The present invention relates to an integrated circuit hardware arrangement comprising one or more components.
The article ‘Current state of ASoC design methodology’ by A. Bernauer et al., 2008, Dagstuhl Seminar Proceedings, discloses designs of integrated circuits and systems using such integrated circuits, wherein system reliability is determined based on activity, power and temperature analysis. This can be helpful to prevent problems caused by aging or faults, e.g. by lowering operating speed of an integrated circuit at runtime if a problem is detected.
The US patent publication U.S. Pat. No. 9,754,221 with the title “Processor for implementing reinforcement learning operations” discloses embodiments with “agents” as basic compute elements, where each of the agents is a group of tensors. These agents operate as co-processor to the main programmable component and operate on AI algorithms.
US patent publication US2004/0015719 discloses a firewall that interconnects and controls access between external and internal networks and a plurality of security agents that monitor a data flow and system calls over the internal network.
US patent publication U.S. Pat. No. 6,088,804 discloses a dynamic network security system that is able to respond to a security attack on a computer network having a multiplicity of computer nodes.
The present invention seeks to provide security solutions in integrated circuits and systems utilizing such integrated circuits, which allow to timely detect and mitigate consequences of cyber-attacks.
According to the present invention, an integrated circuit hardware arrangement as defined above is provided, wherein each of the one or more components comprises embedded circuitry allowing run-time execution of a micro-agent, and an interface to an agent network interconnecting the one or more components, the micro-agent being arranged to determine a signature of the associated component, and to communicate via the agent network with further connected micro-agents being executed in further ones of the one or more components of the integrated circuit hardware arrangement, the micro-agent being further arranged to detect a possible attack by analysing the determined signature, wherein the one or more components in combination with the micro-agent being executed, form a basic building block of the integrated circuit hardware arrangement.
According to the present invention, in further exemplary embodiments, an integrated circuit hardware arrangement is defined as a system of micro-agents, wherein each of the micro-agents continues monitors its own state, state of the other micro-agents, learns and plans actions (alone or in cooperation with other micro-agents to detect and mitigate consequences of cyberattacks.
Using the present invention embodiments, it will be possible to enable the detection of not only known attacks, but also of unknown attacks, to obtain a fast detection and reaction time (detection time will be reduced from weeks (as of today) to minutes), to detect malicious users and abuse of regular operations even at the chip level, to provide adaptability, less dependent on external updates, and to provide an unpredictable security architecture for an attacker with no single point of failure.
The present invention will be discussed in more detail below, with reference to the attached drawings, in which
It is worldwide recognised that no organization and no person are immune to cyber-attacks and attacks increase in size and complexity (due e.g. to the expanding number of services available online (IoT+data centres, cloud), increasing sophistication of cyber criminals). State-of-the art security solutions mainly target known-attacks, and not unknown attacks (which could take place in the future). In addition, the solutions are mainly software based.
The present invention embodiments target hardware driven end-to-end secure solution for connected electronic objects. The solution provided by the present invention embodiments has the following advantages: 1) Attack resilience for known and unknown attacks, 2) Fast detection and reaction time, 3) Detection of malicious users and abuse of regular operations, 4) Adaptability, less dependent on external updates, 5) Unpredictable security architecture for attacker with no single point of failure.
The present invention embodiments are based on the concept of multi-agent cooperation, inspired by the same concept found in the nature, where the resilience/robustness does not only come from competition between organisms or species, but also from cooperation. The hardware driven end-to-end secure solution of the present invention embodiments uses the integrated circuit hardware arrangements (chips, IC) as the lowest level of cooperation (similar to DNA in organisms). Each integrated circuit hardware arrangement may comprise several and different micro-agents (i.e. implemented as part of IC design, such as a memory, CPU, etc.), and these will implement intelligence to enable the cooperation at different complexity levels, including chip, system, and system-of-systems level. The core of the intelligence incorporated at the lowest level is to keep an eye on the behaviour of each low level agent, share the information at higher hierarchical levels, and act if a misbehaviour is detected by, e.g., requesting self-repair, excluding and disconnecting the misbehaving agent, etc.
In various embodiments, which will be described in more detail below, one or more of the following aspects are present and incorporated: modelling the system as a cooperative multi-agent system; integrate intelligence in the chips by adding a specific piece of hardware in each chip component; methods enabling these agents to perform early prediction (of misbehaving agents) and recovery (e.g. by disconnecting the agent); and having security as an integral part of basic chip functionality.
In this description, the term micro-agent is used both to indicate a specific functionality being implemented in an integrated circuit hardware arrangement, but on occasion also to describe specific hardware implementations. In this sense the present invention embodiments are defined in the context of an integrated circuit hardware arrangement 1 comprising one or more components 2; 2A-2G, each of the one or more components 2; 2A-2G comprising embedded circuitry 21-31 allowing run-time execution of a micro-agent. This definition is further explained and detailed by reference to the various exemplary embodiments described below, with further reference to the drawings.
Furthermore, in the present invention embodiments, each component 2; 2A-2G further comprises an interface to an agent network 4 interconnecting the one or more components 2; 2A-2G. The micro-agent being executed in run-time is furthermore arranged to determine a signature of the associated component 2; 2A-2G, to communicate via the agent network 4 with further connected micro-agents being executed in further ones of the one or more components 2; 2A-2G of the integrated circuit hardware arrangement 1, and to detect a possible attack by analysing the determined signature (of the associated component, e.g. by performing a predetermined check on the signature). It is noted that in the description below, the term integrated circuit 1 is to be seen as the integrated circuit hardware arrangement 1 terminology as used in the attached claims.
The micro-agents which are implemented in embedded circuitry 21-31 (see also description of
Since the integrated circuits 1 of any size and/or application may have different types of logic (digital or analog) for different functionalities (processing, interface, clock generation, interconnection, interface), the following micro-agent executing components 2 are available as building blocks of integrated circuits 1. A block diagram of an exemplary embodiment of an integrated circuit according to an embodiment of the present invention is shown in
To be able to cover required functionality of an integrated circuit 1 and intelligently manage the security of the integrated circuit, the one or more components 2 of the integrated circuit comprises one or more of the following:
an iContainer component 2A arranged to store data, e.g. holding data at rest, using semiconductor memory elements;
an iBrick component 2B comprising digital logic implementing standard digital IP blocks, e.g. CPU and related elements;
an iConnect component 2C comprising interface and control circuitry (standard interfaces, also for connecting the integrated circuit 1 to the outside world);
an iRouter component 2D arranged to control data flow between the one or more components (and thus between micro-agents);
an iSupply component 2E arranged to manage clock, power and/or reset lines;
an iAnalog component 2F comprising analog circuitry arranged to interface with external analog inputs, e.g. sensor inputs, the analog circuitry e.g. being amplifiers, analog-to-digital/digital-to-analog converters, etc.;
an iDebug component 2G arranged to perform debugging tasks (e.g. to allow insight into micro-agents, which may be limited or even prohibited depending on the level of trust to the external entity controlling the debugging.
As shown in the exemplary embodiment shown in
All the micro-agents in the components 2, 2A-2G are interconnected by three different internal networks, i.e. a Data network 3, an Agent network 4 and a Supply network 5. The purpose of the data network 3 is to connect and enable standard (control and) data flows as designed and initiated by different applications being executed in components 2; 2A-2G of the integrated circuit 1. The agent network 4 functionally connects all micro-agents and enables coordination between micro-agents which are active on various components 2; 2A-2G on the integrated circuit 1. Micro-agents also are arranged to exchange regularly information about their current state (i.e. their signature) so that each micro-agent is aware of what is happening with other micro-agents. The agent network 4 is asynchronous and independent of any clocks existing on the integrated circuit 1 and data flow. The supply network 5 supplies all components 2; 2A-2G with critical integrated circuit parameters, such as power, clock, and reset.
In other words, an exemplary embodiment of an integrated circuit 1 is provided, wherein each of the one or more components 2; 2A-2G comprises an interface to a data network 3, the data network 3 providing a data interconnection (e.g. a standard data and control interconnection) between the one or more components 2; 2A-2G. In a further embodiment, specific ones (possibly not all, e.g. the iAnalog component 2F may be excluded) of the one or more components 2; 2A-2G comprise an interface to a supply network 5, the supply network 5 being arranged to supply power, clock and/or control (e.g. reset) signals to the specific ones of the one or more components 2; 2A-2G. Furthermore, in an even further embodiment, the micro-agent is arranged to determine the signature in an asynchronous manner.
The specialty of this Working state 11 is also being aware of any request for contracting (transition path 12a), whether new or checking for existing contracts between the components 2; 2A-2G. The contract is the agreement between the micro-agents in different components 2; 2A-2G to cooperate, and negotiated in Contracting state 12, after which a transition path 11d is leading back to Working State 11. Note that different situations (e.g. attack detected in the neighborhood, too sensitive data are being processed, . . . ) can lead to dissolution of a contract, even though cooperation was successful in the past. Thus, in a further embodiment, the micro-agent is further arranged to exchange contracting data with the further micro-agents via the agent network 4.
In Working State 11, various detection methods against different attacks are active and these are operative to check for any signs of potential malicious behavior constantly. If no attack is detected, the micro-agent returns to Working State 11 via transition path 11b. In case that the attack is detected (transition path 13a), the micro-agent enters Response on Attack state 13. Thus, in an embodiment of the invention, the micro-agent is further arranged to enter a response on attack state 13 upon detection of a possible attack, the response on attack state 13 comprising active control of the associated component 2; 2A-2G. There are different responses depending on the status of the micro-agent or state of the application. The main aim in this Response on Attack state 13 is to try recover the state of the micro-agent from being attacked to normal state. If this is possible (transition path 14a), the micro-agent will go into Recovery state 14. Some responses may have hidden the sensitive data from the attacker and this requires a separate state of the micro-agent, the Recovery state 14. Whether the recovery was successful or not, the micro-agent will return to Initialization state 10 via transition path 10b. However, if the response to the attack does not lead to containment of the attack (after some “time threshold” is fulfilled), the micro-agent will shut down itself (via transition path 15b to Shutdown state 15), or will be shut down by other micro-agents.
As mentioned above, the micro-agents applied in the various invention embodiments may differ in their functionality, but do share some common parts of the (hardware) architecture. An exemplary implementation of the internal hardware architecture of a component 2; 2A-2G is shown in the block diagram of
As shown in the exemplary block diagram of
It is noted that the above described authentication functionality helps the authentication of internal components and the micro-agent itself with the other micro-agents. An important part of the micro-agent architecture as described above is data representation and handling. Note that the general term data is used which includes e.g. data from sensors and SW code. Many security issues arise from the open nature of data representation and handling, which can be detected, read and even disrupted. To minimize these influences compartmentalization of data is provided. This is reinforced also by the independence of micro-agents and their cooperation. Micro-agents facilitate this compartmentalization through the concept of an intelligent container, a data structure enforced in hardware (or implemented) as an iContainer component 2A as described above. An iContainer component 2A stores not only data and/or code but also additional information which tells more about the past and current behavior of the data or code stored in an iContainer component 2A. The micro-agent implemented in an iContainer component 2A can with additional processing predict the future behavior of the iContainer component 2A. Data exchange and communication between different iContainer components 2A is executed via exchanged packets, which include not only data but some (not all!) of the information from the iContainer component 2A. As data structure, iContainer components 2A can be seen as executional threads of today's programmable integrated circuits 1.
In
This functionality is made possible by the constant monitoring and detection functionality implemented in the micro-agents being executed in the components 2; 2A-2G which form an integrated circuit 1 according to the invention embodiments. In an even further embodiment, the micro-agent is further arranged:
A sensor node 1A is generally a node which does not permit complex processing due to power and space constraints, but does require considerations due to potential attacks. All standard components of a sensor node (ADC 54, Registers and Control Logic 55, Calibration Coefficients 56, Interface 59, Energy Storage 57b and Energy Harvesting 57a) are put into respective components 2 executing micro-agents: An iAnalog component 2F, an iBrick component 2B, and iConnect component 2C, an iSupply component 2e and an iContainer component 2A are interconnected through data network 3, agent network 4 and supply network 5. As discussed above, this allows compartmentalization of the architecture to control and react to potential malicious activities.
Over the interface (e.g. 12C) data are transmitted to a microcontroller unit (MCU) 1B, which is also implemented as a micro-agent based system, using two iConnect components 2C (with an 12C interface 59 and 12C/SPI interface 63, respectively), iContainer components 2A (with code and data memory 65, and Registers 62, respectively), an iBrick component 2B (with CTRL logic 61), and an iSupply component 2E (with a supply management unit 57c). The combination of iBrick component 2B and iContainer component 2A with Registers 62 forms a central processing unit CPU 60.
This interface is also used to exchange security relevant information between the sensor node 1A and the microcontroller unit 1B. E.g. received data from the ADC 54 are packed and transferred to the microcontroller unit 1B.
The present invention has been described above with reference to a number of exemplary embodiments as shown in the drawings. Modifications and alternative implementations of some parts or elements are possible, and are included in the scope of protection as defined in the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2022559 | Feb 2019 | NL | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/NL2020/050075 | 2/12/2020 | WO | 00 |