Google llc (20240184932). Read-Only Memory (ROM) Security simplified abstract

From WikiPatents
Jump to navigation Jump to search

Read-Only Memory (ROM) Security

Organization Name

google llc

Inventor(s)

Michael Stefano Fritz Schaffner of Campbell CA (US)

Rupert James Swarbrick of Cambridge (GB)

Timothy Jay Chen of Pleasanton CA (US)

Read-Only Memory (ROM) Security - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240184932 titled 'Read-Only Memory (ROM) Security

Simplified Explanation

The patent application describes an apparatus with an integrated circuit (IC) chip that provides protection against attacks on a read-only memory (ROM), such as a boot ROM for security circuitry. The apparatus stores encrypted ROM data in the ROM array and uses a ROM controller to cryptographically tie the address of each ROM line to the corresponding encrypted ROM datum. Cryptographic circuitry decrypts the encrypted ROM datum using a key generated based on the corresponding ROM address. An integrity checking procedure involves computing a digest based on the encrypted ROM data, and the ROM address can be adjusted (e.g., scrambled) before reading encrypted data from the ROM array.

  • Apparatus with an IC chip for protecting ROM against attacks
  • Encrypted ROM data stored in ROM array
  • ROM controller ties address of each ROM line to corresponding encrypted data
  • Cryptographic circuitry decrypts data using address-based key
  • Integrity checking involves computing digest based on encrypted data
  • ROM address can be adjusted before reading encrypted data

Potential Applications

The technology can be applied in secure boot processes, secure storage systems, and other applications requiring protection against ROM attacks.

Problems Solved

The technology addresses the problem of unauthorized access to and modification of ROM contents, enhancing the security of IC chips and related systems.

Benefits

- Improved security against attacks on ROM - Enhanced protection of sensitive data stored in ROM - Increased trustworthiness of IC chip functionality

Potential Commercial Applications

The technology can be utilized in secure microcontrollers, smart cards, IoT devices, and other embedded systems requiring robust security measures.

Possible Prior Art

One possible prior art could be the use of encryption techniques to protect data stored in memory from unauthorized access and tampering.

What are the potential implications of this technology in the field of cybersecurity?

The technology described in the patent application has significant implications for cybersecurity, particularly in securing critical systems and sensitive data against malicious attacks. By implementing encrypted ROM data and cryptographic controls, the technology can help prevent unauthorized access, tampering, and exploitation of vulnerabilities in IC chips and related devices.

How does this technology compare to existing solutions for protecting ROM data?

This technology offers a comprehensive approach to protecting ROM data by combining encryption, cryptographic controls, and integrity checking procedures. While existing solutions may also incorporate encryption techniques, the use of address-based keys and integrity checks adds an additional layer of security to prevent attacks on ROM contents.


Original Abstract Submitted

an apparatus with an integrated circuit (ic) chip can provide protection against attacks on a read-only memory (rom), such as a boot rom for security circuitry. an attacker can gain control of an ic by modifying rom contents and/or redirecting rom reads. to combat these attacks, example implementations store encrypted rom data in the rom array. a rom controller is used to cryptographically tie the address of each rom line to the corresponding encrypted rom datum. to access the encrypted rom datum, cryptographic circuitry decrypts the encrypted rom datum using a key that is generated based on the corresponding rom address. as part of an integrity checking procedure, a digest can be computed based on the encrypted rom data. to further thwart would-be attacks, the rom address can be adjusted (e.g., scrambled) before the controller uses the adjusted address to read encrypted data from the rom array.