首页 > 最新文献

WESS '10最新文献

英文 中文
A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software 综合分析了嵌入式软件中AES SBOX实现的性能和侧信道泄漏
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873553
A. Sinha, Zhimin Chen, P. Schaumont
The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as resistance against implementation attacks is mandatory. In this paper, we compare and contrast three different software implementations of AES. The first two are based on cryptographic lookup tables, while the third uses bit-slicing. We analyze the performance and side-channel resistance of each implementation on two different FPGA platforms, one based on a PowerPC processor, and the second based on a LEON-3 soft-core processor. Our measurements show that, on embedded platforms, a bit-sliced AES implementation does not always outperform a lookup-table based AES implementation. We also present a detailed analysis of the side-channel resistance and the source of side-channel leakage, and show that our bit-sliced implementation has eight times more side-channel leakage than the lookup-table implementations. Hence, we conclude that a variation on the implementation style for embedded software implementation of AES will not only affect performance, but also embedded system security.
高级加密标准几乎用于所有需要对称密钥密码的新型嵌入式应用程序。在这样的嵌入式应用程序中,高性能和抗实现攻击是必须的。在本文中,我们比较和对比了三种不同的AES软件实现。前两个基于加密查找表,而第三个使用位切片。我们在两种不同的FPGA平台上分析了每种实现的性能和侧通道电阻,一种基于PowerPC处理器,另一种基于LEON-3软核处理器。我们的测量表明,在嵌入式平台上,位切片AES实现并不总是优于基于查询表的AES实现。我们还详细分析了侧通道电阻和侧通道泄漏的来源,并表明我们的位切片实现比查找表实现的侧通道泄漏多8倍。因此,我们得出结论,嵌入式软件实现AES的实现风格的变化不仅会影响性能,还会影响嵌入式系统的安全性。
{"title":"A comprehensive analysis of performance and side-channel-leakage of AES SBOX implementations in embedded software","authors":"A. Sinha, Zhimin Chen, P. Schaumont","doi":"10.1145/1873548.1873553","DOIUrl":"https://doi.org/10.1145/1873548.1873553","url":null,"abstract":"The Advanced Encryption Standard is used in almost every new embedded application that needs a symmetric-key cipher. In such embedded applications, high-performance as well as resistance against implementation attacks is mandatory. In this paper, we compare and contrast three different software implementations of AES. The first two are based on cryptographic lookup tables, while the third uses bit-slicing. We analyze the performance and side-channel resistance of each implementation on two different FPGA platforms, one based on a PowerPC processor, and the second based on a LEON-3 soft-core processor. Our measurements show that, on embedded platforms, a bit-sliced AES implementation does not always outperform a lookup-table based AES implementation. We also present a detailed analysis of the side-channel resistance and the source of side-channel leakage, and show that our bit-sliced implementation has eight times more side-channel leakage than the lookup-table implementations. Hence, we conclude that a variation on the implementation style for embedded software implementation of AES will not only affect performance, but also embedded system security.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114231266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors PoliMakE:一个策略制定引擎,用于在芯片多处理器上安全执行嵌入式软件
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873550
L. A. Bathen, N. Dutt
Secure software execution on chip-multiprocessor platforms is compromised by threats such as software-based side channel attacks that expose information from shared memory. The increasing amount of shared (memory or computational) resources on emerging chip-multiprocessors further exacerbates security threats, highlighting the need for secure policies to manage on-chip resources. We present PoliMakE, a methodology that enables exploration and generation of customized policies to guarantee secure software execution on a chip-multiprocessor system in the presence of software-based side channel attacks. PoliMakE analyzes an application's security needs and generates a series of custom policies that dictate how to safely execute tasks and efficiently manage the computational, communication, and memory resources. Our experimental results on DRM, JPEG as well as some synthetic applications show that PoliMakE enables secure software execution with minimal performance overhead, while reducing power consumption, since the policies are customized to efficiently utilize the available on-chip resources. For the case study of running DRM in secure mode concurrently with JPEG encoding, we are able to observe 61% performance improvement when compared to standard approaches. Our policy generation engine is able to generate policies in only a matter of minutes for secure applications with hundreds of tasks. Unsecure applications were observed to resume execution up to 99% faster than with the traditional halt approach.
在芯片多处理器平台上的安全软件执行会受到一些威胁的影响,比如基于软件的侧通道攻击,这些攻击会暴露共享内存中的信息。新兴芯片多处理器上共享(内存或计算)资源的增加进一步加剧了安全威胁,突出了对管理芯片上资源的安全策略的需求。我们提出了PoliMakE,一种能够探索和生成定制策略的方法,以确保在存在基于软件的侧信道攻击的芯片多处理器系统上安全执行软件。PoliMakE分析应用程序的安全需求,并生成一系列自定义策略,这些策略指示如何安全执行任务,并有效地管理计算、通信和内存资源。我们在DRM、JPEG以及一些合成应用程序上的实验结果表明,PoliMakE能够以最小的性能开销实现安全的软件执行,同时降低功耗,因为策略是定制的,可以有效地利用可用的片上资源。对于在安全模式下与JPEG编码同时运行DRM的案例研究,我们能够观察到与标准方法相比,性能提高了61%。我们的策略生成引擎能够在几分钟内为具有数百个任务的安全应用程序生成策略。不安全的应用程序恢复执行的速度比传统的中断方法快99%。
{"title":"PoliMakE: a policy making engine for secure embedded software execution on chip-multiprocessors","authors":"L. A. Bathen, N. Dutt","doi":"10.1145/1873548.1873550","DOIUrl":"https://doi.org/10.1145/1873548.1873550","url":null,"abstract":"Secure software execution on chip-multiprocessor platforms is compromised by threats such as software-based side channel attacks that expose information from shared memory. The increasing amount of shared (memory or computational) resources on emerging chip-multiprocessors further exacerbates security threats, highlighting the need for secure policies to manage on-chip resources. We present PoliMakE, a methodology that enables exploration and generation of customized policies to guarantee secure software execution on a chip-multiprocessor system in the presence of software-based side channel attacks. PoliMakE analyzes an application's security needs and generates a series of custom policies that dictate how to safely execute tasks and efficiently manage the computational, communication, and memory resources. Our experimental results on DRM, JPEG as well as some synthetic applications show that PoliMakE enables secure software execution with minimal performance overhead, while reducing power consumption, since the policies are customized to efficiently utilize the available on-chip resources. For the case study of running DRM in secure mode concurrently with JPEG encoding, we are able to observe 61% performance improvement when compared to standard approaches. Our policy generation engine is able to generate policies in only a matter of minutes for secure applications with hundreds of tasks. Unsecure applications were observed to resume execution up to 99% faster than with the traditional halt approach.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115800775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Countering early evaluation: an approach towards robust dual-rail precharge logic 对抗早期评估:一种实现稳健双轨预充逻辑的方法
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873554
S. Bhasin, S. Guilley, Florent Flament, Nidhal Selmane, J. Danger
Wave Dynamic Differential Logic (WDDL) is a hiding countermeasure to thrawt side channel attacks (SCA). It suffers from a vulnerability called Early Evaluation, i.e. calculating output before all inputs are valid. This causes delay biases in WDDL even when synthesized with positive gates. s a consequence, the design can be attacked, although with extra effort, through side channel. However, WDDL is an appealing logic since it has already been reported to natively resist against multiple asymmetric faults. In this article, we suggest a Dual Rail Precharge Logic (DPL), similar to WDDL, free from early evaluation by design. We demonstrate practically that the early evaluation accounts for major part of the leakage. We also provide basic guidelines for designing such a DPL. This DPL can resist against side channel attacks and fault attacks at the same time. In line with the current security evaluation methodology, we use differential power analysis and mutual information to compare the modified WDDL with the traditional WDDL. To compare robustness w.r.t security, we conduct a proof-of-concept experiment that compares the two logics with identical implementations (P&R) apart from the logic style. The sensitive side channel leakage is reduced by half in the DPL without the early evaluation flaw.
波动态差分逻辑(WDDL)是一种针对侧信道攻击(SCA)的隐藏对策。它有一个被称为早期评估的漏洞,即在所有输入有效之前计算输出。这导致WDDL中的延迟偏差,即使与正门合成也是如此。因此,虽然需要额外的努力,但设计可能会通过侧通道受到攻击。然而,WDDL是一种吸引人的逻辑,因为已有报道称它可以本地抵抗多个非对称错误。在本文中,我们提出了一种双轨预充逻辑(DPL),类似于WDDL,不需要设计的早期评估。我们的实践证明,早期评估是泄漏的主要原因。我们还提供了设计这种DPL的基本准则。该DPL可以同时抵御侧信道攻击和故障攻击。根据目前的安全评估方法,我们使用差分功率分析和互信息来比较改进的WDDL与传统的WDDL。为了比较w.r.t安全性的鲁棒性,我们进行了一个概念验证实验,比较了两种具有相同实现(P&R)的逻辑,除了逻辑风格。在没有早期评估缺陷的情况下,DPL的敏感侧通道泄漏减少了一半。
{"title":"Countering early evaluation: an approach towards robust dual-rail precharge logic","authors":"S. Bhasin, S. Guilley, Florent Flament, Nidhal Selmane, J. Danger","doi":"10.1145/1873548.1873554","DOIUrl":"https://doi.org/10.1145/1873548.1873554","url":null,"abstract":"Wave Dynamic Differential Logic (WDDL) is a hiding countermeasure to thrawt side channel attacks (SCA). It suffers from a vulnerability called Early Evaluation, i.e. calculating output before all inputs are valid. This causes delay biases in WDDL even when synthesized with positive gates. s a consequence, the design can be attacked, although with extra effort, through side channel. However, WDDL is an appealing logic since it has already been reported to natively resist against multiple asymmetric faults. In this article, we suggest a Dual Rail Precharge Logic (DPL), similar to WDDL, free from early evaluation by design. We demonstrate practically that the early evaluation accounts for major part of the leakage. We also provide basic guidelines for designing such a DPL. This DPL can resist against side channel attacks and fault attacks at the same time. In line with the current security evaluation methodology, we use differential power analysis and mutual information to compare the modified WDDL with the traditional WDDL. To compare robustness w.r.t security, we conduct a proof-of-concept experiment that compares the two logics with identical implementations (P&R) apart from the logic style. The sensitive side channel leakage is reduced by half in the DPL without the early evaluation flaw.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
A new CRT-RSA algorithm resistant to powerful fault attacks 一种新的CRT-RSA算法,可抵抗强大的故障攻击
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873556
N. Ebeid, Rob Lambert
CRT-RSA is widely deployed in embedded devices to accelerate the RSA signature generation by about four times compared to regular RSA. However, since the Bellcore attack of 1996, research into securing CRT-RSA has remained active as countermeasures are themselves attacked. In this paper, we propose a new countermeasure designed with a powerful attacker in mind. The attacker may inject multiple precise/random faults and may alter the program counter to skip one or more instructions. The strength of our countermeasure derives from combining signature validation with signature unblinding modulo n.
CRT-RSA被广泛应用于嵌入式设备中,RSA签名的生成速度是常规RSA的4倍左右。然而,自从1996年的Bellcore攻击以来,保护CRT-RSA的研究一直很活跃,因为对策本身也受到了攻击。在本文中,我们提出了一种针对强大攻击者设计的新对策。攻击者可能会注入多个精确/随机错误,并可能改变程序计数器以跳过一条或多条指令。我们的对策的强度来源于签名验证和签名解盲模n的结合。
{"title":"A new CRT-RSA algorithm resistant to powerful fault attacks","authors":"N. Ebeid, Rob Lambert","doi":"10.1145/1873548.1873556","DOIUrl":"https://doi.org/10.1145/1873548.1873556","url":null,"abstract":"CRT-RSA is widely deployed in embedded devices to accelerate the RSA signature generation by about four times compared to regular RSA. However, since the Bellcore attack of 1996, research into securing CRT-RSA has remained active as countermeasures are themselves attacked. In this paper, we propose a new countermeasure designed with a powerful attacker in mind. The attacker may inject multiple precise/random faults and may alter the program counter to skip one or more instructions.\u0000 The strength of our countermeasure derives from combining signature validation with signature unblinding modulo n.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123867141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hardware-assisted security enhanced Linux in embedded systems: a proposal 嵌入式系统中硬件辅助安全性增强的Linux:一个建议
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873551
Leandro Fiorin, A. Ferrante, Konstantinos Padarnitsas, S. Carucci
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. This is especially true for embedded systems, often operating in non-secure environments, and with limited amount of computational, storage, and communication resources available. In servers and desktop systems, Security Enhanced Linux (SELinux) is currently used as a method to enhance security by enforcing a security control based on policies that confine user programs, or processes, to the minimum amount of privileges that they require for their execution. While providing a powerful mean for enhancing security in UNIX-like systems, SELinux still remains a feature that is too heavy to be fully supported by constrained devices. In this paper, we propose a hardware architecture for enhancing security and accelerating retrieval and applications of SELinux policies in embedded processors. We describe the general ideas behind our work, discussing motivations, advantages, and limits of the solution proposed, while suggesting the main steps needed to implement the described architecture on common embedded processors.
随着计算和通信日益渗透到我们的生活中,敏感数据和系统的安全和保护已成为极其重要的问题。对于嵌入式系统来说尤其如此,因为嵌入式系统通常在不安全的环境中运行,并且可用的计算、存储和通信资源有限。在服务器和桌面系统中,安全增强型Linux (SELinux)目前被用作一种增强安全性的方法,它基于将用户程序或进程限制在其执行所需的最小权限的策略来实施安全控制。虽然为增强类unix系统中的安全性提供了一种强大的手段,但SELinux仍然是一个太重的特性,无法被受限的设备完全支持。在本文中,我们提出了一个硬件架构,以提高安全性和加快检索和应用SELinux策略在嵌入式处理器。我们描述了我们工作背后的一般思想,讨论了所提出的解决方案的动机、优点和限制,同时提出了在通用嵌入式处理器上实现所描述的体系结构所需的主要步骤。
{"title":"Hardware-assisted security enhanced Linux in embedded systems: a proposal","authors":"Leandro Fiorin, A. Ferrante, Konstantinos Padarnitsas, S. Carucci","doi":"10.1145/1873548.1873551","DOIUrl":"https://doi.org/10.1145/1873548.1873551","url":null,"abstract":"As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. This is especially true for embedded systems, often operating in non-secure environments, and with limited amount of computational, storage, and communication resources available. In servers and desktop systems, Security Enhanced Linux (SELinux) is currently used as a method to enhance security by enforcing a security control based on policies that confine user programs, or processes, to the minimum amount of privileges that they require for their execution. While providing a powerful mean for enhancing security in UNIX-like systems, SELinux still remains a feature that is too heavy to be fully supported by constrained devices. In this paper, we propose a hardware architecture for enhancing security and accelerating retrieval and applications of SELinux policies in embedded processors. We describe the general ideas behind our work, discussing motivations, advantages, and limits of the solution proposed, while suggesting the main steps needed to implement the described architecture on common embedded processors.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing network-on-chip components to support security of processing elements 增强片上网络组件,以支持处理元素的安全性
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873560
S. Lukovic, Nikolaos Christianos
Network-on-Chip (NoC) has emerged as a promising solution for scalable communication among steadily growing number of cores integrated in MultiProcessor System-on-Chips (MPSoCs). The increasing system heterogeneity together with the possibility of reconfiguration makes the overall system security one of the major concerns in MPSoC design. On the other hand, modular and scalable design of NoCs enables their enhancements in various directions for supporting services other than simple data routing. In this work we propose and implement a solution to secure attached processing units from a buffer overflow type of the attacks that comes in a form of a protection module that is embedded into the Network Interface of the NoC. At the same time, our solution prevents potential propagation of the attack through the NoC towards other processors. We prove feasibility via prototype realization in FPGA technology for a MicroBlaze processor on Xilinx Virtex-II Pro board.
片上网络(NoC)已成为一种有前途的解决方案,用于在多处理器片上系统(mpsoc)中集成的核心数量稳步增长的可扩展通信。系统异构性的增加以及可重构的可能性使得整体系统安全性成为MPSoC设计的主要关注点之一。另一方面,noc的模块化和可扩展设计使它们能够在各种方向上进行增强,以支持除简单数据路由之外的服务。在这项工作中,我们提出并实现了一种解决方案,以保护附加处理单元免受缓冲区溢出类型的攻击,这种攻击以嵌入到NoC网络接口中的保护模块的形式出现。同时,我们的解决方案防止了攻击通过NoC向其他处理器的潜在传播。我们通过FPGA技术在Xilinx Virtex-II Pro板上实现MicroBlaze处理器的原型,证明了其可行性。
{"title":"Enhancing network-on-chip components to support security of processing elements","authors":"S. Lukovic, Nikolaos Christianos","doi":"10.1145/1873548.1873560","DOIUrl":"https://doi.org/10.1145/1873548.1873560","url":null,"abstract":"Network-on-Chip (NoC) has emerged as a promising solution for scalable communication among steadily growing number of cores integrated in MultiProcessor System-on-Chips (MPSoCs). The increasing system heterogeneity together with the possibility of reconfiguration makes the overall system security one of the major concerns in MPSoC design. On the other hand, modular and scalable design of NoCs enables their enhancements in various directions for supporting services other than simple data routing.\u0000 In this work we propose and implement a solution to secure attached processing units from a buffer overflow type of the attacks that comes in a form of a protection module that is embedded into the Network Interface of the NoC. At the same time, our solution prevents potential propagation of the attack through the NoC towards other processors. We prove feasibility via prototype realization in FPGA technology for a MicroBlaze processor on Xilinx Virtex-II Pro board.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Secure protocols for serverless remote product authentication 无服务器远程产品认证的安全协议
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873559
Abdourhamane Idrissa, A. Aubert, T. Fournel, V. Fischer
Industrial companies lose large sums of money because of counterfeits and they need to efficiently protect their trademarks. Most of them implement their own anti-counterfeiting policy to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and authenticate genuine products. Instead of using markers and additional identification means, one of the recent methods use a PUF-like authentication method based on image processing. However, in order to authenticate the object (e.g. a trademark product), the method needs direct access to the database system containing the object's "fingerprint". The paper presents a new secure method to remotely authenticate the object without communication with the database server. In this method, an autonomous and secure embedded system called authentication device authenticates the product by extracting its morphometric fingerprint and comparing it with a signed original morphometric fingerprint printed on the object. However, we show that in order to secure the protocol, the authentication hardware needs to be authenticated, too. For this reason, we propose security protocols that allow to authenticate the authentication device and remotely check its integrity. The proposed security protocols are shown to be sure using formal methods of security protocol evaluation.
工业公司因假冒产品损失了大量资金,他们需要有效地保护自己的商标。他们中的大多数都实施了自己的防伪政策来应对这种威胁。许多技术,如全息图、智能卡、生物识别标记和墨水,都可以用来保护和鉴定正品。最近的一种方法是使用基于图像处理的类似puf的身份验证方法,而不是使用标记和其他识别手段。然而,为了验证对象(例如商标产品),该方法需要直接访问包含对象“指纹”的数据库系统。本文提出了一种无需与数据库服务器通信即可远程认证对象的安全方法。在该方法中,一种称为认证设备的自主安全嵌入式系统通过提取产品的形态指纹并将其与打印在物体上的签名原始形态指纹进行比较来对产品进行身份验证。但是,我们将说明,为了保护协议,身份验证硬件也需要进行身份验证。出于这个原因,我们提出了允许对身份验证设备进行身份验证并远程检查其完整性的安全协议。使用安全协议评估的形式化方法证明了所提出的安全协议是可靠的。
{"title":"Secure protocols for serverless remote product authentication","authors":"Abdourhamane Idrissa, A. Aubert, T. Fournel, V. Fischer","doi":"10.1145/1873548.1873559","DOIUrl":"https://doi.org/10.1145/1873548.1873559","url":null,"abstract":"Industrial companies lose large sums of money because of counterfeits and they need to efficiently protect their trademarks. Most of them implement their own anti-counterfeiting policy to deal with the menace. A number of technologies, such as holograms, smart cards, biometric markers and inks, can be employed to protect and authenticate genuine products. Instead of using markers and additional identification means, one of the recent methods use a PUF-like authentication method based on image processing. However, in order to authenticate the object (e.g. a trademark product), the method needs direct access to the database system containing the object's \"fingerprint\". The paper presents a new secure method to remotely authenticate the object without communication with the database server. In this method, an autonomous and secure embedded system called authentication device authenticates the product by extracting its morphometric fingerprint and comparing it with a signed original morphometric fingerprint printed on the object. However, we show that in order to secure the protocol, the authentication hardware needs to be authenticated, too. For this reason, we propose security protocols that allow to authenticate the authentication device and remotely check its integrity. The proposed security protocols are shown to be sure using formal methods of security protocol evaluation.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122619156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new correlation frequency analysis of the side channel 一种新的侧信道相关频率分析方法
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873552
Edgar Mateos, C. Gebotys
Security in embedded computing systems is now an important concern for a diverse set of applications. However, the embedded hardware implementation may unintentionally leak information, through its electromagnetic emanations or current draw, which may lead to the revelation of secrets used in the cryptographic computations being performed. This paper presents an attack methodology and an empirical study, based on Correlation Analysis in the Frequency domain (CAF) with pre-characterization of the embedded system. Unlike previous research this analysis exploits the fact that a few frequencies are more likely to leak computing information, and are independent of the system clock (rather a function of the technology). Results indicate that the secret key can be reliably extracted from both hardware and software implementations of AES. The analysis presented is additionally tolerant to trace misalignments and has been tested with real power and electromagnetic (EM) traces used to extract 8-bit keys and full 128-bit keys. This research is important for providing more secure cryptographic computations necessary in many embedded systems.
嵌入式计算系统中的安全性现在是各种应用程序的一个重要关注点。然而,嵌入式硬件实现可能无意中通过其电磁发射或电流抽取泄露信息,这可能导致正在执行的加密计算中使用的秘密被泄露。本文提出了一种基于频域相关分析(CAF)和嵌入式系统预表征的攻击方法和实证研究。与之前的研究不同,这个分析利用了这样一个事实,即少数频率更有可能泄露计算信息,并且与系统时钟无关(而不是技术的功能)。结果表明,AES的硬件实现和软件实现都可以可靠地提取密钥。所提出的分析还可以容忍跟踪偏差,并且已经用实际功率和电磁(EM)走线进行了测试,用于提取8位密钥和完整的128位密钥。这项研究对于提供许多嵌入式系统所需的更安全的加密计算具有重要意义。
{"title":"A new correlation frequency analysis of the side channel","authors":"Edgar Mateos, C. Gebotys","doi":"10.1145/1873548.1873552","DOIUrl":"https://doi.org/10.1145/1873548.1873552","url":null,"abstract":"Security in embedded computing systems is now an important concern for a diverse set of applications. However, the embedded hardware implementation may unintentionally leak information, through its electromagnetic emanations or current draw, which may lead to the revelation of secrets used in the cryptographic computations being performed. This paper presents an attack methodology and an empirical study, based on Correlation Analysis in the Frequency domain (CAF) with pre-characterization of the embedded system. Unlike previous research this analysis exploits the fact that a few frequencies are more likely to leak computing information, and are independent of the system clock (rather a function of the technology). Results indicate that the secret key can be reliably extracted from both hardware and software implementations of AES. The analysis presented is additionally tolerant to trace misalignments and has been tested with real power and electromagnetic (EM) traces used to extract 8-bit keys and full 128-bit keys. This research is important for providing more secure cryptographic computations necessary in many embedded systems.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134291306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Hardware trust implications of 3-D integration 3-D集成的硬件信任含义
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873549
Ted Huffmire, T. Levin, Michael Bilzor, C. Irvine, Jonathan Valamehr, Mohit Tiwari, T. Sherwood, R. Kastner
3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductive posts. Since the dies may be manufactured separately, 3-D circuit integration offers the option of enhancing a commodity processor with a variety of security functions. This paper examines the 3-D design approach and provides an analysis concluding that the commodity die system need not be independently trustworthy for the system of joined dies to provide certain trustworthy functions. In addition to describing the range of possible security enhancements (such as cryptographic services), we describe the ways in which multiple-die subsystems can depend on each other, and a set of processing abstractions and general design constraints with examples to address these dependencies.
三维电路级集成是一种芯片制造技术,其中两个或多个芯片堆叠并通过使用垂直导电柱组合成单个电路。由于模具可以单独制造,3-D电路集成提供了增强具有各种安全功能的商品处理器的选择。本文对三维设计方法进行了探讨,并进行了分析,认为连接模系统要提供一定的可靠功能,不需要商品模系统独立可靠。除了描述可能的安全增强(如加密服务)的范围外,我们还描述了多模子系统相互依赖的方式,以及一组处理抽象和通用设计约束,并提供了解决这些依赖关系的示例。
{"title":"Hardware trust implications of 3-D integration","authors":"Ted Huffmire, T. Levin, Michael Bilzor, C. Irvine, Jonathan Valamehr, Mohit Tiwari, T. Sherwood, R. Kastner","doi":"10.1145/1873548.1873549","DOIUrl":"https://doi.org/10.1145/1873548.1873549","url":null,"abstract":"3-D circuit-level integration is a chip fabrication technique in which two or more dies are stacked and combined into a single circuit through the use of vertical electroconductive posts. Since the dies may be manufactured separately, 3-D circuit integration offers the option of enhancing a commodity processor with a variety of security functions. This paper examines the 3-D design approach and provides an analysis concluding that the commodity die system need not be independently trustworthy for the system of joined dies to provide certain trustworthy functions. In addition to describing the range of possible security enhancements (such as cryptographic services), we describe the ways in which multiple-die subsystems can depend on each other, and a set of processing abstractions and general design constraints with examples to address these dependencies.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130396709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Improving the quality of ring oscillator PUFs on FPGAs 提高fpga环形振荡器puf的质量
Pub Date : 2010-10-24 DOI: 10.1145/1873548.1873557
D. Merli, F. Stumpf, C. Eckert
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several design parameters. In this paper, we show that ring oscillator frequencies strongly depend on surrounding logic. Based on these findings, we propose a strategy for improving the quality of RO PUF designs by placing and comparing ROs in a chain-like structure. We also show that an increased RO runtime and RO disabling has a clear positive effect on the quality of a RO PUF. We implemented a RO PUF key generation system on an FPGA using our design strategy. Our results clearly indicate that our proposed design strategy can significantly improve the quality of a RO PUF implementation.
基于环振子(ROs)的物理不可克隆函数(puf)是一种很有前途的FPGA安全原语。然而,它们的实现质量取决于几个设计参数。在本文中,我们证明了环形振荡器的频率强烈依赖于周围的逻辑。基于这些发现,我们提出了一种通过在链状结构中放置和比较ROs来提高RO PUF设计质量的策略。我们还表明,增加的RO运行时间和RO禁用对RO PUF的质量有明显的积极影响。我们使用我们的设计策略在FPGA上实现了一个RO PUF密钥生成系统。我们的结果清楚地表明,我们提出的设计策略可以显著提高RO PUF实施的质量。
{"title":"Improving the quality of ring oscillator PUFs on FPGAs","authors":"D. Merli, F. Stumpf, C. Eckert","doi":"10.1145/1873548.1873557","DOIUrl":"https://doi.org/10.1145/1873548.1873557","url":null,"abstract":"Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several design parameters. In this paper, we show that ring oscillator frequencies strongly depend on surrounding logic. Based on these findings, we propose a strategy for improving the quality of RO PUF designs by placing and comparing ROs in a chain-like structure. We also show that an increased RO runtime and RO disabling has a clear positive effect on the quality of a RO PUF. We implemented a RO PUF key generation system on an FPGA using our design strategy. Our results clearly indicate that our proposed design strategy can significantly improve the quality of a RO PUF implementation.","PeriodicalId":114446,"journal":{"name":"WESS '10","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132642623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 107
期刊
WESS '10
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1