首页 > 最新文献

Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security最新文献

英文 中文
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security 2018年硬件安全攻击与解决方案研讨会论文集
Chip-Hong Chang, U. Rührmair, Wei Zhang
{"title":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","authors":"Chip-Hong Chang, U. Rührmair, Wei Zhang","doi":"10.1145/3266444","DOIUrl":"https://doi.org/10.1145/3266444","url":null,"abstract":"","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fixing the CLOC with Fine-grain Leakage Analysis 通过细粒度泄漏分析修复 CLOC
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266450
William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, J. Kaps, K. Gaj
Authenticated ciphers offer the promise of improved security for resource-constrained devices. Recent cryptographic contests and standardization efforts are evaluating authenticated ciphers for performance and security, including resistance to Differential Power Analysis (DPA). In this research, we study the CLOC-AES authenticated cipher in terms of vulnerability to DPA and cost of implementation of countermeasures against DPA. Using the FOBOS test architecture, we first show that an FPGA implementation of CLOC is vulnerable to DPA through Test Vector Leakage Assessment methodology (i.e., t-tests). After applying DPA countermeasures, we show that protected CLOC implementations pass t-tests, except for discrete leakage corresponding to a data-dependent branch condition in the CLOC specification. Using an enhanced tool called FOBOS Profiler, we analyze the source of t-test failure down to the exact clock cycle and device state, to confirm the source of leakage. We introduce a new protected non-linear transformation into the datapath, remove all data-dependent decision criteria from the device controller, and verify that the updated protected implementations pass t-tests. We show that the cost of including the protected non-linear transformation leads to 3.8 factor growth in area, 48 percent reduction in throughput, and 86 percent reduction in throughput-to-area ratio, compared to the unprotected implementation. Our analysis shows the high cost of DPA-protected non-linear transformations in authenticated ciphers above the cryptographic primitive layer.
经过身份验证的密码为资源受限的设备提供了提高安全性的承诺。最近的密码学竞赛和标准化工作正在评估经过验证的密码的性能和安全性,包括对差分功率分析(DPA)的抵抗力。在本研究中,我们研究了clc - aes认证密码对DPA的脆弱性和实施DPA对策的成本。使用FOBOS测试架构,我们首先通过测试向量泄漏评估方法(即t检验)证明CLOC的FPGA实现容易受到DPA的攻击。在应用DPA对策后,我们表明受保护的CLOC实现通过了t检验,除了与CLOC规范中数据依赖分支条件相对应的离散泄漏。使用一种名为FOBOS Profiler的增强工具,我们分析t测试失败的来源,直到精确的时钟周期和设备状态,以确认泄漏的来源。我们在数据路径中引入了一个新的受保护的非线性转换,从设备控制器中删除了所有与数据相关的决策标准,并验证更新的受保护实现通过了t测试。我们表明,与未受保护的实现相比,包含受保护的非线性转换的成本导致面积增长3.8个因子,吞吐量减少48%,吞吐量与面积比减少86%。我们的分析表明,在加密原语层以上的认证密码中,dpa保护的非线性转换成本很高。
{"title":"Fixing the CLOC with Fine-grain Leakage Analysis","authors":"William Diehl, Farnoud Farahmand, Abubakr Abdulgadir, J. Kaps, K. Gaj","doi":"10.1145/3266444.3266450","DOIUrl":"https://doi.org/10.1145/3266444.3266450","url":null,"abstract":"Authenticated ciphers offer the promise of improved security for resource-constrained devices. Recent cryptographic contests and standardization efforts are evaluating authenticated ciphers for performance and security, including resistance to Differential Power Analysis (DPA). In this research, we study the CLOC-AES authenticated cipher in terms of vulnerability to DPA and cost of implementation of countermeasures against DPA. Using the FOBOS test architecture, we first show that an FPGA implementation of CLOC is vulnerable to DPA through Test Vector Leakage Assessment methodology (i.e., t-tests). After applying DPA countermeasures, we show that protected CLOC implementations pass t-tests, except for discrete leakage corresponding to a data-dependent branch condition in the CLOC specification. Using an enhanced tool called FOBOS Profiler, we analyze the source of t-test failure down to the exact clock cycle and device state, to confirm the source of leakage. We introduce a new protected non-linear transformation into the datapath, remove all data-dependent decision criteria from the device controller, and verify that the updated protected implementations pass t-tests. We show that the cost of including the protected non-linear transformation leads to 3.8 factor growth in area, 48 percent reduction in throughput, and 86 percent reduction in throughput-to-area ratio, compared to the unprotected implementation. Our analysis shows the high cost of DPA-protected non-linear transformations in authenticated ciphers above the cryptographic primitive layer.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards FPGA网卡200gbps硬件加速加密系统
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266446
Zdenek Martinasek, J. Hajny, D. Smekal, L. Malina, Denis Matousek, Michal Kekely, N. Mentens
We present the architecture and implementation of our encryption system designed for 200 Gbps FPGA (Field Programmable Gate Array) network cards utilizing the IPsec (IP security) protocol. To our knowledge, our hardware encryption system is the first that is able to encrypt network traffic at the full link speed of 200 Gbps using a proven algorithm in a secure mode of operation, on a network device that is already available on the market. Our implementation is based on the AES (Advanced Encryption Standard) encryption algorithm and the GCM (Galois Counter Mode) mode of operation, therefore it provides both encryption and authentication of transferred data. The design is modular and the AES can be easily substituted or extended by other ciphers. We present the full description of the architecture of our scheme, the VHDL (VHSIC Hardware Description Language) simulation results and the results of the practical implementation on the NFB-200G2QL network cards based on the Xilinx Virtex UltraScale+ chip. We also present the integration of the encryption core with the IPsec subsystem so that the resulting implementation is interoperable with other systems.
本文介绍了采用IPsec (IP安全)协议,为200 Gbps FPGA(现场可编程门阵列)网卡设计的加密系统的结构和实现。据我们所知,我们的硬件加密系统是第一个能够在市场上已经可用的网络设备上使用经过验证的算法在安全操作模式下以200 Gbps的全链路速度加密网络流量的系统。我们的实现基于AES(高级加密标准)加密算法和GCM(伽罗瓦计数器模式)操作模式,因此它提供了传输数据的加密和认证。该设计是模块化的,AES可以很容易地被其他密码替代或扩展。详细介绍了该方案的体系结构,VHDL (VHSIC硬件描述语言)仿真结果以及基于Xilinx Virtex UltraScale+芯片的NFB-200G2QL网卡上的实际实现结果。我们还介绍了加密核心与IPsec子系统的集成,以便最终实现可与其他系统互操作。
{"title":"200 Gbps Hardware Accelerated Encryption System for FPGA Network Cards","authors":"Zdenek Martinasek, J. Hajny, D. Smekal, L. Malina, Denis Matousek, Michal Kekely, N. Mentens","doi":"10.1145/3266444.3266446","DOIUrl":"https://doi.org/10.1145/3266444.3266446","url":null,"abstract":"We present the architecture and implementation of our encryption system designed for 200 Gbps FPGA (Field Programmable Gate Array) network cards utilizing the IPsec (IP security) protocol. To our knowledge, our hardware encryption system is the first that is able to encrypt network traffic at the full link speed of 200 Gbps using a proven algorithm in a secure mode of operation, on a network device that is already available on the market. Our implementation is based on the AES (Advanced Encryption Standard) encryption algorithm and the GCM (Galois Counter Mode) mode of operation, therefore it provides both encryption and authentication of transferred data. The design is modular and the AES can be easily substituted or extended by other ciphers. We present the full description of the architecture of our scheme, the VHDL (VHSIC Hardware Description Language) simulation results and the results of the practical implementation on the NFB-200G2QL network cards based on the Xilinx Virtex UltraScale+ chip. We also present the integration of the encryption core with the IPsec subsystem so that the resulting implementation is interoperable with other systems.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Acoustic Denial of Service Attacks on Hard Disk Drives 针对硬盘驱动器的声学拒绝服务攻击
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266448
Mohammad Shahrad, Arsalan Mosenia, Liwei Song, M. Chiang, D. Wentzlaff, Prateek Mittal
Bridging concepts from information security and resonance theory, we propose a novel denial of service attack against hard disk drives (HDDs). In this attack, acoustic signals are used to cause rotational vibrations in HDD platters in an attempt to create failures in read/write operations, ultimately halting the correct operation of HDDs. We perform a comprehensive examination of multiple HDDs to characterize the attack and show the feasibility of the attack in two real-world systems, namely, surveillance devices and personal computers. Our attack highlights an overlooked security vulnerability of HDDs, introducing a new threat that can potentially endanger the security of numerous systems.
结合信息安全和共振理论的概念,我们提出了一种针对硬盘驱动器(hdd)的新型拒绝服务攻击。在这种攻击中,声波信号被用来引起硬盘盘片的旋转振动,试图造成读/写操作失败,最终停止硬盘的正确操作。我们对多个hdd进行了全面检查,以表征攻击特征,并展示了在两个现实世界系统(即监视设备和个人计算机)中攻击的可行性。我们的攻击突出了hdd的一个被忽视的安全漏洞,引入了一个可能危及许多系统安全的新威胁。
{"title":"Acoustic Denial of Service Attacks on Hard Disk Drives","authors":"Mohammad Shahrad, Arsalan Mosenia, Liwei Song, M. Chiang, D. Wentzlaff, Prateek Mittal","doi":"10.1145/3266444.3266448","DOIUrl":"https://doi.org/10.1145/3266444.3266448","url":null,"abstract":"Bridging concepts from information security and resonance theory, we propose a novel denial of service attack against hard disk drives (HDDs). In this attack, acoustic signals are used to cause rotational vibrations in HDD platters in an attempt to create failures in read/write operations, ultimately halting the correct operation of HDDs. We perform a comprehensive examination of multiple HDDs to characterize the attack and show the feasibility of the attack in two real-world systems, namely, surveillance devices and personal computers. Our attack highlights an overlooked security vulnerability of HDDs, introducing a new threat that can potentially endanger the security of numerous systems.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124089678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers 从(大多数)由串通制造商设计的不可信组件中实现抗木马硬件
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266447
Olivier Bronchain, Louis Dassy, Sebastian Faust, François-Xavier Standaert
At CCS 2016, Dziembowski et al. proved the security of a generic compiler able to transform any circuit into a Trojan-resilient one based on a (necessary) number of trusted gates. Informally, it exploits techniques from the Multi-Party Computation (MPC) literature in order to exponentially reduce the probability of a successful Trojan attack. As a result, its concrete relevance depends on ( i ) the possibility to reach good performances with affordable hardware, and ( ii ) the actual number of trusted gates the solution requires. In this paper, we assess the practicality of the CCS 2016 Trojan-resilient compiler based on a block cipher case study, and optimize its performances in different directions. From the algorithmic viewpoint, we use a recent MPC protocol by Araki et al. (CCS 2016) in order to increase the throughput of our implementations, and we investigate various block ciphers and S-box representations to reduce their communication complexity. From a design viewpoint, we develop an architecture that balances the computation and communication cost of our Trojan-resilient circuits. From an implementation viewpoint, we describe a prototype hardware combining several commercial FPGAs on a dedicated printed circuit board. Thanks to these advances, we exhibit realistic performances for a Trojan-resilient circuit purposed for high-security applications, and confirm that the amount of trusted gates required by the CCS 2016 compiler is well minimized.
在CCS 2016上,Dziembowski等人证明了通用编译器的安全性,该编译器能够基于(必要的)可信门数量将任何电路转换为抗特洛伊木马的电路。非正式地,它利用多方计算(MPC)文献中的技术,以指数方式降低特洛伊木马攻击成功的概率。因此,它的具体相关性取决于(i)使用负担得起的硬件实现良好性能的可能性,以及(ii)解决方案所需的可信门的实际数量。在本文中,我们基于分组密码案例研究评估了CCS 2016抗木马编译器的实用性,并从不同方向优化了其性能。从算法的角度来看,我们使用了Araki等人(CCS 2016)最近的MPC协议,以增加我们实现的吞吐量,我们研究了各种分组密码和s盒表示,以降低它们的通信复杂性。从设计的角度来看,我们开发了一种架构,以平衡我们的特洛伊木马弹性电路的计算和通信成本。从实现的角度来看,我们描述了一个在专用印刷电路板上结合几个商用fpga的原型硬件。由于这些进步,我们展示了用于高安全性应用的特洛伊木马弹性电路的现实性能,并确认CCS 2016编译器所需的可信门的数量被很好地最小化。
{"title":"Implementing Trojan-Resilient Hardware from (Mostly) Untrusted Components Designed by Colluding Manufacturers","authors":"Olivier Bronchain, Louis Dassy, Sebastian Faust, François-Xavier Standaert","doi":"10.1145/3266444.3266447","DOIUrl":"https://doi.org/10.1145/3266444.3266447","url":null,"abstract":"At CCS 2016, Dziembowski et al. proved the security of a generic compiler able to transform any circuit into a Trojan-resilient one based on a (necessary) number of trusted gates. Informally, it exploits techniques from the Multi-Party Computation (MPC) literature in order to exponentially reduce the probability of a successful Trojan attack. As a result, its concrete relevance depends on ( i ) the possibility to reach good performances with affordable hardware, and ( ii ) the actual number of trusted gates the solution requires. In this paper, we assess the practicality of the CCS 2016 Trojan-resilient compiler based on a block cipher case study, and optimize its performances in different directions. From the algorithmic viewpoint, we use a recent MPC protocol by Araki et al. (CCS 2016) in order to increase the throughput of our implementations, and we investigate various block ciphers and S-box representations to reduce their communication complexity. From a design viewpoint, we develop an architecture that balances the computation and communication cost of our Trojan-resilient circuits. From an implementation viewpoint, we describe a prototype hardware combining several commercial FPGAs on a dedicated printed circuit board. Thanks to these advances, we exhibit realistic performances for a Trojan-resilient circuit purposed for high-security applications, and confirm that the amount of trusted gates required by the CCS 2016 compiler is well minimized.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124395353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hardware Security at the Limit: Nuclear Verification and Arms Control 极限硬件安全:核核查与军备控制
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266456
A. Glaser
Nuclear weapons have re-emerged as one the main global security challenges of our time. Any further reductions in the nuclear arsenals will have to rely on robust verification mechanisms. This requires, in particular, trusted measurement systems to confirm the authenticity of nuclear warheads based on their radiation signatures. These signatures are considered extremely sensitive information, and inspection systems have to be designed to protect them. To accomplish this task, so-called information barriers" have been proposed. These devices process sensitive information acquired during an inspection, but only display results in a pass/fail manner. Traditional inspection systems rely on complex electronics both for data acquisition and processing. Several research efforts have produced prototype systems, but after almost thirty years of research and development, no viable and widely accepted system has emerged. This talk highlights recent efforts to overcome this impasse. A first approach is to avoid electronics in critical parts of the measurement process altogether and to rely instead on physical phenomena to detect radiation and to confirm a unique fingerprint of the inspected warhead using a zero-knowledge protocol. A second approach is based on a radiation detection system using vintage electronics built around a 6502 processor. Hardware designed in the distant past, at a time when its use for sensitive measurements was never envisioned, may drastically reduce concerns that another party implemented backdoors or hidden switches. Sensitive information is only stored on traditional punched cards. The talk concludes with a roadmap and highlights opportunities for researchers from the hardware security community to make critical contributions to nuclear arms control and global security in the years ahead.
核武器已重新成为我们时代的主要全球安全挑战之一。进一步削减核武库必须依靠强有力的核查机制。这特别需要可靠的测量系统根据其辐射特征来确认核弹头的真实性。这些签名被认为是极其敏感的信息,必须设计检查系统来保护它们。为了完成这一任务,人们提出了所谓的“信息壁垒”。这些设备处理在检查过程中获得的敏感信息,但仅以通过/不通过的方式显示结果。传统的检测系统依靠复杂的电子设备进行数据采集和处理。一些研究工作已经产生了原型系统,但经过近三十年的研究和发展,没有一个可行的和被广泛接受的系统出现。这次谈话强调了最近为克服这一僵局所作的努力。第一种方法是在测量过程的关键部分完全避免使用电子设备,而是依靠物理现象来探测辐射,并使用零知识协议确认被检查弹头的唯一指纹。第二种方法是基于辐射探测系统,该系统使用的是围绕6502处理器构建的老式电子设备。在遥远的过去设计的硬件,在它用于敏感测量的时候,从来没有设想过,可能会大大减少对另一方实施后门或隐藏开关的担忧。敏感信息只存储在传统的穿孔卡片上。演讲以路线图结束,并强调了硬件安全社区的研究人员在未来几年为核军备控制和全球安全做出重要贡献的机会。
{"title":"Hardware Security at the Limit: Nuclear Verification and Arms Control","authors":"A. Glaser","doi":"10.1145/3266444.3266456","DOIUrl":"https://doi.org/10.1145/3266444.3266456","url":null,"abstract":"Nuclear weapons have re-emerged as one the main global security challenges of our time. Any further reductions in the nuclear arsenals will have to rely on robust verification mechanisms. This requires, in particular, trusted measurement systems to confirm the authenticity of nuclear warheads based on their radiation signatures. These signatures are considered extremely sensitive information, and inspection systems have to be designed to protect them. To accomplish this task, so-called information barriers\" have been proposed. These devices process sensitive information acquired during an inspection, but only display results in a pass/fail manner. Traditional inspection systems rely on complex electronics both for data acquisition and processing. Several research efforts have produced prototype systems, but after almost thirty years of research and development, no viable and widely accepted system has emerged. This talk highlights recent efforts to overcome this impasse. A first approach is to avoid electronics in critical parts of the measurement process altogether and to rely instead on physical phenomena to detect radiation and to confirm a unique fingerprint of the inspected warhead using a zero-knowledge protocol. A second approach is based on a radiation detection system using vintage electronics built around a 6502 processor. Hardware designed in the distant past, at a time when its use for sensitive measurements was never envisioned, may drastically reduce concerns that another party implemented backdoors or hidden switches. Sensitive information is only stored on traditional punched cards. The talk concludes with a roadmap and highlights opportunities for researchers from the hardware security community to make critical contributions to nuclear arms control and global security in the years ahead.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault Attacks 针对指令跳过错误攻击的低成本函数调用保护机制
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266453
Y. Yao, P. Schaumont
Fault attack is a known, dangerous threat to secure embedded systems. Function calls, including system calls, are particularly important but weak links for the integration of security components in a crypto-system. Function calls are vulnerable to an instruction skip caused by controlled fault injection such as clock glitching or power glitching. Previous work fails to address the vulnerability of function calls to instruction skip and develop corresponding countermeasures. In this paper, we provide a software fault detection mechanism to protect function calls against instruction skip attacks. Our method is generic, relies on the function output arguments, and does not require modification to the function body. We demonstrate our methodology on Gaisler's LEON3 simulator and quantify the overhead. Compared to a traditional function call duplication countermeasure, our proposed fault detection mechanism is a low-cost, low-overhead protection against instruction skip attacks.
故障攻击是对安全嵌入式系统的一种已知的危险威胁。函数调用,包括系统调用,是加密系统中集成安全组件的特别重要但薄弱的环节。函数调用容易受到由可控故障注入(如时钟故障或电源故障)引起的指令跳过的影响。以往的工作未能解决函数调用对指令跳过的脆弱性,并制定相应的对策。在本文中,我们提供了一种软件故障检测机制来保护函数调用免受指令跳过攻击。我们的方法是泛型的,依赖于函数输出参数,并且不需要修改函数体。我们在Gaisler的LEON3模拟器上演示了我们的方法,并量化了开销。与传统的函数调用复制对策相比,我们提出的故障检测机制是一种低成本、低开销的防止指令跳过攻击的方法。
{"title":"A Low-cost Function Call Protection Mechanism Against Instruction Skip Fault Attacks","authors":"Y. Yao, P. Schaumont","doi":"10.1145/3266444.3266453","DOIUrl":"https://doi.org/10.1145/3266444.3266453","url":null,"abstract":"Fault attack is a known, dangerous threat to secure embedded systems. Function calls, including system calls, are particularly important but weak links for the integration of security components in a crypto-system. Function calls are vulnerable to an instruction skip caused by controlled fault injection such as clock glitching or power glitching. Previous work fails to address the vulnerability of function calls to instruction skip and develop corresponding countermeasures. In this paper, we provide a software fault detection mechanism to protect function calls against instruction skip attacks. Our method is generic, relies on the function output arguments, and does not require modification to the function body. We demonstrate our methodology on Gaisler's LEON3 simulator and quantify the overhead. Compared to a traditional function call duplication countermeasure, our proposed fault detection mechanism is a low-cost, low-overhead protection against instruction skip attacks.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132842274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Demonstrating an LPPN Processor 演示LPPN处理器
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266445
D. Kamel, Davide Bellizia, François-Xavier Standaert, D. Flandre, D. Bol
Secure authentication is a necessary feature for the deployment of low-cost IoT devices. Due to their conceptual simplicity, protocols based on the Learning Parity with Noise (LPN) problem have been proposed as promising candidates for this purpose. However, recent research has shown that some implementation issues may limit the practical relevance of such protocols. First, they require a (Pseudo) Random number Generator (RNG) which may be expensive. Second, this RNG may be an easy target for side-channel analysis. The recently introduced Learning with Physical Noise (LPPN) assumption aims at mitigating these two issues. It removes the need of an RNG by directly performing erroneous computations, which is expected to lead to more efficient implementations and improved side-channel security. So far, the LPPN assumption has only been analyzed mathematically, and its feasibility discussed based on simulations, putting forward the possibility to control the error rate of an implementation thanks to frequency/voltage overscaling. In this paper, we confirm these promises by demonstrating a first prototype implementation of LPPN in a 28nm FDSOI CMOS technology which occupies an area of 19,400 μ m ^2$. We used a mixed 512-bit parallel/serial architecture in order to limit the exploitation of data-dependent errors with so-called filtering attacks. We additionally designed an on-chip feedback loop that adjusts a variable delay line in order to control the error rate, which prevents other attacks altering external parameters such as the supply voltage, operating temperature and clock frequency. Measurement results show that a simple authentication protocol based on LPPN would consumes 1 μJ per authentication at 0.45V supply. Combined with the excellent algorithmic properties of LPPN regarding security against side-channel and fault attacks, these concrete feasibility results therefore open the way towards the design of full authentication systems with high physical security, at lower cost than standard solutions based on block ciphers.
安全认证是部署低成本物联网设备的必要功能。由于其概念简单,基于噪声学习奇偶性(LPN)问题的协议已被提出作为这一目的的有希望的候选人。然而,最近的研究表明,一些实现问题可能会限制这些协议的实际相关性。首先,它们需要一个(伪)随机数生成器(RNG),这可能很昂贵。其次,这种RNG可能是侧通道分析的一个容易的目标。最近引入的物理噪声学习(LPPN)假设旨在缓解这两个问题。它通过直接执行错误计算来消除对RNG的需求,这有望导致更有效的实现和改进的侧信道安全性。到目前为止,LPPN假设仅在数学上进行了分析,并在仿真的基础上讨论了其可行性,提出了通过频率/电压过标来控制实现错误率的可能性。在本文中,我们通过在28nm FDSOI CMOS技术上展示LPPN的第一个原型实现来证实这些承诺,该技术占地19,400 μ m ^2$。我们使用了一个混合的512位并行/串行架构,以限制所谓的过滤攻击对数据依赖错误的利用。我们还设计了一个片上反馈回路,调整可变延迟线以控制错误率,从而防止其他攻击改变外部参数,如电源电压,工作温度和时钟频率。测试结果表明,在0.45V电压下,基于LPPN的简单认证协议每次认证功耗为1 μJ。结合LPPN在抗侧信道和故障攻击方面的优异算法特性,这些具体的可行性结果为设计具有高物理安全性的完整认证系统开辟了道路,其成本低于基于分组密码的标准解决方案。
{"title":"Demonstrating an LPPN Processor","authors":"D. Kamel, Davide Bellizia, François-Xavier Standaert, D. Flandre, D. Bol","doi":"10.1145/3266444.3266445","DOIUrl":"https://doi.org/10.1145/3266444.3266445","url":null,"abstract":"Secure authentication is a necessary feature for the deployment of low-cost IoT devices. Due to their conceptual simplicity, protocols based on the Learning Parity with Noise (LPN) problem have been proposed as promising candidates for this purpose. However, recent research has shown that some implementation issues may limit the practical relevance of such protocols. First, they require a (Pseudo) Random number Generator (RNG) which may be expensive. Second, this RNG may be an easy target for side-channel analysis. The recently introduced Learning with Physical Noise (LPPN) assumption aims at mitigating these two issues. It removes the need of an RNG by directly performing erroneous computations, which is expected to lead to more efficient implementations and improved side-channel security. So far, the LPPN assumption has only been analyzed mathematically, and its feasibility discussed based on simulations, putting forward the possibility to control the error rate of an implementation thanks to frequency/voltage overscaling. In this paper, we confirm these promises by demonstrating a first prototype implementation of LPPN in a 28nm FDSOI CMOS technology which occupies an area of 19,400 μ m ^2$. We used a mixed 512-bit parallel/serial architecture in order to limit the exploitation of data-dependent errors with so-called filtering attacks. We additionally designed an on-chip feedback loop that adjusts a variable delay line in order to control the error rate, which prevents other attacks altering external parameters such as the supply voltage, operating temperature and clock frequency. Measurement results show that a simple authentication protocol based on LPPN would consumes 1 μJ per authentication at 0.45V supply. Combined with the excellent algorithmic properties of LPPN regarding security against side-channel and fault attacks, these concrete feasibility results therefore open the way towards the design of full authentication systems with high physical security, at lower cost than standard solutions based on block ciphers.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114279154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Behavioral Fingerprinting of IoT Devices 物联网设备的行为指纹
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266452
Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, H. Shirazi, I. Ray, I. Ray
The Internet-of-Things (IoT) has brought in new challenges in device identification --what the device is, and authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. The problem of device identification is, on the other hand, sadly neglected. Almost always an artificially created identity is softly associated with the device. We believe that device fingerprinting can be used to solve both these problems effectively. In this work, we present a methodology to perform IoT device behavioral fingerprinting that can be employed to undertake strong device identification. A device behavior is approximated using features extracted from the network traffic of the device. These features are used to train a machine learning model that can be used to detect similar device-types. We validate our approach using five-fold cross validation; we report a identification rate of 93-100 and a mean accuracy of 99%, across all our experiments. Furthermore, we show preliminary results for fingerprinting device categories, i.e., identifying different devices having similar functionality.
物联网(IoT)给设备识别带来了新的挑战——设备是什么,以及身份验证——设备是什么,它声称是什么。传统上,身份验证问题是通过加密协议来解决的。然而,加密协议的计算复杂性和/或与密钥管理相关的问题,使得几乎所有基于加密的身份验证协议都不适合物联网。另一方面,设备识别的问题却被可悲地忽视了。几乎总是一个人为创造的身份与设备轻轻地联系在一起。我们相信,设备指纹可以有效地解决这两个问题。在这项工作中,我们提出了一种执行物联网设备行为指纹的方法,可用于进行强设备识别。使用从设备的网络流量中提取的特征来近似设备行为。这些特征用于训练机器学习模型,该模型可用于检测类似的设备类型。我们使用五重交叉验证来验证我们的方法;在我们所有的实验中,我们报告的识别率为93-100,平均准确率为99%。此外,我们展示了指纹设备类别的初步结果,即识别具有相似功能的不同设备。
{"title":"Behavioral Fingerprinting of IoT Devices","authors":"Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, H. Shirazi, I. Ray, I. Ray","doi":"10.1145/3266444.3266452","DOIUrl":"https://doi.org/10.1145/3266444.3266452","url":null,"abstract":"The Internet-of-Things (IoT) has brought in new challenges in device identification --what the device is, and authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. The problem of device identification is, on the other hand, sadly neglected. Almost always an artificially created identity is softly associated with the device. We believe that device fingerprinting can be used to solve both these problems effectively. In this work, we present a methodology to perform IoT device behavioral fingerprinting that can be employed to undertake strong device identification. A device behavior is approximated using features extracted from the network traffic of the device. These features are used to train a machine learning model that can be used to detect similar device-types. We validate our approach using five-fold cross validation; we report a identification rate of 93-100 and a mean accuracy of 99%, across all our experiments. Furthermore, we show preliminary results for fingerprinting device categories, i.e., identifying different devices having similar functionality.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124113478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Secure Positioning and Location-Based Security for IoT and Beyond 物联网及其他领域的安全定位和基于位置的安全
Pub Date : 2018-01-15 DOI: 10.1145/3266444.3266455
Srdjan Capkun
In this talk I will review security issues in today's navigation and close-range positioning systems. I will discuss why GNS systems like GPS are hard to fully secure and will present novel solutions that can be used to improve the robustness of GNS systems to attacks. I will then show how a different design of a positioning system can enable secure positioning, but also that this requires solving a set of relevant physical- and logical- layer challenges. Finally I will present a design and implementation of a fully integrated IR UWB secure distance measurement (distance bounding) system that solves these challenges and enables secure distance measurement and secure positioning in IoT applications. Finally, I will review possible uses of positioning in security applications such as authentication and access control.
在这次演讲中,我将回顾当今导航和近距离定位系统中的安全问题。我将讨论为什么像GPS这样的GNS系统很难完全安全,并将提出新的解决方案,可用于提高GNS系统对攻击的鲁棒性。然后,我将展示一种不同的定位系统设计如何实现安全定位,但这也需要解决一组相关的物理层和逻辑层挑战。最后,我将介绍一个完全集成的红外超宽带安全距离测量(距离边界)系统的设计和实现,该系统解决了这些挑战,并实现了物联网应用中的安全距离测量和安全定位。最后,我将回顾定位在安全应用程序(如身份验证和访问控制)中的可能用途。
{"title":"Secure Positioning and Location-Based Security for IoT and Beyond","authors":"Srdjan Capkun","doi":"10.1145/3266444.3266455","DOIUrl":"https://doi.org/10.1145/3266444.3266455","url":null,"abstract":"In this talk I will review security issues in today's navigation and close-range positioning systems. I will discuss why GNS systems like GPS are hard to fully secure and will present novel solutions that can be used to improve the robustness of GNS systems to attacks. I will then show how a different design of a positioning system can enable secure positioning, but also that this requires solving a set of relevant physical- and logical- layer challenges. Finally I will present a design and implementation of a fully integrated IR UWB secure distance measurement (distance bounding) system that solves these challenges and enables secure distance measurement and secure positioning in IoT applications. Finally, I will review possible uses of positioning in security applications such as authentication and access control.","PeriodicalId":104371,"journal":{"name":"Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116063512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1