首页 > 最新文献

2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
SDSM: Fast and scalable security support for directory-based distributed shared memory SDSM:对基于目录的分布式共享内存的快速和可扩展的安全支持
Ofir Shwartz, Y. Birk
Secure computation is increasingly required, most notably when using public clouds. Many secure CPU architectures have been proposed, mostly focusing on single-threaded applications running on a single node. However, security for parallel and distributed computation is also needed, requiring the sharing of secret data among mutually trusting threads running in different compute nodes in an untrusted environment. We propose SDSM, a novel hardware approach for providing secure directory-based distributed shared memory. Unlike previously proposed schemes that cannot maintain reasonable performance beyond 32 cores, our approach allows secure parallel applications to scale efficiently to thousands of cores.
越来越需要安全计算,尤其是在使用公共云时。已经提出了许多安全的CPU架构,主要关注在单个节点上运行的单线程应用程序。然而,并行和分布式计算的安全性也是必须的,这需要在不受信任的环境中运行在不同计算节点上的相互信任的线程之间共享秘密数据。我们提出了SDSM,一种新的硬件方法来提供安全的基于目录的分布式共享内存。不像以前提出的方案,不能保持合理的性能超过32核,我们的方法允许安全并行应用程序有效地扩展到数千核。
{"title":"SDSM: Fast and scalable security support for directory-based distributed shared memory","authors":"Ofir Shwartz, Y. Birk","doi":"10.1145/2928275.2933282","DOIUrl":"https://doi.org/10.1145/2928275.2933282","url":null,"abstract":"Secure computation is increasingly required, most notably when using public clouds. Many secure CPU architectures have been proposed, mostly focusing on single-threaded applications running on a single node. However, security for parallel and distributed computation is also needed, requiring the sharing of secret data among mutually trusting threads running in different compute nodes in an untrusted environment. We propose SDSM, a novel hardware approach for providing secure directory-based distributed shared memory. Unlike previously proposed schemes that cannot maintain reasonable performance beyond 32 cores, our approach allows secure parallel applications to scale efficiently to thousands of cores.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127264057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IP core protection using voltage-controlled side-channel receivers 使用电压控制侧通道接收器的IP核心保护
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495585
P. Samarin, Kerstin Lemke-Rust, C. Paar
This paper presents a new method for protecting netlist-based Intellectual Property (IP) cores in FPGAs by actively using voltage-controlled side-channel receivers. The receivers are realized by modulating the supply voltage of the chip, while at the same time detecting these changes from within the chip using a ring oscillator. The levels of the supply voltage can be determined by constantly monitoring the frequency of the ring oscillator. To prove authorship of an IP core, the verifier authenticates himself to the core over the voltage side-channel and sends commands that limit the core's functionality. By monitoring the regular outputs of the overall system, it is possible to detect illegitimately used cores after repeatedly turning them on and off. The working principle of our method is demonstrated by a case study, in which we protect several IP cores and place them on a Spartan 3 FPGA, and show the steps necessary for successful proof of ownership verification.
本文提出了一种利用电压控制侧通道接收器主动保护fpga中基于netlist的IP核的新方法。接收器通过调制芯片的电源电压来实现,同时使用环形振荡器从芯片内部检测这些变化。供电电压的水平可以通过不断监测环形振荡器的频率来确定。为了证明IP核的作者身份,验证者通过电压侧通道向核验证自己,并发送限制核功能的命令。通过监控整个系统的常规输出,可以在反复打开和关闭内核后检测非法使用的内核。我们的方法的工作原理通过一个案例研究来证明,在这个案例研究中,我们保护了几个IP内核并将它们放在Spartan 3 FPGA上,并展示了成功证明所有权验证所需的步骤。
{"title":"IP core protection using voltage-controlled side-channel receivers","authors":"P. Samarin, Kerstin Lemke-Rust, C. Paar","doi":"10.1109/HST.2016.7495585","DOIUrl":"https://doi.org/10.1109/HST.2016.7495585","url":null,"abstract":"This paper presents a new method for protecting netlist-based Intellectual Property (IP) cores in FPGAs by actively using voltage-controlled side-channel receivers. The receivers are realized by modulating the supply voltage of the chip, while at the same time detecting these changes from within the chip using a ring oscillator. The levels of the supply voltage can be determined by constantly monitoring the frequency of the ring oscillator. To prove authorship of an IP core, the verifier authenticates himself to the core over the voltage side-channel and sends commands that limit the core's functionality. By monitoring the regular outputs of the overall system, it is possible to detect illegitimately used cores after repeatedly turning them on and off. The working principle of our method is demonstrated by a case study, in which we protect several IP cores and place them on a Spartan 3 FPGA, and show the steps necessary for successful proof of ownership verification.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126149264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Controlling your control flow graph 控制你的控制流图
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495554
A. Kanuparthi, Jeyavijayan Rajendran, R. Karri
Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program control flow through existing code without injecting malicious code to achieve his objective. In this paper, we propose Dynamic Sequence Checker (DSC), a framework to verify the validity of control flow between basic blocks in the program. Unique codes are assigned to every basic block in the program at compile time in such a way that the Hamming distance between two legally connected basic blocks is a known constant. At runtime, Hamming distance between the codes assigned to the source and destination basic blocks are calculated and compared against the known constant, to verify the control flow. Execution is aborted if the Hamming distance comparison does not match. We implemented DSC on a cycle-accurate x86 simulator. DSC has been able to detect all the CRA gadgets reported by the ROPGadget tool. The average performance overhead is 4.7% over a baseline processor.
代码重用攻击(CRAs)是一种软件攻击,攻击者在不注入恶意代码的情况下通过现有代码引导程序控制流来实现其目标。本文提出了动态序列检查器(DSC),这是一个验证程序中基本块之间控制流有效性的框架。在编译时,将唯一代码分配给程序中的每个基本块,使两个合法连接的基本块之间的汉明距离为已知常数。在运行时,计算分配给源和目标基本块的代码之间的汉明距离,并与已知常数进行比较,以验证控制流。如果汉明距离比较不匹配,则中止执行。我们在一个周期精确的x86模拟器上实现了DSC。DSC已经能够检测到所有由ROPGadget工具报告的CRA小工具。与基准处理器相比,平均性能开销为4.7%。
{"title":"Controlling your control flow graph","authors":"A. Kanuparthi, Jeyavijayan Rajendran, R. Karri","doi":"10.1109/HST.2016.7495554","DOIUrl":"https://doi.org/10.1109/HST.2016.7495554","url":null,"abstract":"Code Reuse Attacks (CRAs) are software exploits in which an attacker directs program control flow through existing code without injecting malicious code to achieve his objective. In this paper, we propose Dynamic Sequence Checker (DSC), a framework to verify the validity of control flow between basic blocks in the program. Unique codes are assigned to every basic block in the program at compile time in such a way that the Hamming distance between two legally connected basic blocks is a known constant. At runtime, Hamming distance between the codes assigned to the source and destination basic blocks are calculated and compared against the known constant, to verify the control flow. Execution is aborted if the Hamming distance comparison does not match. We implemented DSC on a cycle-accurate x86 simulator. DSC has been able to detect all the CRA gadgets reported by the ROPGadget tool. The average performance overhead is 4.7% over a baseline processor.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
GenMatch: Secure DNA compatibility testing GenMatch:安全的DNA兼容性测试
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495590
M. Riazi, N. K. R. Dantu, L. N. V. Gattu, F. Koushanfar
We introduce GenMatch, a novel set of techniques based on hardware synthesis, for achieving efficient and scalable privacy-preserving genetic testing. Processing and handling sensitive genome data require methodologies to thwart possible attacks and data theft scenarios. The GenMatch secure genome testing method utilizes Yao's Garbled Circuit (GC) protocol and creates a formulation of the matching problem in a sequential GC format. Our formulation involves private matching of genome data by the GC protocol. Our method reduces the memory footprint of the secure computation such that it can be done in a resource-constrained devices like embedded platforms, rendering the method scalable and time-efficient. Proof-of-concept evaluations are performed on the application of matching Human Leukocyte Antigen (HLA) data for organ and tissue transplant compatibility between recipient and donors. This type of testing also has applications in ancestry testing and genetic matchmaking. HLA data of the recipient is matched with a database of possible donor HLA data while keeping the data from both parties private. Experimental results on real genome data demonstrate the practicability of GenMatch in terms of timing and communication complexity for HLA database in the order of million user profiles.
我们介绍了GenMatch,一套基于硬件合成的新技术,用于实现高效和可扩展的隐私保护基因检测。处理和处理敏感的基因组数据需要方法来阻止可能的攻击和数据盗窃场景。GenMatch安全基因组测试方法利用Yao的乱码电路(GC)协议,并以顺序GC格式创建匹配问题的公式。我们的公式包括通过GC协议对基因组数据进行私人匹配。我们的方法减少了安全计算的内存占用,因此它可以在资源受限的设备(如嵌入式平台)中完成,使该方法具有可扩展性和时间效率。概念验证评估的应用进行匹配人类白细胞抗原(HLA)数据的器官和组织移植受体和供体之间的兼容性。这种类型的测试在祖先测试和基因配对中也有应用。受体的HLA数据与可能的供体HLA数据数据库相匹配,同时保持双方数据的私密性。在真实基因组数据上的实验结果证明了GenMatch在时序和通信复杂度方面对HLA数据库的实用性。
{"title":"GenMatch: Secure DNA compatibility testing","authors":"M. Riazi, N. K. R. Dantu, L. N. V. Gattu, F. Koushanfar","doi":"10.1109/HST.2016.7495590","DOIUrl":"https://doi.org/10.1109/HST.2016.7495590","url":null,"abstract":"We introduce GenMatch, a novel set of techniques based on hardware synthesis, for achieving efficient and scalable privacy-preserving genetic testing. Processing and handling sensitive genome data require methodologies to thwart possible attacks and data theft scenarios. The GenMatch secure genome testing method utilizes Yao's Garbled Circuit (GC) protocol and creates a formulation of the matching problem in a sequential GC format. Our formulation involves private matching of genome data by the GC protocol. Our method reduces the memory footprint of the secure computation such that it can be done in a resource-constrained devices like embedded platforms, rendering the method scalable and time-efficient. Proof-of-concept evaluations are performed on the application of matching Human Leukocyte Antigen (HLA) data for organ and tissue transplant compatibility between recipient and donors. This type of testing also has applications in ancestry testing and genetic matchmaking. HLA data of the recipient is matched with a database of possible donor HLA data while keeping the data from both parties private. Experimental results on real genome data demonstrate the practicability of GenMatch in terms of timing and communication complexity for HLA database in the order of million user profiles.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A key-centric processor architecture for secure computing 用于安全计算的以密钥为中心的处理器体系结构
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495578
David Whelihan, Kate Thurmer, M. Vai
We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together without divulging algorithmic parameters or secret program data. Since the architecture performs encryption, decryption, and key management deeply within the processor hardware, the attack surface is minimized without significant impact on performance or ease of use. The current prototype implementation is based on the Sparc architecture and is highly applicable to small to medium-sized processing loads.
我们描述了一种新颖的以密钥为中心的处理器架构,其中每个数据或代码都可以在静止、传输和使用时通过加密进行保护。使用嵌入式密钥管理进行加密密钥处理,我们的处理器允许由不同实体编写的互不信任的软件紧密合作,而不会泄露算法参数或秘密程序数据。由于该体系结构在处理器硬件内部执行加密、解密和密钥管理,因此攻击面被最小化,而不会对性能或易用性产生重大影响。当前的原型实现基于Sparc架构,非常适用于中小型处理负载。
{"title":"A key-centric processor architecture for secure computing","authors":"David Whelihan, Kate Thurmer, M. Vai","doi":"10.1109/HST.2016.7495578","DOIUrl":"https://doi.org/10.1109/HST.2016.7495578","url":null,"abstract":"We describe a novel key-centric processor architecture in which each piece of data or code can be protected by encryption while at rest, in transit, and in use. Using embedded key management for cryptographic key handling, our processor permits mutually distrusting software written by different entities to work closely together without divulging algorithmic parameters or secret program data. Since the architecture performs encryption, decryption, and key management deeply within the processor hardware, the attack surface is minimized without significant impact on performance or ease of use. The current prototype implementation is based on the Sparc architecture and is highly applicable to small to medium-sized processing loads.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126902029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parsimonious design strategy for linear layers with high diffusion in block ciphers 分组密码中高扩散线性层的简约设计策略
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495552
Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh K. Ghosh
Linear layers are crucial building blocks in the design of lightweight block ciphers, since they perform the dual task of providing the much needed diffusion, while also ensuring minimal hardware cost for implementation. Although a number of lightweight block ciphers with parsimoniously designed linear layers have been proposed in cryptographic literature, there is limited work on generic construction techniques for such linear layers, to the best of our knowledge. The challenge in designing a suitable linear layer, that combines the requirements of both cryptographic strength and lightweightedness, lies in the huge search space accompanying such a construction technique. In this paper, we propose a hierarchical linear layer construction technique that systematically combines the principles of block interleaving and wide trail design strategy to construct large linear layers from suitably chosen smaller linear layers that guarantee the necessary diffusion properties. Additionally, the smaller linear layers are realized by iterating linear layers which are extremely lightweight, thus providing us with a strategy to guarantee diffusion while ensuring that the gate count of the design is minimized. In order to demonstrate the efficiency of our proposed technique, we compare it with the general construction technique proposed for the design of the block cipher PRIDE. To the best of our knowledge, PRIDE offers the only other general construction technique that focuses specifically on the construction of lightweight linear layers. While the construction technique of PRIDE is efficient for software implementations, our technique provides 60% and 50% greater savings in terms of area footprint on ASIC and FPGA based designs respectively, with an overall area-time product reduction by 7.5%. The main contribution of this work lies in providing the cipher design community with a generic off-the-shelf technique for designing lightweight linear layers with high diffusion for hardware-oriented applications.
线性层是轻量级分组密码设计中的关键构建块,因为它们执行提供急需的扩散的双重任务,同时还确保实现的最小硬件成本。尽管在密码学文献中已经提出了许多具有简约设计的线性层的轻量级分组密码,但据我们所知,对这种线性层的通用构造技术的研究有限。设计一个合适的线性层的挑战,结合了加密强度和轻量级的要求,在于伴随这种构造技术的巨大搜索空间。在本文中,我们提出了一种分层线性层构建技术,该技术系统地结合了块交错原理和宽径设计策略,从适当选择的保证必要扩散特性的较小线性层构建大型线性层。此外,较小的线性层是通过迭代线性层来实现的,这些线性层非常轻,从而为我们提供了一种保证扩散的策略,同时确保设计的门数最小化。为了证明本文提出的方法的有效性,我们将其与分组密码PRIDE的一般构造方法进行了比较。据我们所知,PRIDE提供了唯一的其他通用施工技术,专门用于轻质线性层的施工。虽然PRIDE的构建技术对于软件实现是有效的,但我们的技术在基于ASIC和FPGA的设计上的面积占用方面分别节省了60%和50%,总体面积时间产品减少了7.5%。这项工作的主要贡献在于为密码设计界提供了一种通用的现成技术,用于为面向硬件的应用设计具有高扩散的轻量级线性层。
{"title":"Parsimonious design strategy for linear layers with high diffusion in block ciphers","authors":"Sikhar Patranabis, Debapriya Basu Roy, Yash Shrivastava, Debdeep Mukhopadhyay, Santosh K. Ghosh","doi":"10.1109/HST.2016.7495552","DOIUrl":"https://doi.org/10.1109/HST.2016.7495552","url":null,"abstract":"Linear layers are crucial building blocks in the design of lightweight block ciphers, since they perform the dual task of providing the much needed diffusion, while also ensuring minimal hardware cost for implementation. Although a number of lightweight block ciphers with parsimoniously designed linear layers have been proposed in cryptographic literature, there is limited work on generic construction techniques for such linear layers, to the best of our knowledge. The challenge in designing a suitable linear layer, that combines the requirements of both cryptographic strength and lightweightedness, lies in the huge search space accompanying such a construction technique. In this paper, we propose a hierarchical linear layer construction technique that systematically combines the principles of block interleaving and wide trail design strategy to construct large linear layers from suitably chosen smaller linear layers that guarantee the necessary diffusion properties. Additionally, the smaller linear layers are realized by iterating linear layers which are extremely lightweight, thus providing us with a strategy to guarantee diffusion while ensuring that the gate count of the design is minimized. In order to demonstrate the efficiency of our proposed technique, we compare it with the general construction technique proposed for the design of the block cipher PRIDE. To the best of our knowledge, PRIDE offers the only other general construction technique that focuses specifically on the construction of lightweight linear layers. While the construction technique of PRIDE is efficient for software implementations, our technique provides 60% and 50% greater savings in terms of area footprint on ASIC and FPGA based designs respectively, with an overall area-time product reduction by 7.5%. The main contribution of this work lies in providing the cipher design community with a generic off-the-shelf technique for designing lightweight linear layers with high diffusion for hardware-oriented applications.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115334450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust privacy-preserving fingerprint authentication 鲁棒的隐私保护指纹认证
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495547
Ye Zhang, F. Koushanfar
This paper presents the first scalable, efficient, and reliable privacy-preserving fingerprint authentication based on minutiae representation. Our method is provably secure by leveraging the Yao's classic Garbled Circuit (GC) protocol. While the concept of using GC for secure fingerprint matching has been suggested earlier, to the best of our knowledge, no prior reliable method or implementation applicable to real fingerprint data has been available. Our technique achieves both accuracy and practicability by customizing a widely adopted minutiae-based fingerprint matching algorithm, Bozorth matcher, as our core authentication engine. We modify the Bozorth matcher and identify certain sensitive parts of this algorithm. For these critical parts, we create a sequential circuit description which can be efficiently synthesized and customized to GC using the TinyGarble framework. We show evaluations of our modified matching algorithm on a standard fingerprint database FVC2002 DB2 to demonstrate its reliability. The implementation of privacy-preserving fingerprint authentication using Synopsis Design Compiler on a commercial Intel processor shows the efficiency and scalability of the proposed methodologies.
提出了一种基于细节表示的可扩展、高效、可靠的隐私保护指纹身份验证方法。我们的方法通过利用Yao的经典乱码电路(GC)协议可以证明是安全的。虽然之前已经提出了使用GC进行安全指纹匹配的概念,但据我们所知,目前还没有适用于真实指纹数据的可靠方法或实现。我们的技术通过定制广泛采用的基于微特征的指纹匹配算法Bozorth matcher作为我们的核心认证引擎,实现了准确性和实用性。我们修改了Bozorth匹配器,并识别了该算法的某些敏感部分。对于这些关键部分,我们创建了一个顺序电路描述,可以使用TinyGarble框架有效地合成和定制GC。我们在标准指纹数据库FVC2002 DB2上对修改后的匹配算法进行了评估,以证明其可靠性。在商用Intel处理器上使用概要设计编译器实现了隐私保护指纹认证,表明了所提出方法的效率和可扩展性。
{"title":"Robust privacy-preserving fingerprint authentication","authors":"Ye Zhang, F. Koushanfar","doi":"10.1109/HST.2016.7495547","DOIUrl":"https://doi.org/10.1109/HST.2016.7495547","url":null,"abstract":"This paper presents the first scalable, efficient, and reliable privacy-preserving fingerprint authentication based on minutiae representation. Our method is provably secure by leveraging the Yao's classic Garbled Circuit (GC) protocol. While the concept of using GC for secure fingerprint matching has been suggested earlier, to the best of our knowledge, no prior reliable method or implementation applicable to real fingerprint data has been available. Our technique achieves both accuracy and practicability by customizing a widely adopted minutiae-based fingerprint matching algorithm, Bozorth matcher, as our core authentication engine. We modify the Bozorth matcher and identify certain sensitive parts of this algorithm. For these critical parts, we create a sequential circuit description which can be efficiently synthesized and customized to GC using the TinyGarble framework. We show evaluations of our modified matching algorithm on a standard fingerprint database FVC2002 DB2 to demonstrate its reliability. The implementation of privacy-preserving fingerprint authentication using Synopsis Design Compiler on a commercial Intel processor shows the efficiency and scalability of the proposed methodologies.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125072642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
UCR: An unclonable chipless RFID tag UCR:一种不可克隆的无芯片RFID标签
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495548
Kun Yang, Domenic Forte, M. Tehranipoor
While Radio Frequency Identification (RFID) has become popular for commodity and asset tracking and management, the relatively higher price of RFID tags limits its application in the supply chain of low-cost commodities. Recently, cost-effective chipless RFID tags that do not contain a microchip in the transponder have been gaining more attention from industry, academia, and government. Existing chipless RFID tags require removing or shorting of some resonators (i.e., spirals or patch slots) on the substrate to encode data, but this incurs a waste of tag area and increases the manufacturing time/cost of chipless RFID tags. In addition, the identifiers (IDs) generated by existing chipless RFID tags are small, deterministic, and clonable. To mitigate these shortcomings, we propose a new unclonable chipless RFID (UCR) tag that intrinsically generates a unique ID from manufacturing variations. UCR tag consists of a certain number of concentric ring slot resonators, whose resonance frequencies depend on slot parameters and substrate dielectric constant that are sensitive to manufacturing variations. The area of UCR tag is as small as regular quick response (QR) code. Simulation results based on CST Microwave Studio 2015 have verified the effectiveness and reliability of UCR tags. The non-overlapping margin between intra-tag and inter-tag Euclidian distance distributions reaches approximately 50 MHz in the presence of random white Gaussian noise (WGN) with a signal-to-noise ratio (SNR) of 10 dB.
射频识别技术(RFID)在商品和资产跟踪与管理方面的应用越来越广泛,但其相对较高的价格限制了其在低成本商品供应链中的应用。最近,在应答器中不包含微芯片的低成本无芯片RFID标签越来越受到工业界、学术界和政府的关注。现有的无芯片RFID标签需要移除或缩短基板上的一些谐振器(即螺旋或贴片槽)来编码数据,但这会浪费标签面积并增加无芯片RFID标签的制造时间/成本。此外,由现有无芯片RFID标签生成的标识符(id)很小,具有确定性和可克隆性。为了减轻这些缺点,我们提出了一种新的不可克隆的无芯片RFID (UCR)标签,该标签从制造变化中本质上产生唯一的ID。UCR标签由一定数量的同心圆槽谐振器组成,其谐振频率取决于槽参数和衬底介电常数,而槽参数和衬底介电常数对制造变化敏感。UCR标签的面积与普通QR码一样小。基于CST Microwave Studio 2015的仿真结果验证了UCR标签的有效性和可靠性。当随机高斯白噪声(WGN)存在时,标签内和标签间的欧氏距离分布的不重叠余量约为50 MHz,信噪比为10 dB。
{"title":"UCR: An unclonable chipless RFID tag","authors":"Kun Yang, Domenic Forte, M. Tehranipoor","doi":"10.1109/HST.2016.7495548","DOIUrl":"https://doi.org/10.1109/HST.2016.7495548","url":null,"abstract":"While Radio Frequency Identification (RFID) has become popular for commodity and asset tracking and management, the relatively higher price of RFID tags limits its application in the supply chain of low-cost commodities. Recently, cost-effective chipless RFID tags that do not contain a microchip in the transponder have been gaining more attention from industry, academia, and government. Existing chipless RFID tags require removing or shorting of some resonators (i.e., spirals or patch slots) on the substrate to encode data, but this incurs a waste of tag area and increases the manufacturing time/cost of chipless RFID tags. In addition, the identifiers (IDs) generated by existing chipless RFID tags are small, deterministic, and clonable. To mitigate these shortcomings, we propose a new unclonable chipless RFID (UCR) tag that intrinsically generates a unique ID from manufacturing variations. UCR tag consists of a certain number of concentric ring slot resonators, whose resonance frequencies depend on slot parameters and substrate dielectric constant that are sensitive to manufacturing variations. The area of UCR tag is as small as regular quick response (QR) code. Simulation results based on CST Microwave Studio 2015 have verified the effectiveness and reliability of UCR tags. The non-overlapping margin between intra-tag and inter-tag Euclidian distance distributions reaches approximately 50 MHz in the presence of random white Gaussian noise (WGN) with a signal-to-noise ratio (SNR) of 10 dB.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130445376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
ACBuilder: A tool for hardware architecture security evaluation ACBuilder:硬件架构安全评估工具
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495564
Henrique Kawakami, David E. Ott, H. Wong, R. Dahab, R. Gallo
In this work we propose to enable the security analysis of hardware architecture independently of its physical implementation. This will help to discover vulnerabilities and flaws in a broad range of architectures, and to identify problems before the costly process of design and manufacturing. Our approach employs Assurance Cases, proposed in [1] as a flexible methodology that builds upon Safety Case approaches used in such mission-critical industries as aerospace, nuclear power, and national defense. More specifically, in this paper we present our research on software frameworks to aid security analysts in the development of assurance cases. We describe how our research prototype, ACBuilder, can be used to model hardware architectures, apply existing analysis patterns, develop analysis rules, and generate assurance cases. We then apply the methodology to an illustrative example for evaluation, and discuss avenues for developing the software framework further. This includes opportunities for automation and enabling community-based approaches for developing reusable patterns.
在这项工作中,我们建议使硬件架构的安全分析独立于其物理实现。这将有助于在广泛的体系结构中发现漏洞和缺陷,并在昂贵的设计和制造过程之前识别问题。我们的方法采用了[1]中提出的保证案例,作为一种灵活的方法,它建立在航空航天、核电和国防等关键任务行业中使用的安全案例方法的基础上。更具体地说,在本文中,我们介绍了我们对软件框架的研究,以帮助安全分析师开发保证案例。我们描述了如何使用我们的研究原型ACBuilder对硬件架构建模、应用现有的分析模式、开发分析规则和生成保证用例。然后,我们将该方法应用于评估的说明性示例,并讨论进一步开发软件框架的途径。这包括实现自动化和启用基于社区的方法来开发可重用模式的机会。
{"title":"ACBuilder: A tool for hardware architecture security evaluation","authors":"Henrique Kawakami, David E. Ott, H. Wong, R. Dahab, R. Gallo","doi":"10.1109/HST.2016.7495564","DOIUrl":"https://doi.org/10.1109/HST.2016.7495564","url":null,"abstract":"In this work we propose to enable the security analysis of hardware architecture independently of its physical implementation. This will help to discover vulnerabilities and flaws in a broad range of architectures, and to identify problems before the costly process of design and manufacturing. Our approach employs Assurance Cases, proposed in [1] as a flexible methodology that builds upon Safety Case approaches used in such mission-critical industries as aerospace, nuclear power, and national defense. More specifically, in this paper we present our research on software frameworks to aid security analysts in the development of assurance cases. We describe how our research prototype, ACBuilder, can be used to model hardware architectures, apply existing analysis patterns, develop analysis rules, and generate assurance cases. We then apply the methodology to an illustrative example for evaluation, and discuss avenues for developing the software framework further. This includes opportunities for automation and enabling community-based approaches for developing reusable patterns.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131178056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs 在fpga上实现可靠、高效的环形振荡器puf的若干问题
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495565
A. Wild, G. Becker, T. Güneysu
Physical Unclonable Functions (PUFs) are a promising way to securely generate and store keys by using the inherent process variations of each chip as a source of randomness. One of the most promising PUFs for FPGAs is the Ring-Oscillator (RO) PUF. In this paper we take a closer look at RO PUFs and their open challenges. Starting from a reference design for a Spartan-6 FPGA based on PUFKY, we show how the RO design can be optimized by taking full advantage of the available resources, reducing the RO area by nearly 50%. Furthermore, we analyze the observed structural bias of the RO PUFs and show how the entropy of the RO PUF can be improved by taking the FPGA structure into account when extracting the PUF response bits. However, we also point out a very important problem of FPGA based RO PUFs that has not gained the needed attention: counter failures. We show that the frequency counter is a very crucial element in RO PUF design that itself is very susceptible to process variations. While the counters might work properly on most devices, in some they fail to count correctly. For example, in one experiment only one out of 22 FPGAs failed to count correctly. Our results therefore show that the correct functioning of the frequency counter is not only design-dependent, but also depends highly on process variations, i.e., on the individual FPGA. We argue that solving this issue is non-trivial, since the internal details of the FPGA are secret and hence circuit-level simulations of an FPGA design are not possible. However, the large security implications of such failures make it inevitable that this problem is solved before RO PUFs on FPGAs can be used in practice.
物理不可克隆函数(puf)是一种很有前途的安全生成和存储密钥的方法,它利用每个芯片的固有过程变化作为随机性的来源。环形振荡器(RO)是fpga中最有前途的PUF之一。在本文中,我们将仔细研究RO puf及其开放的挑战。从基于PUFKY的Spartan-6 FPGA的参考设计开始,我们展示了如何通过充分利用可用资源来优化RO设计,将RO面积减少近50%。此外,我们分析了观察到的RO PUF的结构偏差,并展示了如何在提取PUF响应位时考虑FPGA结构来提高RO PUF的熵。然而,我们也指出了基于FPGA的RO puf的一个非常重要的问题,没有得到必要的关注:计数器故障。我们表明,频率计数器是RO PUF设计中非常关键的元素,它本身非常容易受到工艺变化的影响。虽然计数器可能在大多数设备上正常工作,但在某些设备上它们无法正确计数。例如,在一个实验中,22个fpga中只有一个不能正确计数。因此,我们的结果表明,频率计数器的正确功能不仅依赖于设计,而且高度依赖于工艺变化,即单个FPGA。我们认为解决这个问题是不平凡的,因为FPGA的内部细节是秘密的,因此FPGA设计的电路级模拟是不可能的。然而,这种故障的巨大安全影响使得在fpga上的RO puf可以在实践中使用之前解决这个问题是不可避免的。
{"title":"On the problems of realizing reliable and efficient ring oscillator PUFs on FPGAs","authors":"A. Wild, G. Becker, T. Güneysu","doi":"10.1109/HST.2016.7495565","DOIUrl":"https://doi.org/10.1109/HST.2016.7495565","url":null,"abstract":"Physical Unclonable Functions (PUFs) are a promising way to securely generate and store keys by using the inherent process variations of each chip as a source of randomness. One of the most promising PUFs for FPGAs is the Ring-Oscillator (RO) PUF. In this paper we take a closer look at RO PUFs and their open challenges. Starting from a reference design for a Spartan-6 FPGA based on PUFKY, we show how the RO design can be optimized by taking full advantage of the available resources, reducing the RO area by nearly 50%. Furthermore, we analyze the observed structural bias of the RO PUFs and show how the entropy of the RO PUF can be improved by taking the FPGA structure into account when extracting the PUF response bits. However, we also point out a very important problem of FPGA based RO PUFs that has not gained the needed attention: counter failures. We show that the frequency counter is a very crucial element in RO PUF design that itself is very susceptible to process variations. While the counters might work properly on most devices, in some they fail to count correctly. For example, in one experiment only one out of 22 FPGAs failed to count correctly. Our results therefore show that the correct functioning of the frequency counter is not only design-dependent, but also depends highly on process variations, i.e., on the individual FPGA. We argue that solving this issue is non-trivial, since the internal details of the FPGA are secret and hence circuit-level simulations of an FPGA design are not possible. However, the large security implications of such failures make it inevitable that this problem is solved before RO PUFs on FPGAs can be used in practice.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1