首页 > 最新文献

2017 IEEE 2nd International Verification and Security Workshop (IVSW)最新文献

英文 中文
SNIFFER: A high-accuracy malware detector for enterprise-based systems SNIFFER:用于企业系统的高精度恶意软件检测器
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031547
Evan Chavis, Harrison Davis, Yijun Hou, Matthew Hicks, Salessawi Ferede Yitbarek, T. Austin, V. Bertacco
In the continual battle between malware attacks and antivirus technologies, both sides strive to deploy their techniques at always lower layers in the software system stack. The goal is to monitor and control the software executing in the levels above their own deployment, to detect attacks or to defeat defenses. Recent antivirus solutions have gone even below the software, by enlisting hardware support. However, so far, they have only mimicked classic software techniques by monitoring software clues of an attack. As a result, malware can easily defeat them by employing metamorphic manifestation patterns. With this work, we propose a hardware-monitoring solution, SNIFFER, which tracks malware manifestations in system-level behavior, rather than code patterns, and it thus cannot be circumvented unless malware renounces its very nature, that is, to attack. SNIFFER leverages in-hardware feature monitoring, and uses machine learning to assess whether a system shows signs of an attack. Experiments with a virtual SNIFFER implementation, which supports 13 features and tests against five common network-based malicious behaviors, show that SNIFFER detects malware nearly 100% of the time, unless the malware aggressively throttle its attack. Our experiments also highlight the need for machine-learning classifiers employing a range of diverse system features, as many of the tested malware require multiple, seemingly disconnected, features for accurate detection.
在恶意软件攻击和反病毒技术之间的持续战斗中,双方都努力将自己的技术部署在软件系统堆栈的较低层。目标是监视和控制在其自身部署之上的级别上执行的软件,以检测攻击或击败防御。最近的反病毒解决方案甚至低于软件,通过争取硬件支持。然而,到目前为止,他们只是通过监控攻击的软件线索来模仿经典的软件技术。因此,恶意软件可以通过使用变形表现模式轻松地击败它们。通过这项工作,我们提出了一种硬件监控解决方案SNIFFER,它可以跟踪系统级行为中的恶意软件表现,而不是代码模式,因此它无法被绕过,除非恶意软件放弃其本质,即攻击。SNIFFER利用硬件内部功能监控,并使用机器学习来评估系统是否显示出攻击迹象。虚拟嗅探器实现的实验,支持13个功能,并针对五种常见的基于网络的恶意行为进行测试,表明嗅探器几乎100%的时间检测到恶意软件,除非恶意软件积极地限制其攻击。我们的实验还强调了机器学习分类器的需求,它采用了一系列不同的系统特征,因为许多被测试的恶意软件需要多个看似不相连的特征来进行准确检测。
{"title":"SNIFFER: A high-accuracy malware detector for enterprise-based systems","authors":"Evan Chavis, Harrison Davis, Yijun Hou, Matthew Hicks, Salessawi Ferede Yitbarek, T. Austin, V. Bertacco","doi":"10.1109/IVSW.2017.8031547","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031547","url":null,"abstract":"In the continual battle between malware attacks and antivirus technologies, both sides strive to deploy their techniques at always lower layers in the software system stack. The goal is to monitor and control the software executing in the levels above their own deployment, to detect attacks or to defeat defenses. Recent antivirus solutions have gone even below the software, by enlisting hardware support. However, so far, they have only mimicked classic software techniques by monitoring software clues of an attack. As a result, malware can easily defeat them by employing metamorphic manifestation patterns. With this work, we propose a hardware-monitoring solution, SNIFFER, which tracks malware manifestations in system-level behavior, rather than code patterns, and it thus cannot be circumvented unless malware renounces its very nature, that is, to attack. SNIFFER leverages in-hardware feature monitoring, and uses machine learning to assess whether a system shows signs of an attack. Experiments with a virtual SNIFFER implementation, which supports 13 features and tests against five common network-based malicious behaviors, show that SNIFFER detects malware nearly 100% of the time, unless the malware aggressively throttle its attack. Our experiments also highlight the need for machine-learning classifiers employing a range of diverse system features, as many of the tested malware require multiple, seemingly disconnected, features for accurate detection.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131345376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Learning lemma support graphs in Quip and IC3 学习引理支持图在Quip和IC3
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031554
Ryan Berryhill, Neil Veira, A. Veneris, Zissis Poulos
Formal verification is one of the fastest growing fields in verification. The Boolean satisfiability-based unbounded model checking algorithm of IC3 has become widely applied in industry and is frequently used as a subroutine in other formal verification algorithms, such as FAIR and IICTL. Any improvement to IC3 can therefore yield substantial benefits in many areas of formal verification. Towards that end, this paper introduces the notion of a support graph, which is applied in IC3. Techniques are presented to compute the support graph by modifying the satisfiability queries used in IC3 at the cost of a modest increase in runtime. It is used to increase the re-use of information across runs of the model checker, thereby improving runtime performance in incremental model checking. It can also be applied within a single run of the model checker to avoid unnecessary queries to the satisfiability solver and accelerate the discovery of a proof. Experiments are presented on HWMCC'15 circuits demonstrating the benefits of the presented approaches.
形式验证是验证中发展最快的领域之一。IC3中基于布尔可满足性的无界模型检验算法在工业上得到了广泛的应用,并经常作为子程序应用于其他形式验证算法,如FAIR和IICTL。因此,对IC3的任何改进都可以在正式验证的许多领域产生实质性的好处。为此,本文引入了支持图的概念,并将其应用于IC3。本文介绍了通过修改IC3中使用的可满足性查询来计算支持图的技术,其代价是运行时间的适度增加。它用于增加模型检查器运行期间信息的重用,从而提高增量模型检查中的运行时性能。它还可以在模型检查器的单次运行中应用,以避免对可满足性求解器进行不必要的查询,并加速发现证明。在HWMCC'15电路上进行了实验,证明了所提出方法的优点。
{"title":"Learning lemma support graphs in Quip and IC3","authors":"Ryan Berryhill, Neil Veira, A. Veneris, Zissis Poulos","doi":"10.1109/IVSW.2017.8031554","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031554","url":null,"abstract":"Formal verification is one of the fastest growing fields in verification. The Boolean satisfiability-based unbounded model checking algorithm of IC3 has become widely applied in industry and is frequently used as a subroutine in other formal verification algorithms, such as FAIR and IICTL. Any improvement to IC3 can therefore yield substantial benefits in many areas of formal verification. Towards that end, this paper introduces the notion of a support graph, which is applied in IC3. Techniques are presented to compute the support graph by modifying the satisfiability queries used in IC3 at the cost of a modest increase in runtime. It is used to increase the re-use of information across runs of the model checker, thereby improving runtime performance in incremental model checking. It can also be applied within a single run of the model checker to avoid unnecessary queries to the satisfiability solver and accelerate the discovery of a proof. Experiments are presented on HWMCC'15 circuits demonstrating the benefits of the presented approaches.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128432327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lightweight obfuscation techniques for modeling attacks resistant PUFs 用于建模抗攻击puf的轻量级混淆技术
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031539
Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski
Building lightweight security for low-cost pervasive devices is a major challenge considering the design requirements of a small footprint and low power consumption. Physical Unclonable Functions (PUFs) have emerged as a promising technology to provide a low-cost authentication for such devices. By exploiting intrinsic manufacturing process variations, PUFs are able to generate unique and apparently random chip identifiers. Strong-PUFs represent a variant of PUFs that have been suggested for lightweight authentication applications. Unfortunately, many of the Strong-PUFs have been shown to be susceptible to modelling attacks (i.e., using machine learning techniques) in which an adversary has access to challenge and response pairs. In this study, we propose an obfuscation technique during post-processing of Strong-PUF responses to increase the resilience against machine learning attacks. We conduct machine learning experiments using Support Vector Machines and Artificial Neural Networks on two Strong-PUFs: a 32-bit Arbiter-PUF and a 2-XOR 32-bit Arbiter-PUF. The predictability of the 32-bit Arbiter-PUF is reduced to ≈ 70% by using an obfuscation technique. Combining the obfuscation technique with 2-XOR 32-bit Arbiter-PUF helps to reduce the predictability to ≈ 64%. More reduction in predictability has been observed in an XOR Arbiter-PUF because this PUF architecture has a good uniformity. The area overhead with an obfuscation technique consumes only 788 and 1080 gate equivalents for the 32-bit Arbiter-PUF and 2-XOR 32-bit Arbiter-PUF, respectively.
考虑到占地面积小和功耗低的设计要求,为低成本普及设备构建轻量级安全性是一项主要挑战。物理不可克隆功能(puf)已经成为一种有前途的技术,可以为此类设备提供低成本的身份验证。通过利用内在的制造过程变化,puf能够生成唯一的和明显随机的芯片标识符。强puf是puf的一种变体,建议用于轻量级身份验证应用程序。不幸的是,许多strong - puf已被证明容易受到建模攻击(即使用机器学习技术)的影响,在这种攻击中,攻击者可以访问挑战和响应对。在本研究中,我们提出了一种在Strong-PUF响应后处理期间的混淆技术,以增加对机器学习攻击的弹性。我们使用支持向量机和人工神经网络在两个strong - puf上进行机器学习实验:一个32位的Arbiter-PUF和一个2-XOR 32位的Arbiter-PUF。通过使用混淆技术,32位Arbiter-PUF的可预测性降低到≈70%。将混淆技术与2-XOR 32位Arbiter-PUF相结合有助于将可预测性降低到≈64%。在XOR Arbiter-PUF中可以观察到更多的可预测性降低,因为这种PUF体系结构具有良好的一致性。对于32位Arbiter-PUF和2-XOR 32位Arbiter-PUF,使用混淆技术的面积开销分别仅消耗788和1080个栅极。
{"title":"Lightweight obfuscation techniques for modeling attacks resistant PUFs","authors":"Mohd Syafiq Mispan, Basel Halak, Mark Zwolinski","doi":"10.1109/IVSW.2017.8031539","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031539","url":null,"abstract":"Building lightweight security for low-cost pervasive devices is a major challenge considering the design requirements of a small footprint and low power consumption. Physical Unclonable Functions (PUFs) have emerged as a promising technology to provide a low-cost authentication for such devices. By exploiting intrinsic manufacturing process variations, PUFs are able to generate unique and apparently random chip identifiers. Strong-PUFs represent a variant of PUFs that have been suggested for lightweight authentication applications. Unfortunately, many of the Strong-PUFs have been shown to be susceptible to modelling attacks (i.e., using machine learning techniques) in which an adversary has access to challenge and response pairs. In this study, we propose an obfuscation technique during post-processing of Strong-PUF responses to increase the resilience against machine learning attacks. We conduct machine learning experiments using Support Vector Machines and Artificial Neural Networks on two Strong-PUFs: a 32-bit Arbiter-PUF and a 2-XOR 32-bit Arbiter-PUF. The predictability of the 32-bit Arbiter-PUF is reduced to ≈ 70% by using an obfuscation technique. Combining the obfuscation technique with 2-XOR 32-bit Arbiter-PUF helps to reduce the predictability to ≈ 64%. More reduction in predictability has been observed in an XOR Arbiter-PUF because this PUF architecture has a good uniformity. The area overhead with an obfuscation technique consumes only 788 and 1080 gate equivalents for the 32-bit Arbiter-PUF and 2-XOR 32-bit Arbiter-PUF, respectively.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124719065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Asserting causal properties in High Level Synthesis 断言高层次综合中的因果性质
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031555
E. Fabiani, Loïc Lagadec, M. B. Hammouda, C. Teodorov
ICs are subject to many causes of malfunction such as aging or aggressive environment, while avoiding unwanted behavior of critical applications is a key issue. Monitoring is a cornerstone of safety policies, as it supports triggering counter measures on demand. High Level Synthesis (HLS) allows to easily implement applications in hardware, and some HLS compliant solutions have been reported. These solutions monitor applications through asserting properties to variables. This paper extends this approach by proposing causal assertions, dedicated to monitoring the evolution of variables over time. Results demonstrate significant gains in term of reactivity and error coverage rate, while keeping the overhead low.
ic受到许多故障原因的影响,例如老化或恶劣的环境,而避免关键应用程序的不必要行为是一个关键问题。监测是安全政策的基石,因为它支持根据需要触发应对措施。高级综合(High Level Synthesis, HLS)允许在硬件中轻松实现应用程序,并且已经报道了一些符合HLS的解决方案。这些解决方案通过断言变量的属性来监视应用程序。本文通过提出因果断言扩展了这种方法,致力于监测变量随时间的演变。结果表明,在保持较低开销的同时,在反应性和错误覆盖率方面取得了显著的进步。
{"title":"Asserting causal properties in High Level Synthesis","authors":"E. Fabiani, Loïc Lagadec, M. B. Hammouda, C. Teodorov","doi":"10.1109/IVSW.2017.8031555","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031555","url":null,"abstract":"ICs are subject to many causes of malfunction such as aging or aggressive environment, while avoiding unwanted behavior of critical applications is a key issue. Monitoring is a cornerstone of safety policies, as it supports triggering counter measures on demand. High Level Synthesis (HLS) allows to easily implement applications in hardware, and some HLS compliant solutions have been reported. These solutions monitor applications through asserting properties to variables. This paper extends this approach by proposing causal assertions, dedicated to monitoring the evolution of variables over time. Results demonstrate significant gains in term of reactivity and error coverage rate, while keeping the overhead low.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132884385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Protecting partial regions in FPGA bitstreams 保护FPGA位流中的部分区域
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031557
Karen Horovitz, Meha Kainth, Ryan Kenny
In previous generations of Intel FPGAs, we employed design separation through the use of LogicLock in Cyclone IIILS and Arria V devices. In the past, this meant separation of design elements as well as designated protected design boundaries in different ‘Logic Lock’ regions. Though separated logically, these regions have the same protection and risk if the key is revealed. Today, using Partition-Based Security, we can encrypt these regions with different keys thus fully supporting separation and allowing secure, encrypted regions of the FPGA fabric to exist. We demonstrate partition-based security using an Intel FPGA Arria 10 SoC Development Kit with two partial reconfiguration regions encrypted with two different keys.
在前几代英特尔fpga中,我们通过在Cyclone IIILS和Arria V器件中使用LogicLock来采用设计分离。在过去,这意味着设计元素的分离,以及在不同的“逻辑锁”区域指定受保护的设计边界。尽管这些区域在逻辑上是分开的,但如果密钥被泄露,它们具有相同的保护和风险。今天,使用基于分区的安全性,我们可以用不同的密钥加密这些区域,从而完全支持分离,并允许存在安全的FPGA结构加密区域。我们使用英特尔FPGA Arria 10 SoC开发工具包演示基于分区的安全性,该工具包使用两个不同密钥加密的部分重新配置区域。
{"title":"Protecting partial regions in FPGA bitstreams","authors":"Karen Horovitz, Meha Kainth, Ryan Kenny","doi":"10.1109/IVSW.2017.8031557","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031557","url":null,"abstract":"In previous generations of Intel FPGAs, we employed design separation through the use of LogicLock in Cyclone IIILS and Arria V devices. In the past, this meant separation of design elements as well as designated protected design boundaries in different ‘Logic Lock’ regions. Though separated logically, these regions have the same protection and risk if the key is revealed. Today, using Partition-Based Security, we can encrypt these regions with different keys thus fully supporting separation and allowing secure, encrypted regions of the FPGA fabric to exist. We demonstrate partition-based security using an Intel FPGA Arria 10 SoC Development Kit with two partial reconfiguration regions encrypted with two different keys.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123295799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy justification for metastability based nondeterministic random bit generator 基于亚稳态的不确定性随机比特发生器的熵证明
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031540
R. Parker
We describe a minimum entropy justification for the metastable latch based nondeterministic random bit generator (NRBG) also known as an entropy source (ES). The NRBG, used for on-die generation of cryptographic keys in SOCs, is comprised of a CMOS latch with a continuously running offset cancellation loop. The offset cancellation allows for the resolution required to sample device noise at the expense of introducing serial correlation in the output data. Because the NRBG is embedded within SP 800-90 A/B/C and FIPs 140-2 compliant systems, it is critical that the loss of entropy due to serial correlation be known and bounded, and that there is a mechanism to detect loss of entropy during manufacturing test as well as normal operation. We demonstrate that a simplified one-dimensional stochastic model of the comparator in conjunction with a birth-death Markov chain model of the offset cancellation can be used to derive the minimum entropy of the NRBG and the probability of bit patterns used by entropy quality health test circuits. The result of this work compares excellently to measured data from an advanced FinFET process.
我们描述了基于亚稳锁存器的不确定性随机比特发生器(NRBG)也称为熵源(ES)的最小熵证明。NRBG用于在芯片上生成soc中的加密密钥,由CMOS锁存器和连续运行的偏移抵消回路组成。偏移抵消允许采样设备噪声所需的分辨率,但代价是在输出数据中引入串行相关。由于NRBG嵌入在SP 800-90 A/B/C和FIPs 140-2兼容的系统中,因此由串行相关引起的熵损失是已知和有界的,并且在制造测试和正常操作期间有一种检测熵损失的机制。我们证明了一个简化的比较器的一维随机模型,结合偏移抵消的生-死马尔可夫链模型,可以推导出NRBG的最小熵和熵质量健康测试电路使用的位模式的概率。这项工作的结果与先进的FinFET工艺的测量数据相比非常好。
{"title":"Entropy justification for metastability based nondeterministic random bit generator","authors":"R. Parker","doi":"10.1109/IVSW.2017.8031540","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031540","url":null,"abstract":"We describe a minimum entropy justification for the metastable latch based nondeterministic random bit generator (NRBG) also known as an entropy source (ES). The NRBG, used for on-die generation of cryptographic keys in SOCs, is comprised of a CMOS latch with a continuously running offset cancellation loop. The offset cancellation allows for the resolution required to sample device noise at the expense of introducing serial correlation in the output data. Because the NRBG is embedded within SP 800-90 A/B/C and FIPs 140-2 compliant systems, it is critical that the loss of entropy due to serial correlation be known and bounded, and that there is a mechanism to detect loss of entropy during manufacturing test as well as normal operation. We demonstrate that a simplified one-dimensional stochastic model of the comparator in conjunction with a birth-death Markov chain model of the offset cancellation can be used to derive the minimum entropy of the NRBG and the probability of bit patterns used by entropy quality health test circuits. The result of this work compares excellently to measured data from an advanced FinFET process.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123607946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security 打开潘多拉的盒子:RLUT对安全FPGA应用和IP安全的影响
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031558
Debapriya Basu Roy, S. Bhasin, I. Nikolic, Debdeep Mukhopadhyay
Modern FPGAs, due to its many advanced features, have become a popular implementation platform for various applications like aerospace, defence, automotive, cryptography and many more. Additionally, modern FPGAs are equipped with high performance hard-IPs which has reduced the performance gap between ASIC and FPGAs significantly. Dynamically Reconfigurable Look-up-Tables (RLUT) is an advanced feature of modern FPGAs whose content can be updated internally, even during run-time without requiring any bit-stream update. These RLUTs can be used to develop stealthy hardware Trojans with zero overhead payload designs. This phenomenon when combined with an efficient triggering methodology, can lead to the insertion of covert back-doors in cryptographic applications. Furthermore, RLUTs can be deployed for developing customizable S-Box and lightweight S-Box masking schemes. This lightweight S-Box masking scheme when combined with other non-efficient side channel countermeasures (like shuffling) can generate lightweight and efficient side channel countermeasure for lightweight cryptographic applications. Additionally, RLUTs can also be applied to solve long standing problem of FPGA based IP protection. FPGA vendors are making serious efforts for IP protection leading to standardization schemes like IEEE P1735. However, efficient techniques to prevent unauthorized overuse of IP still remain an open question. In this work, we have developed an efficient IP licensing scheme by combining RLUTs with physically unclonable functions (PUFs) and a lightweight cryptographic application. This work summarizes applications of RLUTs for different applications related with FPGA security. It shows applicability of RLUTs for security application on FPGA and its applicability on FPGA security by development of IP licensing protocols
现代fpga,由于其许多先进的功能,已成为各种应用,如航空航天,国防,汽车,密码学等流行的实现平台。此外,现代fpga配备了高性能硬ip,这大大减少了ASIC和fpga之间的性能差距。动态可重构查找表(RLUT)是现代fpga的一项高级功能,其内容可以在内部更新,即使在运行时也不需要任何位流更新。这些rlut可用于开发具有零开销有效载荷设计的隐身硬件木马。当与有效的触发方法相结合时,这种现象可能导致在加密应用程序中插入隐蔽的后门。此外,rlut可以用于开发可定制的S-Box和轻量级S-Box屏蔽方案。这种轻量级的S-Box掩蔽方案与其他非高效的侧信道对策(如洗牌)相结合,可以为轻量级加密应用程序生成轻量级和高效的侧信道对策。此外,rlut还可以用于解决基于FPGA的IP保护的长期问题。FPGA供应商正在为IP保护做出认真的努力,导致了像IEEE P1735这样的标准化方案。然而,有效防止未经授权的知识产权滥用的技术仍然是一个悬而未决的问题。在这项工作中,我们通过将rlut与物理不可克隆功能(puf)和轻量级加密应用程序相结合,开发了一种有效的IP许可方案。本文总结了RLUTs在与FPGA安全性相关的不同应用中的应用。通过IP许可协议的开发,说明了RLUTs在FPGA上安全应用的适用性以及在FPGA安全方面的适用性
{"title":"Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security","authors":"Debapriya Basu Roy, S. Bhasin, I. Nikolic, Debdeep Mukhopadhyay","doi":"10.1109/IVSW.2017.8031558","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031558","url":null,"abstract":"Modern FPGAs, due to its many advanced features, have become a popular implementation platform for various applications like aerospace, defence, automotive, cryptography and many more. Additionally, modern FPGAs are equipped with high performance hard-IPs which has reduced the performance gap between ASIC and FPGAs significantly. Dynamically Reconfigurable Look-up-Tables (RLUT) is an advanced feature of modern FPGAs whose content can be updated internally, even during run-time without requiring any bit-stream update. These RLUTs can be used to develop stealthy hardware Trojans with zero overhead payload designs. This phenomenon when combined with an efficient triggering methodology, can lead to the insertion of covert back-doors in cryptographic applications. Furthermore, RLUTs can be deployed for developing customizable S-Box and lightweight S-Box masking schemes. This lightweight S-Box masking scheme when combined with other non-efficient side channel countermeasures (like shuffling) can generate lightweight and efficient side channel countermeasure for lightweight cryptographic applications. Additionally, RLUTs can also be applied to solve long standing problem of FPGA based IP protection. FPGA vendors are making serious efforts for IP protection leading to standardization schemes like IEEE P1735. However, efficient techniques to prevent unauthorized overuse of IP still remain an open question. In this work, we have developed an efficient IP licensing scheme by combining RLUTs with physically unclonable functions (PUFs) and a lightweight cryptographic application. This work summarizes applications of RLUTs for different applications related with FPGA security. It shows applicability of RLUTs for security application on FPGA and its applicability on FPGA security by development of IP licensing protocols","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure authentication of electronic systems with autonomous optical nano-devices 采用自主光学纳米器件的电子系统安全认证
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031553
B. Kaminska, J. Patel, Hao Jiang
New concepts for hardware security and 3D packaging/alignment are presented. The autonomous nano-structures can be inserted in any unused spaces on the silicon wafer or other medium, and can be divided on multiple layers for security, authentication, key function, and process control.
提出了硬件安全和3D封装/对齐的新概念。自治纳米结构可以插入硅片或其他介质上任何未使用的空间,并且可以划分为多层,用于安全性,身份验证,密钥功能和过程控制。
{"title":"Secure authentication of electronic systems with autonomous optical nano-devices","authors":"B. Kaminska, J. Patel, Hao Jiang","doi":"10.1109/IVSW.2017.8031553","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031553","url":null,"abstract":"New concepts for hardware security and 3D packaging/alignment are presented. The autonomous nano-structures can be inserted in any unused spaces on the silicon wafer or other medium, and can be divided on multiple layers for security, authentication, key function, and process control.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121911550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA 在FPGA上最大化阈值保护AES-GCM实现的吞吐量
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031559
Jo Vliegen, Oscar Reparaz, N. Mentens
In this paper, we push the limits in maximizing the throughput of side-channel-protected AES-GCM implementations on an FPGA. We present a fully unrolled and pipelined architecture that uses a Boolean masking countermeasure (specifically, threshold implementation) for first-order DPA resistance. Using a high-end Virtex-7 device, we obtain a throughput of 15.24 Gbit/s. Since masked implementations require a stream of random bits for each execution, a high-throughput masked implementation requires a high-throughput pseudorandom number generator as well. This work determines how fast random numbers should be generated in order for ultra-high throughput, threshold-protected AES-GCM implementations to be feasible on FPGAs.
在本文中,我们在FPGA上最大限度地提高了侧信道保护AES-GCM实现的吞吐量。我们提出了一个完全展开的流水线架构,它使用布尔屏蔽对策(特别是阈值实现)来抵抗一阶DPA。使用高端的Virtex-7设备,我们获得了15.24 Gbit/s的吞吐量。由于掩码实现每次执行都需要一个随机比特流,因此高吞吐量的掩码实现还需要一个高吞吐量的伪随机数生成器。这项工作决定了为了在fpga上实现超高吞吐量、阈值保护的AES-GCM实现,应该以多快的速度生成随机数。
{"title":"Maximizing the throughput of threshold-protected AES-GCM implementations on FPGA","authors":"Jo Vliegen, Oscar Reparaz, N. Mentens","doi":"10.1109/IVSW.2017.8031559","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031559","url":null,"abstract":"In this paper, we push the limits in maximizing the throughput of side-channel-protected AES-GCM implementations on an FPGA. We present a fully unrolled and pipelined architecture that uses a Boolean masking countermeasure (specifically, threshold implementation) for first-order DPA resistance. Using a high-end Virtex-7 device, we obtain a throughput of 15.24 Gbit/s. Since masked implementations require a stream of random bits for each execution, a high-throughput masked implementation requires a high-throughput pseudorandom number generator as well. This work determines how fast random numbers should be generated in order for ultra-high throughput, threshold-protected AES-GCM implementations to be feasible on FPGAs.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130438815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Estimating Target Distribution in security assessment models 安全评估模型中目标分布的估计
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031549
Eli Weintraub
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive knowledge. This work is aimed at defining a formula which enables measuring quantitatively the attacked components' distribution. The proposed formula is based on the real-time configuration of the system. Using the proposed measure, firms can quantify damages, allocate appropriate budgets to actual real risks and build their configuration while taking in consideration the risks impacted by components' distribution. The formula is demonstrated as part of a security continuous monitoring system.
企业面临着各种各样的网络攻击。当一个组件被利用时,计算出的总体损失受到网络包含的组件数量的影响。本研究的重点是估计被攻击网络的目标分布特征。在现有的安全评估模型中,目标分布是基于用户的直观知识,使用序数值进行评估。这项工作的目的是定义一个公式,可以定量地测量被攻击组件的分布。所提出的公式是基于系统的实时配置。利用所提出的措施,企业可以量化损失,为实际的实际风险分配适当的预算,并在考虑组件分布影响的风险的同时构建其配置。该公式作为安全连续监控系统的一部分进行了演示。
{"title":"Estimating Target Distribution in security assessment models","authors":"Eli Weintraub","doi":"10.1109/IVSW.2017.8031549","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031549","url":null,"abstract":"Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive knowledge. This work is aimed at defining a formula which enables measuring quantitatively the attacked components' distribution. The proposed formula is based on the real-time configuration of the system. Using the proposed measure, firms can quantify damages, allocate appropriate budgets to actual real risks and build their configuration while taking in consideration the risks impacted by components' distribution. The formula is demonstrated as part of a security continuous monitoring system.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 IEEE 2nd International Verification and Security Workshop (IVSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1