Hardware Protection with Security Protocol and Data Model

  • Gustavo C. Bastos USP
  • Marcos A. Simplício Jr. USP
  • Bruno C. Albertini USP

Abstract


A critical security threat to modern computer systems involves hardware-level attacks, such as firmware manipulation. These attacks are particularly dangerous because they enable unauthorized data access at the bus level, making eavesdropping or tampering difficult to detect. One possible countermeasure is the Security Protocol and Data Model (SPDM), an industry standard for hardware component mutual attestation and secure channel establishment. In this work, we present the design, implementation, and execution of SPDM on an FPGA (Field-Programmable Gate Array). Our test environment consists of a RISC-V SoC and an Ethernet card, where the bootcode (BIOS) authenticates the peripheral (Ethernet card) using SPDM.

References

Alves, R. C., Albertini, B. C., and Simplicio, M. A. (2022). Securing hard drives with the security protocol and data model (spdm). In 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), pages 446–447. IEEE.

AMD (2024). Amd microblaze processor - a flexible and efficient soft processor. Acessado em Setembro/2024.

Asanović, K., Avizienis, R., Bachrach, J., Beamer, S., Biancolin, D., Celio, C., Cook, H., Dabbelt, D., Hauser, J., Izraelevitz, A., Karandikar, S., Keller, B., Kim, D., Koenig, J., Lee, Y., Love, E., Maas, M., Magyar, A., Mao, H., Moreto, M., Ou, A., Patterson, D. A., Richards, B., Schmidt, C., Twigg, S., Vo, H., and Waterman, A. (2016). The rocket chip generator. Technical Report UCB/EECS-2016-17, EECS Department, University of California, Berkeley.

Basnight, Z. H. (2013). Firmware counterfeiting and modification attacks on programmable logic controllers. Technical report, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF . . . .

Belwafi, K., Shoufan, A., Alsafi, M., Ahmed, A., and Han, K. (2024). Hardware/software implementation of a chip-to-chip communication protocol based on spdm. IEEE Access, 12:194962–194972.

Brown, D., Walker, T. O., Blanco, J. A., Ives, R. W., Ngo, H. T., Shey, J., and Rakvic, R. (2021). Detecting firmware modification on solid state drives via current draw analysis. Computers Security, 102:102149.

Choi, B.-C., Lee, S.-H., Na, J.-C., and Lee, J.-H. (2016). Secure firmware validation and update for consumer devices in home networking. IEEE Transactions on Consumer Electronics, 62(1):39–44.

Cremers, C., Dax, A., and Naska, A. (2023). Formal analysis of spdm: security protocol and data model version 1.2. In Proceedings of the 32nd USENIX Conference on Security Symposium, SEC ’23, USA. USENIX Association. Acessado em Julho/2024.

Cremers, C., Dax, A., and Naska, A. (2024). Breaking and provably restoring authentication: A formal analysis of SPDM 1.2 including cross-protocol attacks. Cryptology ePrint Archive, Paper 2024/2047. Acessado em Julho/2024.

Cui, A., Costello, M., and Stolfo, S. (2013). When firmware modifications attack: A case study of embedded exploitation.

Digilent (2024). Netfpga-sume (legacy). Acessado em Julho/2024.

DMTF (2023). Libspdm. Acessado em Maio/2025.

DTMF (2022). Security protocol and data model (spdm) specification. Acessado em Março/2025.

Hub, L. (2023). Linux on litex with a rv64gc rocketchip cpu. Acessado em Julho/2025.

Kermarrec, F., Bourdeauducq, S., Le Lann, J.-C., and Badier, H. (2020). Litex: an open-source soc builder and library based on migen python dsl. Acessado em Maio/2025.

Lenstra, A., Wang, X., and de Weger, B. (2005). Colliding x.509 certificates. Cryptology ePrint Archive, Paper 2005/067. Acessado em Julho/2025.

Mehta, D., Lu, H., Paradis, O. P., M. S., M. A., Rahman, M. T., Iskander, Y., Chawla, P., Woodard, D. L., Tehranipoor, M., and Asadizanjani, N. (2020). The big hack explained: Detection and prevention of pcb supply chain implants. J. Emerg. Technol. Comput. Syst., 16(4). Acessado em Julho/2025.

Nvidia (2022). Nvidia/spdm: Implementation of the spdm protocol. Acessado em Março/2025.

RISC-V (2020). opensbi. Acessado em Abril/2025.

riscv collab (2023). Risc-v gnu compiler toolchain. Acessado em Abril/2024.

SiFive (2017). The -march, -mabi, and -mtune arguments to risc-v compilers. Acessado em Maio/2024.

Wang, X., Konstantinou, C., Maniatakos, M., and Karri, R. (2015). Confirm: Detecting firmware modifications in embedded systems using hardware performance counters. In 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pages 544–551. IEEE.

Zhang, Y., Li, Y., and Li, Z. (2023). Aye: A trusted forensic method for firmware tampering attacks. Symmetry, 15(1).
Published
2025-09-01
BASTOS, Gustavo C.; SIMPLÍCIO JR., Marcos A.; ALBERTINI, Bruno C.. Hardware Protection with Security Protocol and Data Model. In: TOOLS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 25. , 2025, Foz do Iguaçu/PR. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2025 . p. 85-92. DOI: https://doi.org/10.5753/sbseg_estendido.2025.11653.

Most read articles by the same author(s)