The evolving landscape of SoC vulnerabilities and analog threats
SoC attacks call for analog and digital defenses
The SoC vulnerability landscape
Many SoC integrators are only too aware that security enforced only by software is highly vulnerable to attack. All that a hacker needs to do is find a way to replace key parts of the bootloader or the low-level firmware to compromise other software in the system used to support secure access.
The increasing integration of edge devices into large-scale distributed systems provides motivated groups with an increasingly large attack space. To maximize their potential for success, they will use multiple attack types. Sometimes, this is a matter of trying different approaches until one works. But, thanks to the use of more advanced statistical tools and machine learning, malicious users are combining information from multiple sources to reverse-engineer a target and increase its vulnerability to the final attack. An example of the use of machine learning in attacks is side-channel analysis, an approach that aims to obtain the private keys employed by an embedded cryptocore.
This paper outlines the landscape of security threats to SoCs and where vulnerabilities lay. We describe available countermeasures, including a comprehensive hardware-based cybersecurity infrastructure that combines the Tessent Embedded Analytics embedded on-chip analytics and Agile Analog on-chip analog monitoring IP.