首页 > 最新文献

2017 IEEE 2nd International Verification and Security Workshop (IVSW)最新文献

英文 中文
Hardware performance counters for system reliability monitoring 硬件性能计数器,用于系统可靠性监控
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031548
E. Woo, Mark Zwolinski, Basel Halak
As technology scaling reaches nanometre scales, the error rate due to variations in temperature and voltage, single event effects and component degradation increases, making components less reliable. In order to ensure a system continues to function correctly while facing known reliability issues, it is imperative that the system should have the means to detect the occurrence of errors due to the presence of faults. A system that behaves normally (no error detected in the system) exhibits a profile, and any deviations from this profile indicate that there is an anomaly in the system. In this paper, we propose to use hardware performance counters (HPCs) to measure events that occur during the execution of the program. We explore the various counters available which could be use to identify the anomalous behaviour in the system and develop a methodology to observe the anomalies using HPCs by creating a fault-free pattern and observing any subsequent changes in that pattern. We evaluate the proposed technique using GemFI, an architectural simulator based on Gem5 with additional fault injection capabilities. We compare the results obtained at the end of the execution with data collected during a time interval. Our results show that HPCs can be used to identify anomalous behaviour in a system that would lead to failure.
随着技术规模达到纳米级,由于温度和电压变化、单事件效应和组件降解而导致的错误率增加,使组件的可靠性降低。为了确保系统在面对已知的可靠性问题时继续正常工作,系统必须具有检测由于故障存在而导致的错误发生的手段。正常运行的系统(系统中没有检测到错误)显示一个概要文件,任何与该概要文件的偏差都表明系统中存在异常。在本文中,我们建议使用硬件性能计数器(hpc)来测量程序执行期间发生的事件。我们探索了各种可用的计数器,这些计数器可用于识别系统中的异常行为,并开发了一种方法,通过创建无故障模式并观察该模式的任何后续变化来使用hpc观察异常。我们使用GemFI来评估所提出的技术,GemFI是一个基于Gem5的架构模拟器,具有额外的故障注入功能。我们将在执行结束时获得的结果与在一段时间间隔内收集的数据进行比较。我们的研究结果表明,hpc可以用于识别系统中可能导致故障的异常行为。
{"title":"Hardware performance counters for system reliability monitoring","authors":"E. Woo, Mark Zwolinski, Basel Halak","doi":"10.1109/IVSW.2017.8031548","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031548","url":null,"abstract":"As technology scaling reaches nanometre scales, the error rate due to variations in temperature and voltage, single event effects and component degradation increases, making components less reliable. In order to ensure a system continues to function correctly while facing known reliability issues, it is imperative that the system should have the means to detect the occurrence of errors due to the presence of faults. A system that behaves normally (no error detected in the system) exhibits a profile, and any deviations from this profile indicate that there is an anomaly in the system. In this paper, we propose to use hardware performance counters (HPCs) to measure events that occur during the execution of the program. We explore the various counters available which could be use to identify the anomalous behaviour in the system and develop a methodology to observe the anomalies using HPCs by creating a fault-free pattern and observing any subsequent changes in that pattern. We evaluate the proposed technique using GemFI, an architectural simulator based on Gem5 with additional fault injection capabilities. We compare the results obtained at the end of the execution with data collected during a time interval. Our results show that HPCs can be used to identify anomalous behaviour in a system that would lead to failure.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Hacking the Control Flow error detection mechanism 破解控制流错误检测机制
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031544
G. D. Natale, M. Flottes, Sophie Dupuis, B. Rouzeyre
Many techniques have been proposed in literature to cope with transient, permanent and malicious faults in computing systems. Among these techniques for reliability improvement and fault tolerance, Control Flow Checking allows covering any fault affecting the part of the storing elements containing the executable program, as well as all the hardware components handling the program itself and its flow. In [1] the authors proposed a low-overhead solution implementing hardware based control flow monitoring technique. They suggested that control flow error detection could be also used as a solution for enhancing the security of a computing system, preventing the insertion of malicious code in an application. In this paper we present a technique to map a malicious program into another one without structure violation and thus bypassing the control flow detection method.
文献中提出了许多技术来处理计算系统中的瞬态、永久和恶意故障。在这些提高可靠性和容错的技术中,控制流检查允许覆盖任何影响包含可执行程序的存储元素部分的故障,以及处理程序本身及其流的所有硬件组件。在[1]中,作者提出了一种低开销的解决方案,实现基于硬件的控制流监控技术。他们建议,控制流错误检测也可以作为提高计算系统安全性的一种解决方案,防止在应用程序中插入恶意代码。在本文中,我们提出了一种将一个恶意程序映射到另一个恶意程序而不违反结构的技术,从而绕过了控制流检测方法。
{"title":"Hacking the Control Flow error detection mechanism","authors":"G. D. Natale, M. Flottes, Sophie Dupuis, B. Rouzeyre","doi":"10.1109/IVSW.2017.8031544","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031544","url":null,"abstract":"Many techniques have been proposed in literature to cope with transient, permanent and malicious faults in computing systems. Among these techniques for reliability improvement and fault tolerance, Control Flow Checking allows covering any fault affecting the part of the storing elements containing the executable program, as well as all the hardware components handling the program itself and its flow. In [1] the authors proposed a low-overhead solution implementing hardware based control flow monitoring technique. They suggested that control flow error detection could be also used as a solution for enhancing the security of a computing system, preventing the insertion of malicious code in an application. In this paper we present a technique to map a malicious program into another one without structure violation and thus bypassing the control flow detection method.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131321402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust secure design by increasing the resilience of Attack Protection Blocks 通过增加攻击保护块的弹性来实现健壮的安全设计
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031538
S. Aftabjahani, A. Das
The state of art secure digital computing systems heavily rely on secure hardware as the Trusted Computing Base to build upon the chain of trust for trusted computing. Attack Protection Blocks are added to the hardware to prevent an adversary from bypassing the security provided by hardware using various side channel, voltage, frequency, temperature, and other attacks. However, attackers can target the security protection features by designing experiments to understand the underlying power distribution network and its possible weaknesses. This can be used to temporarily turn off or damage the protection features by manipulation of the digital and analog voltage lines if over- and/or under- voltage protection for protection blocks is not present. Usually, in designs, the necessity of such protection has been overlooked just by the assumption that the probability of bypassing the protection without losing the functionality of the system is low. In this context, we present a robust system design approach which will enable the system to transition to a security safe (instead of unsafe) failure mode by increasing resilience of protection blocks against over- and under- voltage attacks. We show by probabilistic modeling why such attacks are possible and why our mitigation approach works.
目前的安全数字计算系统严重依赖于安全硬件作为可信计算基础,建立可信计算的信任链。攻击保护块被添加到硬件中,以防止对手使用各种侧信道、电压、频率、温度和其他攻击绕过硬件提供的安全性。然而,攻击者可以通过设计实验来了解底层配电网络及其可能存在的弱点,从而针对安全保护特征进行攻击。如果保护块的过压和/或欠压保护不存在,则可以通过操纵数字和模拟电压线路来暂时关闭或损坏保护功能。通常,在设计中,这种保护的必要性被忽视了,只是假设绕过保护而不失去系统功能的可能性很低。在这种情况下,我们提出了一种强大的系统设计方法,通过增加保护块对过压和欠压攻击的弹性,使系统能够过渡到安全(而不是不安全)故障模式。我们通过概率建模来说明为什么这种攻击是可能的,以及为什么我们的缓解方法有效。
{"title":"Robust secure design by increasing the resilience of Attack Protection Blocks","authors":"S. Aftabjahani, A. Das","doi":"10.1109/IVSW.2017.8031538","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031538","url":null,"abstract":"The state of art secure digital computing systems heavily rely on secure hardware as the Trusted Computing Base to build upon the chain of trust for trusted computing. Attack Protection Blocks are added to the hardware to prevent an adversary from bypassing the security provided by hardware using various side channel, voltage, frequency, temperature, and other attacks. However, attackers can target the security protection features by designing experiments to understand the underlying power distribution network and its possible weaknesses. This can be used to temporarily turn off or damage the protection features by manipulation of the digital and analog voltage lines if over- and/or under- voltage protection for protection blocks is not present. Usually, in designs, the necessity of such protection has been overlooked just by the assumption that the probability of bypassing the protection without losing the functionality of the system is low. In this context, we present a robust system design approach which will enable the system to transition to a security safe (instead of unsafe) failure mode by increasing resilience of protection blocks against over- and under- voltage attacks. We show by probabilistic modeling why such attacks are possible and why our mitigation approach works.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient design of Oscillator based Physical Unclonable Functions on Flash FPGAs 基于Flash fpga物理不可克隆功能的振荡器高效设计
Pub Date : 2017-07-01 DOI: 10.1109/IVSW.2017.8031560
Ugo Mureddu, O. Petura, Nathalie Bochard, L. Bossuet, V. Fischer
With the scaling down of electronic devices and the boom of wireless communications, more and more smart devices are interconnected in what we call the Internet of Things. Connecting devices of everyday use can greatly improve our comfort, but it can also introduce unprecedented security problems. With billions of devices connected there is a huge risk of unauthorized use. In this context, Physical Unclonable Functions (PUFs) are a promising solution since they extract device intrinsic fingerprint that can be used for hardware identification and authentication. Here we present the first fully functional implementation of Oscillator based PUFs on Flash based FPGA. The implementation is presented for the Ring Oscillator based PUF and the Transient Effect Ring Oscillatory based PUF. After explaining those two PUF principles, we give all the necessary design practices to follow to obtain an efficient PUF implementation on Flash FPGA. Finally, we present the characterization of the PUFs and compare it to previous work. To the best of our knowledge, it is the first work which deals with the implementation of Oscillator based PUF on Flash FPGAs. Moreover, all design files are available online to ensure repeatability.
随着电子设备的缩小和无线通信的蓬勃发展,越来越多的智能设备在我们所谓的物联网中相互连接。连接日常使用的设备可以极大地提高我们的舒适度,但它也会带来前所未有的安全问题。随着数十亿设备的连接,未经授权使用的风险很大。在这种情况下,物理不可克隆函数(puf)是一个很有前途的解决方案,因为它们提取设备的固有指纹,可用于硬件识别和身份验证。在这里,我们提出了基于Flash的FPGA上基于振荡器的puf的第一个全功能实现。给出了基于环形振荡器的PUF和基于瞬态效应环形振荡的PUF的实现方法。在解释了这两个PUF原理之后,我们给出了所有必要的设计实践,以在Flash FPGA上获得有效的PUF实现。最后,我们提出了puf的表征,并将其与以前的工作进行了比较。据我们所知,这是第一个在Flash fpga上实现基于振荡器的PUF的工作。此外,所有设计文件都可在线获取,以确保可重复性。
{"title":"Efficient design of Oscillator based Physical Unclonable Functions on Flash FPGAs","authors":"Ugo Mureddu, O. Petura, Nathalie Bochard, L. Bossuet, V. Fischer","doi":"10.1109/IVSW.2017.8031560","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031560","url":null,"abstract":"With the scaling down of electronic devices and the boom of wireless communications, more and more smart devices are interconnected in what we call the Internet of Things. Connecting devices of everyday use can greatly improve our comfort, but it can also introduce unprecedented security problems. With billions of devices connected there is a huge risk of unauthorized use. In this context, Physical Unclonable Functions (PUFs) are a promising solution since they extract device intrinsic fingerprint that can be used for hardware identification and authentication. Here we present the first fully functional implementation of Oscillator based PUFs on Flash based FPGA. The implementation is presented for the Ring Oscillator based PUF and the Transient Effect Ring Oscillatory based PUF. After explaining those two PUF principles, we give all the necessary design practices to follow to obtain an efficient PUF implementation on Flash FPGA. Finally, we present the characterization of the PUFs and compare it to previous work. To the best of our knowledge, it is the first work which deals with the implementation of Oscillator based PUF on Flash FPGAs. Moreover, all design files are available online to ensure repeatability.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129483486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero bit-error-rate weak PUF based on Spin-Transfer-Torque MRAM memories 基于自旋转移转矩MRAM存储器的零误码率弱PUF
Pub Date : 2015-09-17 DOI: 10.1109/IVSW.2017.8031552
E. Vatajelu, G. D. Natale, P. Prinetto
Physically Unclonable Functions (PUFs) are emerging cryptographic primitives used to implement low-cost device authentication and secure secret key generation. While several solutions exist for classical CMOS devices, novel proposals have been recently presented which exploit emerging technologies like magnetic memories. The Spin-Transfer-Torque Magnetic Random Access Memory (STT-MRAM) is a promising choice for future PUFs due to the high variability affecting the electrical resistance of the Magnetic Tunnel Junction (MTJ) device in anti-parallel magnetization. Some papers showed that these devices could guarantee high levels of both unclonability and reliability. However, 100% reliability is not yet obtained in those proposals. In this paper we present an effective method to identify the unreliable cells in a PUF implementation. This information is then used to create a zero bit-error-rate PUF scheme.
物理不可克隆函数(puf)是新兴的加密原语,用于实现低成本的设备身份验证和安全的密钥生成。虽然经典CMOS器件存在几种解决方案,但最近提出了利用磁存储器等新兴技术的新方案。自旋-传递-转矩磁随机存取存储器(STT-MRAM)是未来puf的一个很有前途的选择,因为在反平行磁化中,磁隧道结(MTJ)器件的电阻具有很高的可变性。一些论文表明,这些设备可以保证高水平的不可克隆性和可靠性。然而,这些方案还没有达到100%的可靠性。本文提出了一种识别PUF实现中不可靠单元的有效方法。然后使用该信息创建零误码率PUF方案。
{"title":"Zero bit-error-rate weak PUF based on Spin-Transfer-Torque MRAM memories","authors":"E. Vatajelu, G. D. Natale, P. Prinetto","doi":"10.1109/IVSW.2017.8031552","DOIUrl":"https://doi.org/10.1109/IVSW.2017.8031552","url":null,"abstract":"Physically Unclonable Functions (PUFs) are emerging cryptographic primitives used to implement low-cost device authentication and secure secret key generation. While several solutions exist for classical CMOS devices, novel proposals have been recently presented which exploit emerging technologies like magnetic memories. The Spin-Transfer-Torque Magnetic Random Access Memory (STT-MRAM) is a promising choice for future PUFs due to the high variability affecting the electrical resistance of the Magnetic Tunnel Junction (MTJ) device in anti-parallel magnetization. Some papers showed that these devices could guarantee high levels of both unclonability and reliability. However, 100% reliability is not yet obtained in those proposals. In this paper we present an effective method to identify the unreliable cells in a PUF implementation. This information is then used to create a zero bit-error-rate PUF scheme.","PeriodicalId":184196,"journal":{"name":"2017 IEEE 2nd International Verification and Security Workshop (IVSW)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115986545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2017 IEEE 2nd International Verification and Security Workshop (IVSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1