Design For Security
Increased Design Security Through Programmable and Reconfigurable Devices
Presented by:
Adapticom, Inc.
Revision "E" 02/07/2007
While a wide variety of techniques exist to enhance design security, many incorporate specialized components and circuitry that
add cost and increase complexity. Adapticom seeks to enhance security by more highly integrating designs, utilizing the most secure
and advanced programmable and reconfigurable digital, analog, and mixed signal devices.
Recent advances in device integration have allowed the propagation of reconfigurable
devices that encompass a wide variety of common board level functions. The use of such devices has had a
significant positive effect on Design For Security (DFS)
efforts. Rather than adding components and complexity to the design, these components reduce design overhead in a surprising number of ways:
- Reduced component count for simplified BOM.
- Reduced PCB space requirements.
- Increased design revision capability.
- Use of the same devices across multiple products or designs increases purchasing power and simplifies inventory requirements.
- Enhanced design re-use capabilities.
- Simplified R&D through programmable elements.
- Use of similar tools across devices and products reduces engineer educational efforts.
Today's reconfigurable devices have progressed well beyond the FPGA and PAL technologies that proliferated during the 1990's and now include mixed
signal devices such as the Motorola
56800E core-based family
of Hybrid Controllers, which combine the processing power of a DSP and the functionality
of a microcontoller inside a compact 64-pin LQFP.
This device features 60 MIPS performance (at 60 MHz), along with 48 KB of on-chip Flash memory
and a comprehensive set of peripehrals. It extends the capabilities of the
56F8322
by adding additional analog-to-digital converter (ADC) inputs,
and timer input/output pins and has the following features:
- On-chip memory includes high-speed volatile and nonvolatile components:
- 32KB of Program Flash
- 4 KB of Program RAM
- 8 KB of Data Flash
- 8 KB of Data RAM
- 8 KB of Boot Flash
- Up to 60 MIPS at 60 MHz execution frequency
- DSP and MCU functionality, unified, C-efficient architecture
- JTAG/EOnCE (real-time debugging)
- Four 36-bit accumulators
- 16- and 32-bit bidirectional barrel shifter
- Parallel instruction set with unique addressing modes
- Hardware DO and REP loops
- Three internal address buses
- Four internal data buses
- Architectural support for 8-, 16- and 32-bit single-cycle data fetches
- MCU-style software stack support
- Controller-style addressing modes and instructions
- Single-cycle 16 x 16-bit parallel multiplier-accumulator (MAC)
A second device family of note, the
Cypress PSoC CY8C27x,
contains over 100 reconfigurable analog and digital library components created from 12 fundamental analog and 8 digital blocks.
Each of these PSoC (Programmable System on Chip) devices contain a 24 MHz 8-bit microcontroller unit (MCU);
16 kbytes of flash memory; 256 bytes of SRAM; an 8x8 multiplier with 32-bit accumulator; power and sleep monitoring circuits;
and a precision real-time clock. The largest device in the family, the
CY8C27443
(datasheet),
contains
the following resources:
- I2C 400KHz Interface
- Internal 24 MHz Main Oscillator
- Three Internal Clock Dividers
- Embedded M8C Microprocessor Core
- 16 KBytes Flash Program Memory (with EEProm emulation)
- 256 Bytes of SRAM
- Memory Protection Features
- 8 Multiplexed Analog Inputs
- 4 Analog Outputs w/ 45 mA drive capability
- 4 direct analog input lines
and can be configured to provide such features as:
- Dynamic Reconfiguration
- Counters, Timers and PWMs
- Uarts
- SPI master/slave
- Various A/D, D/A functions
- Filters
- 2 Pole Filter
- Low Pass Filter
- Elliptical Low Pass Filter
- Band Pass Filter
- Notch Filter
- Instrumentation Amplifiers
Since the devices have a defined set of analog and digital resources,
that can be configured in many ways
the overall device function is determined entirely by its programmable configuration.
As a result, there are little or no "clues to function" provided by a visual
examination of the PCB.
Many devices, including both the Motorola and Cypress parts
have security features to prevent configuration readback. The reconfigurability
of the devices allow for a tampering defense through "configuration scrubbing", or the
loading of "white" configurations.
Other configurable devices with analog/digital functions:
-
Atmel ATmega169
16-Kbyte self-programming Flash Program Memory, 1-Kbyte SRAM, 512 Byte EEPROM, 8 Channel 10-bit A/D-converter. JTAG interface for on-chip-debug. 4 X 25 Segment LCD Driver. Up to 16 MIPS throughput at 16 MHz. 5 Volt Operation.
(
"Butterfly" Development Kit)
-
TI MSP430FW427
The MSP430 family consists of several devices featuring different sets of peripherals targeted for various applications.
The devices employ five low power modes and feature a 16-bit RISC CPU, 16-bit registers, digitally controlled oscillator (DCO),
allowing wake-up from low-power modes to active mode in < 6µs.
The MSP430xW42x series are microcontroller configurations with two built-in 16-bit timers, a comparator, 96 LCD segment drive capability,
a scan interface, and 48 I/O pins.
(Datasheet)
Other "Design Security" links
... previously addressed by DSP's and microprocessors design security becomes an ...
Additional architectural features in the Eclipse-II FPGA family afford users the highest level of design security, above and beyond that of ASICs. ...
Postings and Rantings on Design Security
... Design security is vital in this age when intellectual property and product development ... Since FPGA designs can be changed at an engineer's desk several times ...
New device capabilities such as the new logic structure and design security technology round out the industry's most advanced FPGA feature set. ...
... OEMs generally don't design security into switches, most of the routers, storage ... and private key algorithm processing, while a single FPGA performs algorithm ...
Additionally, the device integrates the company's FlashLock on-chip security feature that promises levels of design security beyond ...
.. memory resources, fast 18x18 multipliers, precision clock management, adaptive digitally controlled I/O termination, and design security. ...
Axcelerator FPGAs Axcelerator offers high performance and unprecedented design security at densities of up ...
May 19, 2003, Article: Design Security in FPGAs, Article: "Rhines predicts FPGA vendors will rule platform roost" - EE Times, ...
Design Security in Stratix II Devices
Xcell Journal Online -- Is Your FPGA Design Secure? article
Website addresses FPGA design security
Oracle design security from the ground up - Builder.com
Secured by Design
Web design security concerns
Design Security. Overview. Many systems consist of an FPGA or ASIC....
Design negotiation policies. Design
security policies. Design IP filters. Define security levels. ...
Network Security Architecture Design :: Security Services ...
Course 2830: Designing Security for Microsoft Networks
... Analyze security risks. Design security for physical resources. ... After completing
this module, you will be able to design security for physical resources. ...
The Common Man's Guide to Operating System Design: Security
Design Security in FPGAs
Special Structured ASIC Section Design Security in FPGAs by ...
Building Security through Design - Security Design ...
Project Design--Security and Access
Design Security in Nonvolatile Flash and Antifuse FPGAs
Design Security Hardware Software - Software, Hardware, Services ...
Wireless Network Design Security Solutions.
White Paper FPGA Design Security Issues: Using the ispXPGA Family ...
Comments to:
http://www.adapticom1.net/mailto
Glossary of terms - Memory Foam Beds
Airdream replacement Airbed mattresses
Home
| Design For Security
| FuelCellElectronics.com
| Trace Tools
| Best Blow Dryer
| Engineering Services
| Estate Alarms
| FPGA Security
| New Product Development
| 802.11b Report
| VoIP
| links
| C. McCord Reference Page
Adapticom, Inc. © Copyright 2003, All Rights Reserved Worldwide.
Other Design For Security Links:
High-Confidence Design for Security - Shiu-Kai (ResearchIndex)
Network design for security concerns
SQL Server: Design for security from the start - Builder.com
Design for Security
Design for Security
High-confidence design for security
Interaction Design for End-User Security
Developing a Performance-based Approach for Security-related ...
Helpful links - Design For Security - Computer Consulting - Best ...
SQL Server: Design for security from the start: ZDNet Australia ...
Secure SQL Server: Installing for security - Builder.com
Internet Security Systems, Inc.
Design For Security - Increased Design Security Through ...
Design For Security - Increased Design Security Through ...
High-Confidence Design for Security - Shiu-Kai (ResearchIndex)
SQL Server: Design for security from the start - Builder.com
Network design for security concerns
SQL Server: Design for security from the start: ZDNet Australia ...
High-confidence design for security
Design for security (in VSCCAT)
[VPN] Network Design for security.
[VPN] Network Design for security.
Design for Security
Design for Security
[PDF] A Revolutionary New Design For Security Screening
Microsoft revamps software design for security
Citations: Design for Security: Second Edition - Healy ...
Design For Security Up Front
Index of /design-for-security
[PDF] An Award-Winning* Wireless Design for Security, Fire Detection ...
High-Confidence Design for Security - Shiu-Kai (ResearchIndex)
Design for Security Draft NPRM
Design for security to keep the enemy at bay
[VPN] Network Design for security.
Re: [VPN] Network Design for security.
Design for security up front - TechUpdate - ZDNet
Developing a Performance-based Approach for Security-related ...
Interaction Design for End-User Security
Design for Security
Design for Security