4-scipio-secure-chip..

Download Report

Transcript 4-scipio-secure-chip..

SCIPIO
Secure chip for Cyber-Intelligent Physically Interconnected Objects
Fethulah Smailbegovic, Said Hamdioui, Giorgio Di Natale
Computer Engineering Lab, Delft University of Technology, LIRMM
[email protected], [email protected], [email protected]
Markets: Cyber-Physical Systems (Automotive, Industrial Control, Smart Home, …)
1
•
No organization and no person are immune to cyber-attacks.
• “90 % of companies worldwide recognize they are insufficiently prepared to protect
•
themselves against cyber-attacks” [Global Risks 2015 report]
Cyber-attacks and crime already costs the global economy over US$400 billion per
year! [Centre for Strategic and International Studies]
•
Attacks increase in size and complexity.
• Expanding number of services available online (IoT + data centres, cloud)
• Increasing sophistication of cyber criminals
•
State-of-the art security solutions.
• Mainly for known-attacks, and not for unknown attacks.
• Mainly software related; poorly incorporated solutions at chip architecture
level.
2
Source: Tan, Goddard, Perez:"A Prototype Architecture for Cyber-physical Systems", Newsletter ACM SIGBED Rev, January 2008
3
Source: Tan, Goddard, Perez:"A Prototype Architecture for Cyber-physical Systems", Newsletter ACM SIGBED Rev, January 2008
4
SCIPIO chip
System On Chip Resistant against Advanced cyber Threats through Evolutional Security
The architecture pillars
•
•
•
•
•
•
User and Data Fingerprinting.
Use smart data.
Run-time cooperation of all
connected objects
Run-time cooperation of all
components/IPs on chip.
Learning and Micro-Analytics.
Accumulating Atomic Security
Policies.
5
Required Skills
Security and Data
Analytics
Available
now
Potentially
available
X
Security Engineering
X
Artificial Intelligence
(Machine Learning, Multi –
Agent Systems)
X
Computer Architecture
and Digital Logic Design
X
Mathematics &
Computational Modelling,
Computer Science
X
Software Engineering
X
End-User
Missing
X
Consortium status
So far on board:
• Delft University of
Technology
• Le Laboratoire
d’Informatique, de
Robotique et de
Microélectronique de
Montpellier (LIRMM)
7
• Conclusion
– Chip architecture is a true cybersecurity battlefield!
– Chip as terrain is accessible, both to the defender and
the attacker.
• Sun Tzu said: “With regard to ground of this
nature, be before the enemy in occupying
the raised and sunny spots, and carefully
guard your line of supplies. Then you will be
able to fight with advantage.”
Source: www.amazon.de
(Chiron Academic Press)
8
Thank you!
9