首页 > 最新文献

Hardware and Architectural Support for Security and Privacy最新文献

英文 中文
Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks 意见书:考虑硬件增强的Rootkit攻击防御
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458909
Guangyuan Hu, Tianwei Zhang, Ruby B. Lee
Rootkits are malware that attempt to compromise the system’s functionalities while hiding their existence. Various rootkits have been proposed as well as different software defenses, but only very few hardware defenses. We position hardware-enhanced rootkit defenses as an interesting research opportunity for computer architects, especially as many new hardware defenses for speculative execution attacks are being actively considered. We first describe different techniques used by rootkits and their prime targets in the operating system. We then try to shed insights on what the main challenges are in providing a rootkit defense, and how these may be overcome. We show how a hypervisor-based defense can be implemented, and provide a full prototype implementation in an open-source cloud computing platform, OpenStack. We evaluate the performance overhead of different defense mechanisms. Finally, we point to some research opportunities for enhancing resilience to rootkit-like attacks in the hardware architecture.
Rootkits是一种恶意软件,它试图破坏系统的功能,同时隐藏它们的存在。已经提出了各种各样的rootkit以及不同的软件防御,但只有很少的硬件防御。我们将硬件增强的rootkit防御定位为计算机架构师的一个有趣的研究机会,特别是许多新的推测执行攻击的硬件防御正在被积极考虑。我们首先描述了rootkit使用的不同技术及其在操作系统中的主要目标。然后,我们试图揭示提供rootkit防御的主要挑战是什么,以及如何克服这些挑战。我们展示了如何实现基于管理程序的防御,并在开源云计算平台OpenStack中提供了完整的原型实现。我们评估了不同防御机制的性能开销。最后,我们指出了在硬件架构中增强对类似rootkit攻击的弹性的一些研究机会。
{"title":"Position Paper: Consider Hardware-enhanced Defenses for Rootkit Attacks","authors":"Guangyuan Hu, Tianwei Zhang, Ruby B. Lee","doi":"10.1145/3458903.3458909","DOIUrl":"https://doi.org/10.1145/3458903.3458909","url":null,"abstract":"Rootkits are malware that attempt to compromise the system’s functionalities while hiding their existence. Various rootkits have been proposed as well as different software defenses, but only very few hardware defenses. We position hardware-enhanced rootkit defenses as an interesting research opportunity for computer architects, especially as many new hardware defenses for speculative execution attacks are being actively considered. We first describe different techniques used by rootkits and their prime targets in the operating system. We then try to shed insights on what the main challenges are in providing a rootkit defense, and how these may be overcome. We show how a hypervisor-based defense can be implemented, and provide a full prototype implementation in an open-source cloud computing platform, OpenStack. We evaluate the performance overhead of different defense mechanisms. Finally, we point to some research opportunities for enhancing resilience to rootkit-like attacks in the hardware architecture.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116844879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA Bitstream Modification with Interconnect in Mind 考虑互连的FPGA位流修改
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458908
M. Moraitis, E. Dubrova
Bitstream reverse engineering is traditionally associated with Intellectual Property (IP) theft. Another, less known, threat deriving from that is bitstream modification attacks. It has been shown that the secret key can be extracted from FPGA implementations of cryptographic algorithms by injecting faults directly into the bitstream. Such bitstream modification attacks rely on changing the content of Look Up Tables (LUTs). Therefore, related countermeasures aim to make the task of identifying a LUT more difficult (e.g. by masking LUT content). However, recent advances in FPGA reverse engineering revealed information on how interconnects are encoded in the bitstream of Xilinx 7 series FPGAs. In this paper, we show that this knowledge can be used to break or weaken existing countermeasures, as well as improve existing attacks. Furthermore, a straightforward attack that re-routes the key to an output pin becomes possible. We demonstrate our claims on an FPGA implementation of SNOW 3G stream cipher, a core algorithm for confidentiality and integrity used in several 3GPP wireless communication standards, including the new Next Generation 5G.
传统上,比特流逆向工程与知识产权(IP)盗窃有关。另一个鲜为人知的威胁来自于比特流修改攻击。研究表明,通过将错误直接注入比特流,可以从FPGA实现的加密算法中提取密钥。这种比特流修改攻击依赖于更改查找表(lut)的内容。因此,相关的对策旨在使识别LUT的任务更加困难(例如,通过屏蔽LUT内容)。然而,FPGA逆向工程的最新进展揭示了互连如何在Xilinx 7系列FPGA的比特流中编码的信息。在本文中,我们证明了这些知识可以用来打破或削弱现有的对策,以及改进现有的攻击。此外,将密钥重新路由到输出引脚的直接攻击成为可能。我们在SNOW 3G流密码的FPGA实现上展示了我们的主张,这是一种用于多种3GPP无线通信标准(包括新的下一代5G)的机密性和完整性核心算法。
{"title":"FPGA Bitstream Modification with Interconnect in Mind","authors":"M. Moraitis, E. Dubrova","doi":"10.1145/3458903.3458908","DOIUrl":"https://doi.org/10.1145/3458903.3458908","url":null,"abstract":"Bitstream reverse engineering is traditionally associated with Intellectual Property (IP) theft. Another, less known, threat deriving from that is bitstream modification attacks. It has been shown that the secret key can be extracted from FPGA implementations of cryptographic algorithms by injecting faults directly into the bitstream. Such bitstream modification attacks rely on changing the content of Look Up Tables (LUTs). Therefore, related countermeasures aim to make the task of identifying a LUT more difficult (e.g. by masking LUT content). However, recent advances in FPGA reverse engineering revealed information on how interconnects are encoded in the bitstream of Xilinx 7 series FPGAs. In this paper, we show that this knowledge can be used to break or weaken existing countermeasures, as well as improve existing attacks. Furthermore, a straightforward attack that re-routes the key to an output pin becomes possible. We demonstrate our claims on an FPGA implementation of SNOW 3G stream cipher, a core algorithm for confidentiality and integrity used in several 3GPP wireless communication standards, including the new Next Generation 5G.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads 点阵后量子加密工作负载分析与硬件优化
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458905
Sandhya Koteshwara, M. Kumar, P. Pattnaik
The mathematical constructs, nature of computations and challenges in optimizing lattice post-quantum cryptographic algorithms on modern many-core processors are discussed in this paper. Identification of time-consuming functions and subsequent hardware optimization using vector units and hardware accelerators of one of the candidates, CRYSTALS-Kyber, leads to performance improvement of around 52% for its SHA3 variant and 83% for its AES variant. Detailed Cycles-per-Instruction (CPI) stack breakdown before and after optimization indicates a CPI of around 0.5 and dominance of load/store operations in these workloads.
本文讨论了在现代多核处理器上优化格子后量子密码算法的数学结构、计算性质和挑战。使用其中一个候选算法CRYSTALS-Kyber的矢量单元和硬件加速器识别耗时的函数和随后的硬件优化,使其SHA3变体的性能提高了约52%,AES变体的性能提高了83%。优化前后的每条指令周期(Cycles-per-Instruction, CPI)堆栈详细细分表明,CPI约为0.5,并且在这些工作负载中负载/存储操作占主导地位。
{"title":"Analysis and Hardware Optimization of Lattice Post-Quantum Cryptography Workloads","authors":"Sandhya Koteshwara, M. Kumar, P. Pattnaik","doi":"10.1145/3458903.3458905","DOIUrl":"https://doi.org/10.1145/3458903.3458905","url":null,"abstract":"The mathematical constructs, nature of computations and challenges in optimizing lattice post-quantum cryptographic algorithms on modern many-core processors are discussed in this paper. Identification of time-consuming functions and subsequent hardware optimization using vector units and hardware accelerators of one of the candidates, CRYSTALS-Kyber, leads to performance improvement of around 52% for its SHA3 variant and 83% for its AES variant. Detailed Cycles-per-Instruction (CPI) stack breakdown before and after optimization indicates a CPI of around 0.5 and dominance of load/store operations in these workloads.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115019631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the Draft RISC-V Scalar Cryptography Extensions 实现RISC-V标量加密扩展草案
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458904
Ben Marshall, D. Page, T. Pham
RISC-V is an increasingly popular, free and open Instruction Set Architecture (ISA). Many standard extensions to RISC-V are currently being designed and evaluated, including one for accelerating cryptographic workloads. Unlike most incumbent ISAs which re-use existing large SIMD state and data-paths to accelerate cryptographic operations, RISC-V also adds support for smaller machines with narrow 32 and 64-bit data-paths. For embedded, IoT class devices, this significantly lowers the barrier to entry for secure and efficient accelerated cryptography. In this paper, we describe (to our knowledge) the first complete, free and open-source implementation of the draft 32-bit RISC-V Cryptography Extension. We detail the performance benefits for several important algorithms, and associated hardware costs. Our experiences help to guide the ongoing standardisation work and provide a platform for other researchers to experiment with a complete and representative CPU system, implementing the draft cryptography extension.
RISC-V是一种日益流行的、自由和开放的指令集架构(ISA)。目前正在设计和评估RISC-V的许多标准扩展,包括加速加密工作负载的标准扩展。与大多数现有isa重用现有的大型SIMD状态和数据路径来加速加密操作不同,RISC-V还增加了对具有狭窄32位和64位数据路径的小型机器的支持。对于嵌入式物联网类设备,这大大降低了安全高效加速加密的进入门槛。在本文中,我们描述了(据我们所知)第一个完整的、免费的、开源的32位RISC-V加密扩展草案的实现。我们详细介绍了几种重要算法的性能优势,以及相关的硬件成本。我们的经验有助于指导正在进行的标准化工作,并为其他研究人员提供一个平台,实验一个完整的、有代表性的CPU系统,实现加密扩展草案。
{"title":"Implementing the Draft RISC-V Scalar Cryptography Extensions","authors":"Ben Marshall, D. Page, T. Pham","doi":"10.1145/3458903.3458904","DOIUrl":"https://doi.org/10.1145/3458903.3458904","url":null,"abstract":"RISC-V is an increasingly popular, free and open Instruction Set Architecture (ISA). Many standard extensions to RISC-V are currently being designed and evaluated, including one for accelerating cryptographic workloads. Unlike most incumbent ISAs which re-use existing large SIMD state and data-paths to accelerate cryptographic operations, RISC-V also adds support for smaller machines with narrow 32 and 64-bit data-paths. For embedded, IoT class devices, this significantly lowers the barrier to entry for secure and efficient accelerated cryptography. In this paper, we describe (to our knowledge) the first complete, free and open-source implementation of the draft 32-bit RISC-V Cryptography Extension. We detail the performance benefits for several important algorithms, and associated hardware costs. Our experiences help to guide the ongoing standardisation work and provide a platform for other researchers to experiment with a complete and representative CPU system, implementing the draft cryptography extension.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127114886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Uncovering Hidden Instructions in Armv8-A Implementations 揭示Armv8-A实现中的隐藏指令
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458906
Fredrik Strupe, Rakesh Kumar
Though system and application level security has received and continue to receive significant attention, interest in hardware security has spiked only in the last few years. The majority of recently disclosed hardware security attacks exploit well known and documented hardware behaviours such as speculation, cache and memory timings, etc. We observe that security exploits in undocumented hardware behaviour can have even more severe consequences as such behaviour is rarely verified and protected against. This paper introduces armshaker, a tool to uncover one such undocumented behaviour in the Armv8 architecture, namely hidden instructions. These are the instructions that are not documented in the ISA reference manual, but still execute successfully. We tested five different Armv8-A hardware platforms from four different vendors, as well as two Armv8-A emulators, and uncovered multiple hidden instructions. An interesting finding is that, though we did not discover any hidden instruction in the hardware itself, bugs in the system software can induce hidden instructions in the system that, from a user’s perspective, are indistinguishable from hidden instructions in hardware. Though armshaker did not find any hidden instruction in the hardware of the tested platforms, their existence cannot be ruled out, given the diversity of available Arm processors. Consequently, we make armshaker publicly available as open-source software to enable users to audit their own systems for hidden instructions.
尽管系统和应用程序级别的安全性已经并将继续受到极大的关注,但对硬件安全性的兴趣只是在最近几年才激增。最近披露的大多数硬件安全攻击都利用了众所周知的硬件行为,如推测、缓存和内存计时等。我们观察到,未记录的硬件行为中的安全漏洞可能会产生更严重的后果,因为这种行为很少得到验证和保护。本文介绍了armshaker,这是一个揭露Armv8架构中未记录行为的工具,即隐藏指令。这些指令没有在ISA参考手册中记录,但仍然可以成功执行。我们测试了来自四个不同供应商的五种不同的Armv8-A硬件平台,以及两个Armv8-A模拟器,并发现了多个隐藏指令。一个有趣的发现是,虽然我们没有在硬件本身发现任何隐藏指令,但系统软件中的bug会导致系统中的隐藏指令,从用户的角度来看,这些隐藏指令与硬件中的隐藏指令无法区分。虽然armshaker没有在测试平台的硬件中发现任何隐藏指令,但考虑到可用的Arm处理器的多样性,不能排除它们存在的可能性。因此,我们将armshaker作为开源软件公开提供,使用户能够审计他们自己的系统中隐藏的指令。
{"title":"Uncovering Hidden Instructions in Armv8-A Implementations","authors":"Fredrik Strupe, Rakesh Kumar","doi":"10.1145/3458903.3458906","DOIUrl":"https://doi.org/10.1145/3458903.3458906","url":null,"abstract":"Though system and application level security has received and continue to receive significant attention, interest in hardware security has spiked only in the last few years. The majority of recently disclosed hardware security attacks exploit well known and documented hardware behaviours such as speculation, cache and memory timings, etc. We observe that security exploits in undocumented hardware behaviour can have even more severe consequences as such behaviour is rarely verified and protected against. This paper introduces armshaker, a tool to uncover one such undocumented behaviour in the Armv8 architecture, namely hidden instructions. These are the instructions that are not documented in the ISA reference manual, but still execute successfully. We tested five different Armv8-A hardware platforms from four different vendors, as well as two Armv8-A emulators, and uncovered multiple hidden instructions. An interesting finding is that, though we did not discover any hidden instruction in the hardware itself, bugs in the system software can induce hidden instructions in the system that, from a user’s perspective, are indistinguishable from hidden instructions in hardware. Though armshaker did not find any hidden instruction in the hardware of the tested platforms, their existence cannot be ruled out, given the diversity of available Arm processors. Consequently, we make armshaker publicly available as open-source software to enable users to audit their own systems for hidden instructions.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing SoK:下一代安全计算的软硬件安全协同设计机会
Pub Date : 2020-10-17 DOI: 10.1145/3458903.345891
Deeksha Dangwal, M. Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel
Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.
用户要求提高数据安全性。因此,安全性正迅速成为下一代计算系统的一级设计约束。研究人员和从业者正在探索各种安全技术,以满足用户的需求,如可信执行环境(例如,Intel SGX、ARM TrustZone)、同态加密和差分隐私。每种技术都提供了一定程度的安全性,但在威胁覆盖范围、性能开销以及实现和部署挑战方面有所不同。在本文中,我们使用几种著名的安全技术提供了关于这些设计考虑和权衡的系统化知识(SoK)。我们的研究揭示了软件-硬件-安全协同设计的必要性,以实现高效和有效的保护用户数据的解决方案。特别是,我们将探讨如何将跨应用程序、硬件和安全机制的设计考虑结合起来,以克服当前技术中的基本限制,从而在实现充分的威胁模型覆盖的同时最小化性能开销。最后,我们提出了一套指导方针,以促进将这些安全计算技术付诸实践。
{"title":"SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing","authors":"Deeksha Dangwal, M. Cowan, Armin Alaghi, Vincent T. Lee, Brandon Reagen, Caroline Trippel","doi":"10.1145/3458903.345891","DOIUrl":"https://doi.org/10.1145/3458903.345891","url":null,"abstract":"Users are demanding increased data security. As a result, security is rapidly becoming a first-order design constraint in next generation computing systems. Researchers and practitioners are exploring various security technologies to meet user demand such as trusted execution environments (e.g., Intel SGX, ARM TrustZone), homomorphic encryption, and differential privacy. Each technique provides some degree of security, but differs with respect to threat coverage, performance overheads, as well as implementation and deployment challenges. In this paper, we present a systemization of knowledge (SoK) on these design considerations and trade-offs using several prominent security technologies. Our study exposes the need for software-hardware-security codesign to realize efficient and effective solutions of securing user data. In particular, we explore how design considerations across applications, hardware, and security mechanisms must be combined to overcome fundamental limitations in current technologies so that we can minimize performance overhead while achieving sufficient threat model coverage. Finally, we propose a set of guidelines to facilitate putting these secure computing technologies into practice.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128303089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Position Paper:Defending Direct Memory Access with CHERI Capabilities 立场文件:用CHERI功能保护直接内存访问
Pub Date : 2020-10-17 DOI: 10.1145/3458903.3458910
A. T. Markettos, John Baldwin, Ruslan Bukin, P. Neumann, S. Moore, R. Watson
We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.
我们提出了新的解决方案,可以有效地解决从可插拔的计算机外设和嵌入片上系统的微控制器恶意访问存储器的问题。这个问题对整个计算机系统的安全构成了严重的威胁。先前的工作表明,现有的防御是不充分的,并且部署不当,部分原因是性能问题。在本文中,我们探讨了这种威胁及其对系统架构的影响。我们提出了一系列的保护技术,从轻量级到重量级,跨越不同类别的系统。我们将考虑新兴的功能体系结构(特别是CHERI保护模型)如何增强保护,并提供一个方便的桥梁来描述软件和硬件组件之间的交互。最后,我们描述了新方案如何比现有防御更有效。
{"title":"Position Paper:Defending Direct Memory Access with CHERI Capabilities","authors":"A. T. Markettos, John Baldwin, Ruslan Bukin, P. Neumann, S. Moore, R. Watson","doi":"10.1145/3458903.3458910","DOIUrl":"https://doi.org/10.1145/3458903.3458910","url":null,"abstract":"We propose new solutions that can efficiently address the problem of malicious memory access from pluggable computer peripherals and microcontrollers embedded within a system-on-chip. This problem represents a serious emerging threat to total-system computer security. Previous work has shown that existing defenses are insufficient and poorly deployed, in part due to performance concerns. In this paper we explore the threat and its implications for system architecture. We propose a range of protection techniques, from lightweight to heavyweight, across different classes of systems. We consider how emerging capability architectures (and specifically the CHERI protection model) can enhance protection and provide a convenient bridge to describe interactions among software and hardware components. Finally, we describe how new schemes may be more efficient than existing defenses.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje SIMD指令集扩展为Keccak与应用程序到SHA-3, Keyak和Ketje
Pub Date : 2016-06-18 DOI: 10.1145/2948618.2948622
Hemendra K. Rawat, P. Schaumont
Recent processor architectures such as Intel Westmere (and later) and ARMv8 include instruction-level support for the Advanced Encryption Standard (AES), for the Secure Hashing Standard (SHA-1, SHA2) and for carry-less multiplication. These crypto-instruction sets provide specialized hardware processing at the top of the memory hierarchy, and provide significant performance improvements over general-purpose software for common cryptographic operations. We propose a crypto-instruction set for the Keccak cryptographic sponge and for the Keccak duplex construction. Our design is integrated on a 128 bit SIMD interface, applicable to the ARM NEON and Intel AVX (128 bit) architecture. The proposed instruction set is optimized for flexibility and supports multiple variants of the Keccak-f[b] permutation, for b equal to 200, 400, 800, or 1600 bit. We investigate the performance of the design using the GEM5 micro-architecture simulator. Compared to the latest hand-optimized results, we demonstrate a performance improvement of 2 times (over NEON programming) to 6 times (over Assembly programming). For example, an optimized NEON implementation of SHA3-512 computes a hash at 48.1 instructions per byte, while our design uses 21.9 instructions per byte. The NEON optimized version of the Lake Keyak AEAD uses 13.4 instructions per byte, while our design uses 7.7 instructions per byte. We provide comprehensive performance evaluation for multiple configurations of the Keccak-f[b] permutation in multiple applications (Hash, Encryption, AEAD). We also analyze the hardware cost of the proposed instructions in gate-equivalent of 90nm standard cells, and show that the proposed instructions only require 4658 GE, a fraction of the cost of a full ARM Cortex-A9.
最近的处理器架构,如Intel Westmere(及以后的版本)和ARMv8,包括对高级加密标准(AES)、安全散列标准(SHA-1、SHA2)和无进位乘法的指令级支持。这些加密指令集在内存层次结构的顶层提供了专门的硬件处理,并且相对于通用的加密操作软件提供了显著的性能改进。我们提出了一种用于Keccak密码海绵和Keccak双工结构的密码指令集。我们的设计集成在一个128位SIMD接口上,适用于ARM NEON和Intel AVX(128位)架构。所提出的指令集针对灵活性进行了优化,并支持Keccak-f[b]排列的多种变体,其中b等于200,400,800或1600位。我们使用GEM5微架构模拟器来研究该设计的性能。与最新的手工优化结果相比,我们证明了性能提高了2倍(比NEON编程)到6倍(比汇编编程)。例如,SHA3-512的优化NEON实现以每字节48.1条指令计算哈希,而我们的设计使用每字节21.9条指令。Lake Keyak AEAD的NEON优化版本每字节使用13.4条指令,而我们的设计每字节使用7.7条指令。我们对多种应用(哈希、加密、AEAD)中Keccak-f[b]排列的多种配置进行了全面的性能评估。我们还分析了在栅极等效的90nm标准单元中所提出的指令的硬件成本,并表明所提出的指令仅需要4658 GE,是完整ARM Cortex-A9成本的一小部分。
{"title":"SIMD Instruction Set Extensions for Keccak with Applications to SHA-3, Keyak and Ketje","authors":"Hemendra K. Rawat, P. Schaumont","doi":"10.1145/2948618.2948622","DOIUrl":"https://doi.org/10.1145/2948618.2948622","url":null,"abstract":"Recent processor architectures such as Intel Westmere (and later) and ARMv8 include instruction-level support for the Advanced Encryption Standard (AES), for the Secure Hashing Standard (SHA-1, SHA2) and for carry-less multiplication. These crypto-instruction sets provide specialized hardware processing at the top of the memory hierarchy, and provide significant performance improvements over general-purpose software for common cryptographic operations. We propose a crypto-instruction set for the Keccak cryptographic sponge and for the Keccak duplex construction. Our design is integrated on a 128 bit SIMD interface, applicable to the ARM NEON and Intel AVX (128 bit) architecture. The proposed instruction set is optimized for flexibility and supports multiple variants of the Keccak-f[b] permutation, for b equal to 200, 400, 800, or 1600 bit. We investigate the performance of the design using the GEM5 micro-architecture simulator. Compared to the latest hand-optimized results, we demonstrate a performance improvement of 2 times (over NEON programming) to 6 times (over Assembly programming). For example, an optimized NEON implementation of SHA3-512 computes a hash at 48.1 instructions per byte, while our design uses 21.9 instructions per byte. The NEON optimized version of the Lake Keyak AEAD uses 13.4 instructions per byte, while our design uses 7.7 instructions per byte. We provide comprehensive performance evaluation for multiple configurations of the Keccak-f[b] permutation in multiple applications (Hash, Encryption, AEAD). We also analyze the hardware cost of the proposed instructions in gate-equivalent of 90nm standard cells, and show that the proposed instructions only require 4658 GE, a fraction of the cost of a full ARM Cortex-A9.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134357469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave Intel®Software Guard Extensions (Intel®SGX)软件支持Enclave内的动态内存分配
Pub Date : 2016-06-18 DOI: 10.1145/2948618.2954330
Bin Cedric Xing, Mark Shanahan, Rebekah Leslie-Hurd
Intel® Software Guard Extensions (Intel® SGX) SGX2 extends the Intel® Software Guard Extensions (SGX) instruction set and enables software developers to dynamically manage memory within the SGX environment. This paper reviews the current SGX Software RunTime Environment and proposes additions to the framework which will allow developers to benefit from features enabled by SGX2 such as dynamic heap management, stack expansion, and thread context creation.
Intel®Software Guard Extensions (Intel®SGX) SGX2扩展了Intel®Software Guard Extensions (SGX)指令集,使软件开发人员能够在SGX环境中动态管理内存。本文回顾了当前的SGX软件运行时环境,并提出了对框架的补充,这将允许开发人员从SGX2启用的特性中受益,例如动态堆管理、堆栈扩展和线程上下文创建。
{"title":"Intel® Software Guard Extensions (Intel® SGX) Software Support for Dynamic Memory Allocation inside an Enclave","authors":"Bin Cedric Xing, Mark Shanahan, Rebekah Leslie-Hurd","doi":"10.1145/2948618.2954330","DOIUrl":"https://doi.org/10.1145/2948618.2954330","url":null,"abstract":"Intel® Software Guard Extensions (Intel® SGX) SGX2 extends the Intel® Software Guard Extensions (SGX) instruction set and enables software developers to dynamically manage memory within the SGX environment. This paper reviews the current SGX Software RunTime Environment and proposes additions to the framework which will allow developers to benefit from features enabled by SGX2 such as dynamic heap management, stack expansion, and thread context creation.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Using Scan Side Channel for Detecting IP Theft 利用扫描侧通道检测IP盗窃
Pub Date : 2016-06-18 DOI: 10.1145/2948618.2948619
Leonid Azriel, R. Ginosar, S. Gueron, A. Mendelson
We present a process for detection of IP theft in VLSI devices that exploits the internal test scan chains. The IP owner learns implementation details in the suspect device to find evidence of the theft, while the top level function is public. The scan chains supply direct access to the internal registers in the device, thus making it possible to learn the logic functions of the internal combinational logic chunks. Our work introduces an innovative way of applying Boolean function analysis techniques for learning digital circuits with the goal of IP theft detection. By using Boolean function learning methods, the learner creates a partial dependency graph of the internal flip-flops. The graph is further partitioned using the SNN graph clustering method, and individual blocks of combinational logic are isolated. These blocks can be matched with known building blocks that compose the original function. This enables reconstruction of the function implementation to the level of pipeline structure. The IP owner can compare the resulting structure with his own implementation to confirm or refute that an IP violation has occurred. We demonstrate the power of the presented approach with a test case of an open source Bitcoin SHA-256 accelerator, containing more than 80,000 registers. With the presented method we discover the microarchitecture of the module, locate all the main components of the SHA-256 algorithm, and learn the module's flow control.
我们提出了一种利用内部测试扫描链检测VLSI设备中的IP盗窃的过程。IP所有者在可疑设备中学习实现细节以查找盗窃证据,而顶级功能是公开的。扫描链提供对设备内部寄存器的直接访问,从而使学习内部组合逻辑块的逻辑功能成为可能。我们的工作介绍了一种创新的方法,应用布尔函数分析技术来学习数字电路,目标是IP盗窃检测。通过布尔函数学习方法,学习者创建了内部触发器的部分依赖图。利用SNN图聚类方法对图进行进一步分割,分离出组合逻辑的各个块。这些块可以与组成原始功能的已知构建块相匹配。这使得可以将函数实现重建到管道结构级别。IP所有者可以将生成的结构与自己的实现进行比较,以确认或反驳是否发生了IP侵权。我们通过一个包含超过80,000个寄存器的开源比特币SHA-256加速器的测试用例展示了所提出方法的强大功能。利用该方法,我们发现了该模块的微结构,找到了SHA-256算法的所有主要组件,并学习了该模块的流量控制。
{"title":"Using Scan Side Channel for Detecting IP Theft","authors":"Leonid Azriel, R. Ginosar, S. Gueron, A. Mendelson","doi":"10.1145/2948618.2948619","DOIUrl":"https://doi.org/10.1145/2948618.2948619","url":null,"abstract":"We present a process for detection of IP theft in VLSI devices that exploits the internal test scan chains. The IP owner learns implementation details in the suspect device to find evidence of the theft, while the top level function is public. The scan chains supply direct access to the internal registers in the device, thus making it possible to learn the logic functions of the internal combinational logic chunks. Our work introduces an innovative way of applying Boolean function analysis techniques for learning digital circuits with the goal of IP theft detection. By using Boolean function learning methods, the learner creates a partial dependency graph of the internal flip-flops. The graph is further partitioned using the SNN graph clustering method, and individual blocks of combinational logic are isolated. These blocks can be matched with known building blocks that compose the original function. This enables reconstruction of the function implementation to the level of pipeline structure. The IP owner can compare the resulting structure with his own implementation to confirm or refute that an IP violation has occurred. We demonstrate the power of the presented approach with a test case of an open source Bitcoin SHA-256 accelerator, containing more than 80,000 registers. With the presented method we discover the microarchitecture of the module, locate all the main components of the SHA-256 algorithm, and learn the module's flow control.","PeriodicalId":141766,"journal":{"name":"Hardware and Architectural Support for Security and Privacy","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133754082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Hardware and Architectural Support for Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1