Periodic Reporting for period 1 - CROSSCON (Cross-platform Open Security Stack for Connected Devices)
Reporting period: 2022-11-01 to 2024-04-30
This heterogeneity creates several interoperability issues that make it very hard or impossible to realize a common trust baseline to build root of trusts across the different devices. Consequently, any realistic IoT deployment nowadays has unprotected devices. They are weak points that attackers can use to easily penetrate the whole system.
CROSSCON aims at extending the protection to the devices that are now unprotected and solving existing interoperability issues enabling the possibility to implement the basic protection and trust mechanisms on any device. This by also leveraging existing trust technology and available hardware features and security extensions and when necessary, strengthening their security. On top of these basic mechanism, CROSSCON aims also at designing innovative trusted services to be added to the more traditional ones, to address the new security requirements emerging from more powerful hardware and more complex and diverse usage scenarios.
Furthermore, existing trust technology are not open, making it difficult to develop new trusted applications implementing foundational trust services such as integrity checks, secure updates, secure communications, etc. and keeping high the entry point costs for new adopters.
CROSSCON aims at enriching the toolchain available to developers of trusted applications by making it easier to write them once and run them on different hardware, and by increasing considerably their assurance.
First release of the CROSSCON extension primitives to domain specific hardware architectures for improved security of IoT devices by co-designing new hardware/software features that complement the CROSSCON stack by providing additional security for domain specific hardware. The design and first release of CROSSCON SoC: a system on chip that can be used together with the CROSSCON stack to provide a RISC-V execution environment for mixed criticality software that needs strong hardware and software isolation; and a TEE-like environment on FPGAs with multiple tenants.
First release of two foundational trusted services, one related to two-factors device authentication and the other to Control-Flow Integrity.
All CROSSCON technical results have been released for timely community uptake and feedback and all the code is available at CROSSCON GitHub repository (https://github.com/crosscon).
For the exploitation of the results and their impact, besides disseminating the novelty in scientific journals and international conferences and workshop, CROSSCON promoted activities targeting the most relevant industrial initiatives. Consortium members participated actively in several RISC-V working groups, such as the Hypervisor SIG, Runtime Integrity SIG, Confidential Computing WG to promote CROSSCON innovation in their standardization paths. Participation and outreach to industrial stakeholders was implemented presenting at industrial events such as RISC-V Summit and Embedded World, 2023 and 2024 editions.
The CROSSCON approach aligns with the vision of establishing trustworthy IoT devices across the IoT infrastructure. This stack will be directly usable by hardware manufacturers, original device manufacturers, application developers, and system integrators, enabling them to build devices and applications with fewer resources, eliminate hardware dependencies, and ensure a consistent and robust security foundation across the entire IoT ecosystem.
Where hardware dependencies exist, CROSSCON use them on its advantage as in the design of a unified interface for hardware primitives needed by trusted services; the secure sharing of hardware accelerators through the entire hardware-software stack.