首页 > 最新文献

Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems最新文献

英文 中文
TrustZone-backed bitcoin wallet trustzone支持的比特币钱包
Miraje Gentilal, P. Martins, L. Sousa
With the increasing popularity of virtual currencies, it has become more important to have highly secure devices in which to store private-key information. Furthermore, ARM has made available an extension of processors architectures, designated TrustZone, which allows for the separation of trusted and non-trusted environments, while ensuring the integrity of the OS code. In this paper, we propose the exploitation of this technology to implement a flexible and reliable bitcoin wallet that is more resilient to dictionary and side-channel attacks. Making use of the TrustZone comes with the downside that writing and reading operations become slower, due to the encrypted storage, but we show that cryptographic operations can in fact be executed more efficiently as a result of platform-specific optimizations.
随着虚拟货币的日益普及,拥有高度安全的设备来存储私钥信息变得更加重要。此外,ARM还提供了处理器架构的扩展,称为TrustZone,它允许分离可信和非可信环境,同时确保操作系统代码的完整性。在本文中,我们建议利用该技术来实现一个灵活可靠的比特币钱包,该钱包对字典和侧通道攻击更具弹性。使用TrustZone的缺点是,由于加密存储,写入和读取操作变得更慢,但我们表明,由于特定于平台的优化,加密操作实际上可以更有效地执行。
{"title":"TrustZone-backed bitcoin wallet","authors":"Miraje Gentilal, P. Martins, L. Sousa","doi":"10.1145/3031836.3031841","DOIUrl":"https://doi.org/10.1145/3031836.3031841","url":null,"abstract":"With the increasing popularity of virtual currencies, it has become more important to have highly secure devices in which to store private-key information. Furthermore, ARM has made available an extension of processors architectures, designated TrustZone, which allows for the separation of trusted and non-trusted environments, while ensuring the integrity of the OS code. In this paper, we propose the exploitation of this technology to implement a flexible and reliable bitcoin wallet that is more resilient to dictionary and side-channel attacks. Making use of the TrustZone comes with the downside that writing and reading operations become slower, due to the encrypted storage, but we show that cryptographic operations can in fact be executed more efficiently as a result of platform-specific optimizations.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126045210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Side-channel leakage aware instruction scheduling 侧通道泄漏感知指令调度
Hermann Seuschek, F. D. Santis, O. Guillen
Speed-optimized side-channel protected software implementations of block ciphers are important for the security of embedded IoT devices based on general-purpose microcontrollers. The recent work of Schwabe et al. published at SAC 2016 introduced a bit-sliced implementation of AES and a first-order Boolean-masked version of it, targeting ARM Cortex-M CPU cores. The authors claim to be secure against timing as well as first-order power and electromagnetic side-channel attacks. However, the author's security claims are not taking the actual leakage characteristics of the underlying CPU architecture into account, hence making the scheme potentially vulnerable to first-order attacks in practice. In this work we show indeed that such a masking scheme can be attacked very easily by first-order electromagnetic side-channel attacks. In order to fix the issue and provide practical first-order security, we provide a strategy to schedule program instructions in way that the specific leakage of the CPU does not impair the side-channel countermeasure.
分组密码的速度优化侧信道保护软件实现对于基于通用微控制器的嵌入式物联网设备的安全性非常重要。Schwabe等人最近在SAC 2016上发表的工作介绍了AES的位切片实现和一阶布尔掩码版本,目标是ARM Cortex-M CPU内核。作者声称,该方法可以防止时序攻击、一阶功率攻击和电磁侧信道攻击。然而,作者的安全声明并没有考虑到底层CPU架构的实际泄漏特性,因此使得该方案在实践中可能容易受到一阶攻击。在这项工作中,我们确实证明了这种掩蔽方案可以很容易地受到一阶电磁侧信道攻击。为了解决这个问题并提供实用的一阶安全性,我们提供了一种策略来调度程序指令,使CPU的特定泄漏不会损害侧信道对策。
{"title":"Side-channel leakage aware instruction scheduling","authors":"Hermann Seuschek, F. D. Santis, O. Guillen","doi":"10.1145/3031836.3031838","DOIUrl":"https://doi.org/10.1145/3031836.3031838","url":null,"abstract":"Speed-optimized side-channel protected software implementations of block ciphers are important for the security of embedded IoT devices based on general-purpose microcontrollers. The recent work of Schwabe et al. published at SAC 2016 introduced a bit-sliced implementation of AES and a first-order Boolean-masked version of it, targeting ARM Cortex-M CPU cores. The authors claim to be secure against timing as well as first-order power and electromagnetic side-channel attacks. However, the author's security claims are not taking the actual leakage characteristics of the underlying CPU architecture into account, hence making the scheme potentially vulnerable to first-order attacks in practice. In this work we show indeed that such a masking scheme can be attacked very easily by first-order electromagnetic side-channel attacks. In order to fix the issue and provide practical first-order security, we provide a strategy to schedule program instructions in way that the specific leakage of the CPU does not impair the side-channel countermeasure.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices 可靠的低开销基于仲裁器的物理不可克隆功能,用于资源受限的物联网设备
S. Tao, E. Dubrova
Physical unclonable functions (PUFs) are promising hardware security primitives suitable for resource-constrained devices requiring lightweight cryptographic methods. However, PUF responses frequently suffer from instability due to varying environmental conditions such as voltage and temperature. In this paper, we introduce circuit-level techniques to enhance the reliability of delay-based PUFs against temperature variation. We propose a voltage controlled current starved (VCCS) delay element that can effectively reduce temperature sensitivity and thus improve the reliability of PUF responses. Built on the VCCS delay element, two test-case arbiter-based PUF architectures are implemented in a standard 65nm CMOS technology and validated through post-layout Monte-Carlo simulation. Evaluation results show that two proposed PUF designs satisfy requirements on randomness, uniqueness, and reliability over a wide temperature range. Moreover, the proposed approach imposes only a marginal overhead leading to one of the most energy-efficient PUFs in the state-of-the-art.
物理不可克隆函数(puf)是一种很有前途的硬件安全原语,适用于需要轻量级加密方法的资源受限设备。然而,由于电压和温度等环境条件的变化,PUF响应经常遭受不稳定。在本文中,我们介绍了电路级技术来提高基于延迟的puf对温度变化的可靠性。我们提出了一种电压控制电流饥渴(VCCS)延迟元件,它可以有效地降低温度敏感性,从而提高PUF响应的可靠性。基于VCCS延迟元件,两种基于测试用例仲裁器的PUF架构在标准65nm CMOS技术上实现,并通过布局后蒙特卡罗仿真进行验证。评估结果表明,两种PUF设计在较宽温度范围内满足随机性、唯一性和可靠性要求。此外,所提出的方法只会产生一个边际开销,从而成为最节能的puf之一。
{"title":"Reliable low-overhead arbiter-based physical unclonable functions for resource-constrained IoT devices","authors":"S. Tao, E. Dubrova","doi":"10.1145/3031836.3031837","DOIUrl":"https://doi.org/10.1145/3031836.3031837","url":null,"abstract":"Physical unclonable functions (PUFs) are promising hardware security primitives suitable for resource-constrained devices requiring lightweight cryptographic methods. However, PUF responses frequently suffer from instability due to varying environmental conditions such as voltage and temperature. In this paper, we introduce circuit-level techniques to enhance the reliability of delay-based PUFs against temperature variation. We propose a voltage controlled current starved (VCCS) delay element that can effectively reduce temperature sensitivity and thus improve the reliability of PUF responses. Built on the VCCS delay element, two test-case arbiter-based PUF architectures are implemented in a standard 65nm CMOS technology and validated through post-layout Monte-Carlo simulation. Evaluation results show that two proposed PUF designs satisfy requirements on randomness, uniqueness, and reliability over a wide temperature range. Moreover, the proposed approach imposes only a marginal overhead leading to one of the most energy-efficient PUFs in the state-of-the-art.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121572130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures 基于过滤的CPA:一种成功的反同步侧信道攻击
K. M. Abdellatif, Damien Couroussé, O. Potin, P. Jaillon
Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of desynchronization is to obtain a non-predictable offset of the attacking point in terms of time dimension. For this purpose, we present exploiting pattern-recognition methods to filter interesting points for obtaining a successful side channel attack. Using this tool as a case study, we completely cancel the desynchronization effect of the CHES 2009/2010 countermeasure [2, 3]. Moreover, 25k traces are needed for a successful key recoveries in case of polymorphism-based countermeasure [4].
针对侧信道攻击的安全实现通常在软件实现中结合隐藏和屏蔽保护。在这项工作中,我们重点研究了非同步保护,它被认为是一种隐藏对策。非同步的思想是获得攻击点在时间维度上的不可预测偏移。为此,我们提出利用模式识别方法来过滤感兴趣的点,以获得成功的侧信道攻击。以该工具为例,我们完全消除了CHES 2009/2010对策的去同步效应[2,3]。此外,在基于多态性的对策的情况下,成功的密钥恢复需要25k道[4]。
{"title":"Filtering-based CPA: a successful side-channel attack against desynchronization countermeasures","authors":"K. M. Abdellatif, Damien Couroussé, O. Potin, P. Jaillon","doi":"10.1145/3031836.3031842","DOIUrl":"https://doi.org/10.1145/3031836.3031842","url":null,"abstract":"Secure implementations against side channel attacks usually combine hiding and masking protections in software implementations. In this work, we focus on desynchronization protection which is considered as a hiding countermeasure. The idea of desynchronization is to obtain a non-predictable offset of the attacking point in terms of time dimension. For this purpose, we present exploiting pattern-recognition methods to filter interesting points for obtaining a successful side channel attack. Using this tool as a case study, we completely cancel the desynchronization effect of the CHES 2009/2010 countermeasure [2, 3]. Moreover, 25k traces are needed for a successful key recoveries in case of polymorphism-based countermeasure [4].","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128310206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS 多核数据分析SoC,采用65纳米CMOS,灵活的1.76 Gbit/s AES-XTS加密加速器
Frank K. Gürkaynak, R. Schilling, M. Muehlberghuber, Francesco Conti, S. Mangard, L. Benini
Embedded systems for Internet-of-Things applications present new challenges to system design. From a hardware design perspective, energy efficiency is paramount, as most of devices have a limited power supply due to size considerations. Transmitting data away from the node remains a very power hungry operation, and the only viable solution to this problem is to reduce the amount of data by performing pre-processing which again requires additional computational power. Hence modern embedded devices need to strike a fine balance between the power needed for acquisition/processing and communication. In many scenarios, small IoT devices will be deployed widely making them vulnerable to malicious attacks. Thus, for practical applications, these devices also need to fit the necessary resources to provide adequate security services. We present a cryptographic hardware accelerator capable of supporting multiple encryption and decryption modes for different cryptographic algorithms (AES, Keccak) in an energy efficient multi-core cluster optimized for embedded digital signal processing applications implemented in 65 nm CMOS technology. We show that it is possible to have the necessary computation power to perform cryptographic services in addition to state of the art processing in a power budget that is compatible with IoT devices in a mature 65 nm CMOS technology. When running at 0.8 V the SoC with the cryptographic accelerator can be clocked at 84 MHz running AES-XTS at more than 250 Mbits/s consuming a total of 27 mW, which is a 100 × gain in energy and 496 × gain in operation speed over an optimized software implementation running on a single 32 bit OpenRISC core.
面向物联网应用的嵌入式系统对系统设计提出了新的挑战。从硬件设计的角度来看,能源效率是最重要的,因为大多数设备由于尺寸考虑而具有有限的电源。从节点传输数据仍然是一个非常耗电的操作,这个问题的唯一可行的解决方案是通过执行预处理来减少数据量,这同样需要额外的计算能力。因此,现代嵌入式设备需要在采集/处理和通信所需的功率之间取得良好的平衡。在许多情况下,小型物联网设备将被广泛部署,使其容易受到恶意攻击。因此,在实际应用中,这些设备还需要配备必要的资源,以提供足够的安全服务。我们提出了一个加密硬件加速器,能够支持不同加密算法(AES, Keccak)的多种加密和解密模式,在一个节能的多核集群中,针对65纳米CMOS技术实现的嵌入式数字信号处理应用进行了优化。我们表明,除了在成熟的65纳米CMOS技术中与物联网设备兼容的功率预算中进行最先进的处理之外,还可能具有执行加密服务所需的计算能力。当在0.8 V下运行时,带有加密加速器的SoC可以以84 MHz的频率运行AES-XTS,速度超过250 Mbits/s,总共消耗27 mW,这是在单个32位OpenRISC内核上运行的优化软件实现上的100倍能量增益和496倍操作速度增益。
{"title":"Multi-core data analytics SoC with a flexible 1.76 Gbit/s AES-XTS cryptographic accelerator in 65 nm CMOS","authors":"Frank K. Gürkaynak, R. Schilling, M. Muehlberghuber, Francesco Conti, S. Mangard, L. Benini","doi":"10.1145/3031836.3031840","DOIUrl":"https://doi.org/10.1145/3031836.3031840","url":null,"abstract":"Embedded systems for Internet-of-Things applications present new challenges to system design. From a hardware design perspective, energy efficiency is paramount, as most of devices have a limited power supply due to size considerations. Transmitting data away from the node remains a very power hungry operation, and the only viable solution to this problem is to reduce the amount of data by performing pre-processing which again requires additional computational power. Hence modern embedded devices need to strike a fine balance between the power needed for acquisition/processing and communication. In many scenarios, small IoT devices will be deployed widely making them vulnerable to malicious attacks. Thus, for practical applications, these devices also need to fit the necessary resources to provide adequate security services. We present a cryptographic hardware accelerator capable of supporting multiple encryption and decryption modes for different cryptographic algorithms (AES, Keccak) in an energy efficient multi-core cluster optimized for embedded digital signal processing applications implemented in 65 nm CMOS technology. We show that it is possible to have the necessary computation power to perform cryptographic services in addition to state of the art processing in a power budget that is compatible with IoT devices in a mature 65 nm CMOS technology. When running at 0.8 V the SoC with the cryptographic accelerator can be clocked at 84 MHz running AES-XTS at more than 250 Mbits/s consuming a total of 27 mW, which is a 100 × gain in energy and 496 × gain in operation speed over an optimized software implementation running on a single 32 bit OpenRISC core.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134011812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Large scale characterization of SRAM on infineon XMC microcontrollers as PUF 英飞凌XMC微控制器上SRAM作为PUF的大规模表征
F. Wilde
SRAM-based physical unclonable functions (SRAM PUFs) derive a device dependent secret from the start-up pattern of their memory cells and have shown very promising results in previous publications. This work presents a dataset measured on 144 Infineon XMC4500 microcontrollers containing 160 KiB of SRAM sampled 101 times each in 2015 and 2016. Analyses are done using state-of-the-art metrics by Maiti et al., Hori et al., and by custom inspections. In extensive comparison to previous work, this work is found to score best in average Reliability and Bit-Alias, match with previous top results in average Uniformity and still mid-range in Uniqueness. This confirms previous results that general purpose SRAM on microcontrollers is adequate for most PUF applications. To support further research into SRAM PUFs and their post-processing, the full dataset originating from this work will be made publicly available on the internet.
基于SRAM的物理不可克隆函数(SRAM puf)从其存储细胞的启动模式中获得了器件依赖的秘密,并且在以前的出版物中显示出非常有希望的结果。这项工作提出了一个在144个英飞凌XMC4500微控制器上测量的数据集,其中包含160 KiB的SRAM,每个控制器在2015年和2016年采样101次。分析由Maiti等人、Hori等人使用最先进的指标,并通过定制检查完成。在与之前的工作进行广泛比较后,我们发现这项工作在平均可靠性和位别名方面得分最高,在平均均匀性方面与之前的最高结果相匹配,在唯一性方面仍然处于中等水平。这证实了先前的结果,即微控制器上的通用SRAM适合大多数PUF应用。为了支持对SRAM puf及其后处理的进一步研究,源自这项工作的完整数据集将在互联网上公开提供。
{"title":"Large scale characterization of SRAM on infineon XMC microcontrollers as PUF","authors":"F. Wilde","doi":"10.1145/3031836.3031839","DOIUrl":"https://doi.org/10.1145/3031836.3031839","url":null,"abstract":"SRAM-based physical unclonable functions (SRAM PUFs) derive a device dependent secret from the start-up pattern of their memory cells and have shown very promising results in previous publications. This work presents a dataset measured on 144 Infineon XMC4500 microcontrollers containing 160 KiB of SRAM sampled 101 times each in 2015 and 2016. Analyses are done using state-of-the-art metrics by Maiti et al., Hori et al., and by custom inspections. In extensive comparison to previous work, this work is found to score best in average Reliability and Bit-Alias, match with previous top results in average Uniformity and still mid-range in Uniqueness. This confirms previous results that general purpose SRAM on microcontrollers is adequate for most PUF applications. To support further research into SRAM PUFs and their post-processing, the full dataset originating from this work will be made publicly available on the internet.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125875866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems 第四届计算机系统密码学与安全研讨会论文集
M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi
On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. The wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. The workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.
我代表项目和组织委员会,非常高兴地欢迎您参加第一届计算系统密码学和安全研讨会(CS2 2014)。CS2会议于2014年1月20日在奥地利维也纳与HiPEAC 2014同时举行。嵌入式系统的广泛普及,包括多核、多核和可重新配置的平台,对这些系统的操作安全性以及存储在其中的信息提出了许多挑战。恶意的攻击者可以利用未受保护的通信来劫持网络物理系统,导致不正确和潜在的高度危险的行为,或者可以利用侧信道信息泄漏,以及逆向工程提示,从计算系统中恢复秘密信息。不可信的第三方软件和硬件可以为此类攻击创造机会,必须检测并消除或抵消这些攻击。此外,现代和未来嵌入式和移动系统的复杂性导致需要脱离手动规划和部署安全功能。因此,需要设计自动化工具来设计和验证新硬件/软件系统的安全特性。研讨会为安全和密码学专家提供了一个与计算机体系结构和编译器社区互动的场所,旨在通过交叉施肥和多学科方法来解决计算系统的安全和隐私挑战。
{"title":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","authors":"M. Brorsson, Zhonghai Lu, G. Agosta, Alessandro Barenghi, Gerardo Pelosi","doi":"10.1145/3031836","DOIUrl":"https://doi.org/10.1145/3031836","url":null,"abstract":"On behalf of the program and organizing committees, it is a great pleasure to welcome you to the First Workshop on Cryptography and Security in Computing Systems (CS2 2014). The CS2 meeting is a co-located event with HiPEAC 2014 in Vienna, Austria, January 20, 2014. \u0000 \u0000The wide diffusion of embedded systems, including multi-core, many-core, and re-configurable platforms, poses a number of challenges related to the security of operations of such systems, as well as of the information stored in them. Malicious adversaries can leverage unprotected communications to hijack cyber-physical systems, resulting in incorrect and potentially highly dangerous behaviors, or can exploit side-channel information leakage, as well as reverse engineering hints, to recover secret information from a computing system. Untrustworthy third party software and hardware can create openings for such attacks, which must be detected and removed or counteracted. In addition, the complexity of modern and future embedded and mobile systems leads to the need to depart from manual planning and deployment of security features. Thus, design automation tools are needed to design and verify the security features of new hardware/software systems. \u0000 \u0000The workshop provides a venue for security and cryptography experts to interact with the computer architecture and compilers community, aiming at cross-fertilization and multi-disciplinary approaches to address the security and privacy challenges of computing systems.","PeriodicalId":126518,"journal":{"name":"Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1