version-history":[{"count":4,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/156\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/156\/revisions\/324"}],"up":[{"embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/pages\/26"}],"wp:attachment":[{"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/media?parent=156"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/mooney.gatech.edu\/security\/wp-json\/wp\/v2\/folder?post=156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}