首页 > 最新文献

2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity LEDPUF:通过局部增强缺陷来保证稳定性的物理不可克隆功能
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495551
Wei-Che Wang, Y. Yona, S. Diggavi, Puneet Gupta
Stability has always been one of the major limitations that constraints Physical Unclonable Function (PUF) from being put in widespread practical use. In this paper, we propose a weak PUF and a strong PUF that are both completely stable with 0% intra-distance. These PUFs are called Locally Enhanced Defectivity Physical Unclonable Function (LEDPUF). A LEDPUF is a pure functional PUF which eliminates the instability of conventional parametric PUFs, therefore no helper data, fuzzy comparator, or any kinds of correction schemes are required. The source of randomness is extracted from Directed Self Assembly (DSA) process, and connections that are permanently closed or opened are formed randomly. The weak LEDPUF is constructed by forming arrays of DSA random connections, and the strong LEDPUF is implemented by using the weak LEDPUF as the key of a keyed-hash message authentication code (HMAC). Our simulation and statistical results show that the entropy of the weak LEDPUF bits is close to ideal, and the inter-distances of both weak and strong LEDPUFs are about 50%, which means that these LEDPUFs are not only stable but also unique.
稳定性一直是制约物理不可克隆函数(PUF)广泛应用的主要限制之一。在本文中,我们提出了一个弱PUF和一个强PUF,它们在0%内距离下都是完全稳定的。这些puf被称为局部增强缺陷物理不可克隆功能(LEDPUF)。LEDPUF是一种纯功能PUF,它消除了传统参数PUF的不稳定性,因此不需要辅助数据、模糊比较器或任何类型的校正方案。从定向自组装(DSA)过程中提取随机性来源,随机形成永久关闭或永久打开的连接。弱LEDPUF通过形成DSA随机连接数组来构建,强LEDPUF通过使用弱LEDPUF作为密钥哈希消息认证码(HMAC)的密钥来实现。我们的仿真和统计结果表明,弱LEDPUF比特的熵接近理想值,弱LEDPUF和强LEDPUF之间的距离都在50%左右,这意味着这些LEDPUF不仅稳定而且具有唯一性。
{"title":"LEDPUF: Stability-guaranteed physical unclonable functions through locally enhanced defectivity","authors":"Wei-Che Wang, Y. Yona, S. Diggavi, Puneet Gupta","doi":"10.1109/HST.2016.7495551","DOIUrl":"https://doi.org/10.1109/HST.2016.7495551","url":null,"abstract":"Stability has always been one of the major limitations that constraints Physical Unclonable Function (PUF) from being put in widespread practical use. In this paper, we propose a weak PUF and a strong PUF that are both completely stable with 0% intra-distance. These PUFs are called Locally Enhanced Defectivity Physical Unclonable Function (LEDPUF). A LEDPUF is a pure functional PUF which eliminates the instability of conventional parametric PUFs, therefore no helper data, fuzzy comparator, or any kinds of correction schemes are required. The source of randomness is extracted from Directed Self Assembly (DSA) process, and connections that are permanently closed or opened are formed randomly. The weak LEDPUF is constructed by forming arrays of DSA random connections, and the strong LEDPUF is implemented by using the weak LEDPUF as the key of a keyed-hash message authentication code (HMAC). Our simulation and statistical results show that the entropy of the weak LEDPUF bits is close to ideal, and the inter-distances of both weak and strong LEDPUFs are about 50%, which means that these LEDPUFs are not only stable but also unique.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133125367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Redirecting DRAM memory pages: Examining the threat of system memory Hardware Trojans 重定向DRAM内存页:检查系统内存硬件木马的威胁
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495582
Bradley D. Hopkins, J. Shield, Chris J. North
The trustworthiness of electronic components procured and deployed in critical infrastructure can not be guaranteed. These components may contain Hardware Trojans. Understanding the threat characteristics of these Hardware Trojans is critical to the development of future security risk mitigations. One key threat is posed by Hardware Trojans located in System Memory chips, such as those found in DIMM memory. We present a physical prototype of a Memory Hardware Trojan that only requires 230 slices, performs physical page address redirection, operates in standard systems, and can be leveraged by an unprivileged software process to bypass memory protection. We demonstrate the effectiveness of our trojan with privilege escalation and virtual machine breakout use cases. Based on our designs and experimental findings, we identify insights and discuss mitigation strategies.
在关键基础设施中采购和部署的电子元件的可靠性无法得到保证。这些组件可能包含“硬件木马”。了解这些硬件木马的威胁特征对于开发未来的安全风险缓解措施至关重要。一个关键的威胁是硬件木马位于系统内存芯片,如那些发现在内存内存。我们提出了一个内存硬件木马的物理原型,它只需要230个切片,执行物理页面地址重定向,在标准系统中运行,并且可以被非特权软件进程利用来绕过内存保护。我们通过特权升级和虚拟机突破用例演示了木马的有效性。根据我们的设计和实验结果,我们确定了见解并讨论了缓解策略。
{"title":"Redirecting DRAM memory pages: Examining the threat of system memory Hardware Trojans","authors":"Bradley D. Hopkins, J. Shield, Chris J. North","doi":"10.1109/HST.2016.7495582","DOIUrl":"https://doi.org/10.1109/HST.2016.7495582","url":null,"abstract":"The trustworthiness of electronic components procured and deployed in critical infrastructure can not be guaranteed. These components may contain Hardware Trojans. Understanding the threat characteristics of these Hardware Trojans is critical to the development of future security risk mitigations. One key threat is posed by Hardware Trojans located in System Memory chips, such as those found in DIMM memory. We present a physical prototype of a Memory Hardware Trojan that only requires 230 slices, performs physical page address redirection, operates in standard systems, and can be leveraged by an unprivileged software process to bypass memory protection. We demonstrate the effectiveness of our trojan with privilege escalation and virtual machine breakout use cases. Based on our designs and experimental findings, we identify insights and discuss mitigation strategies.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128706017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hardware-based workload forensics: Process reconstruction via TLB monitoring 基于硬件的工作负载取证:通过TLB监控进行流程重建
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495577
Liwei Zhou, Y. Makris
We introduce a hardware-based methodology for performing workload execution forensics in microprocessors. More specifically, we discuss the on-chip instrumentation required for capturing the operational profile of the Translation Lookaside Buffer (TLB), as well as an off-line machine learning approach which uses this information to identify the executed processes and reconstruct the workload. Unlike workload forensics methods implemented at the operating system (OS) and/or hypervisor level, whose data logging and monitoring mechanisms may be compromised through software attacks, this approach is implemented directly in hardware and is, therefore, immune to such attacks. The proposed method is demonstrated on an experimentation platform which consists of a 32-bit x86 architecture running Linux operating system, implemented in the Simics simulation environment. Experimental results using the Mibench workload benchmark suite reveal an overall workload identification accuracy of 96.97% at an estimated logging rate of only 5.17 KB/sec.
我们介绍了一种基于硬件的方法,用于在微处理器中执行工作负载执行取证。更具体地说,我们讨论了捕获翻译暂置缓冲区(TLB)的操作配置文件所需的片上仪器,以及使用此信息识别已执行进程并重建工作负载的离线机器学习方法。与在操作系统(OS)和/或管理程序级别实现的工作负载取证方法不同,这些方法的数据记录和监视机制可能会因软件攻击而受损,而这种方法直接在硬件中实现,因此不受此类攻击的影响。该方法在运行Linux操作系统的32位x86架构实验平台上进行了验证,并在Simics仿真环境中实现。使用Mibench工作负载基准测试套件的实验结果显示,在估计的日志记录速率仅为5.17 KB/秒的情况下,总体工作负载识别准确率达到96.97%。
{"title":"Hardware-based workload forensics: Process reconstruction via TLB monitoring","authors":"Liwei Zhou, Y. Makris","doi":"10.1109/HST.2016.7495577","DOIUrl":"https://doi.org/10.1109/HST.2016.7495577","url":null,"abstract":"We introduce a hardware-based methodology for performing workload execution forensics in microprocessors. More specifically, we discuss the on-chip instrumentation required for capturing the operational profile of the Translation Lookaside Buffer (TLB), as well as an off-line machine learning approach which uses this information to identify the executed processes and reconstruct the workload. Unlike workload forensics methods implemented at the operating system (OS) and/or hypervisor level, whose data logging and monitoring mechanisms may be compromised through software attacks, this approach is implemented directly in hardware and is, therefore, immune to such attacks. The proposed method is demonstrated on an experimentation platform which consists of a 32-bit x86 architecture running Linux operating system, implemented in the Simics simulation environment. Experimental results using the Mibench workload benchmark suite reveal an overall workload identification accuracy of 96.97% at an estimated logging rate of only 5.17 KB/sec.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122194716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A separation and protection scheme for on-chip memory blocks in FPGAs fpga片上存储块的分离与保护方案
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495586
Luis Ramirez Rivera, Xiaofang Wang, D. Chasaki
State-of-the-art FPGAs are quickly evolving into a complete system-on-chip (SoC) platform with aggressive integration of high-performance hard processor cores, gigabytes of dedicated memory blocks, and many commonly used peripherals. As FPGAs increasingly find their way into many critical and sensitive applications, including speeding cryptographic algorithms, security concerns about themselves start mounting. Current countermeasures mostly target hardware trojans, cloning, side-channel attacks, and reverse engineering. Little attention has been devoted to securing dedicated on-chip memory blocks. Moreover, the dynamic reconfigurability nature of FPGAs makes static-only approaches less effective and less efficient. In this paper, we present the design and implementation of a runtime protection scheme for FPGA on-chip memory blocks. To secure on-chip memory inside FPGAs, careful design choices must be taken because of their very low latency and simple flat memory model. A series of rules, called security policies are made. These policies are enforced by a reference monitor who mediates the communications between the intellectual properties (IP) or modules that requires the memory, and the memory itself. The memory security scheme is an implementation of a security kernel, enforced by a series of security policies, with a specific policy algorithm which tells four security monitors to control the memory accesses between IPs and the on-chip memory inside the FPGA used. The results on a Xilinx Virtex-6 FPGA board show that the security monitors themselves are successful in preventing unauthorized accesses from IPs that are marked as “untrusted” while allowing full access from other IPs that are marked as “trusted”, without incurring on a serious area or latency penalty. Also, by preventing the access from “untrusted” IPs and marking connections as “not traversable”, the connections between the untrusted IPs and the memory that it has to share with “trusted” IPs are secured.
最先进的fpga正在迅速发展成为一个完整的片上系统(SoC)平台,该平台集成了高性能硬处理器核心、千兆字节的专用内存块和许多常用外设。随着fpga越来越多地进入许多关键和敏感的应用,包括加速加密算法,对其自身的安全担忧开始增加。目前的对策主要针对硬件木马、克隆、侧信道攻击和逆向工程。很少有人注意保护专用的片上存储块。此外,fpga的动态可重构特性使得静态方法的有效性和效率较低。在本文中,我们提出了一个FPGA片上存储块的运行时保护方案的设计和实现。为了确保fpga内部的片上存储器,由于其非常低的延迟和简单的平面存储器模型,必须仔细选择设计。制定了一系列规则,称为安全策略。这些策略由参考监控器执行,该监控器协调需要内存的知识产权(IP)或模块与内存本身之间的通信。内存安全方案是一个安全内核的实现,通过一系列安全策略强制执行,并使用特定的策略算法告诉四个安全监视器控制ip之间的内存访问和所使用的FPGA内部的片上内存。在Xilinx Virtex-6 FPGA板上的结果表明,安全监视器本身成功地阻止了标记为“不受信任”的ip的未经授权访问,同时允许标记为“受信任”的其他ip的完全访问,而不会导致严重的区域或延迟损失。此外,通过阻止来自“不可信”ip的访问并将连接标记为“不可遍历”,不可信ip与它必须与“可信”ip共享的内存之间的连接是安全的。
{"title":"A separation and protection scheme for on-chip memory blocks in FPGAs","authors":"Luis Ramirez Rivera, Xiaofang Wang, D. Chasaki","doi":"10.1109/HST.2016.7495586","DOIUrl":"https://doi.org/10.1109/HST.2016.7495586","url":null,"abstract":"State-of-the-art FPGAs are quickly evolving into a complete system-on-chip (SoC) platform with aggressive integration of high-performance hard processor cores, gigabytes of dedicated memory blocks, and many commonly used peripherals. As FPGAs increasingly find their way into many critical and sensitive applications, including speeding cryptographic algorithms, security concerns about themselves start mounting. Current countermeasures mostly target hardware trojans, cloning, side-channel attacks, and reverse engineering. Little attention has been devoted to securing dedicated on-chip memory blocks. Moreover, the dynamic reconfigurability nature of FPGAs makes static-only approaches less effective and less efficient. In this paper, we present the design and implementation of a runtime protection scheme for FPGA on-chip memory blocks. To secure on-chip memory inside FPGAs, careful design choices must be taken because of their very low latency and simple flat memory model. A series of rules, called security policies are made. These policies are enforced by a reference monitor who mediates the communications between the intellectual properties (IP) or modules that requires the memory, and the memory itself. The memory security scheme is an implementation of a security kernel, enforced by a series of security policies, with a specific policy algorithm which tells four security monitors to control the memory accesses between IPs and the on-chip memory inside the FPGA used. The results on a Xilinx Virtex-6 FPGA board show that the security monitors themselves are successful in preventing unauthorized accesses from IPs that are marked as “untrusted” while allowing full access from other IPs that are marked as “trusted”, without incurring on a serious area or latency penalty. Also, by preventing the access from “untrusted” IPs and marking connections as “not traversable”, the connections between the untrusted IPs and the memory that it has to share with “trusted” IPs are secured.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123050940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Functional polymorphism for intellectual property protection 知识产权保护的功能多态性
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495557
J. McDonald, Yong C. Kim, T. Andel, M. A. Forbes, J. McVicar
Polymorphic gates and circuits have been used in the past to design evolutionary components that can sense the environment. In general, polymorphic gates can change their function based on environmental properties such as temperature and power. In the modern digital logic threat landscape, adversarial reverse engineering and illegal cloning pose two risks for hardware-based applications with embedded intellectual property (IP). In this paper, we implement the concept of functional polymorphism at the design level using realized polygates and consider its application for IP protection in specific digital supply chain settings. We introduce a transformation algorithm for general circuits that utilize polygates to produce variants of a target circuit or component. We provide results of a case study analysis on traditional combinational benchmark circuits and components that illustrates efficacy of the approach for circuit watermarking and the ability to defeat adversarial reverse engineering as part of the supply chain lifecycle.
在过去,多态门和电路已经被用来设计能够感知环境的进化组件。一般来说,多态门可以根据温度和功率等环境特性改变其功能。在现代数字逻辑威胁环境中,对抗性逆向工程和非法克隆给嵌入式知识产权(IP)硬件应用带来了两大风险。在本文中,我们使用已实现的多栅极在设计层面实现了功能多态性的概念,并考虑了其在特定数字供应链设置中的知识产权保护应用。我们介绍了一种通用电路的转换算法,该算法利用多栅极来产生目标电路或元件的变体。我们提供了传统组合基准电路和组件的案例研究分析结果,说明了电路水印方法的有效性以及作为供应链生命周期的一部分击败对抗性逆向工程的能力。
{"title":"Functional polymorphism for intellectual property protection","authors":"J. McDonald, Yong C. Kim, T. Andel, M. A. Forbes, J. McVicar","doi":"10.1109/HST.2016.7495557","DOIUrl":"https://doi.org/10.1109/HST.2016.7495557","url":null,"abstract":"Polymorphic gates and circuits have been used in the past to design evolutionary components that can sense the environment. In general, polymorphic gates can change their function based on environmental properties such as temperature and power. In the modern digital logic threat landscape, adversarial reverse engineering and illegal cloning pose two risks for hardware-based applications with embedded intellectual property (IP). In this paper, we implement the concept of functional polymorphism at the design level using realized polygates and consider its application for IP protection in specific digital supply chain settings. We introduce a transformation algorithm for general circuits that utilize polygates to produce variants of a target circuit or component. We provide results of a case study analysis on traditional combinational benchmark circuits and components that illustrates efficacy of the approach for circuit watermarking and the ability to defeat adversarial reverse engineering as part of the supply chain lifecycle.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121384396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hardware security risk assessment: A case study 硬件安全风险评估:一个案例研究
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495579
Brent Sherman, David M. Wheeler
The security demands on development teams are growing in direct proportion to the security incidents discovered and leveraged in computer crime and cyber warfare every day. There is ongoing research to increase the effectiveness of security defect detection and penetration testing of products, but where the literature is thin, is in actual case studies that apply security assurance processes in a large-scale hardware-centric environment. This paper adds to the literature by providing an actual case study of hardware security assurance practices using a sample size of 151 projects. Furthermore, it documents and analyzes the efficacy of deploying selective automation using quantitative weighted risk ratings of the Security Development Lifecycle (SDL) to hardware projects, including strategic reuse of existing SDL collaterals for derivative projects. The evaluated methodology provided acceptable accuracy and labor savings, but the results indicate that automation focusing on assignment of a quantitative risk scoring introduces a dilution of real security concerns; instead, an approach using qualitative analysis and assignment of security assurance tasks is more beneficial.
对开发团队的安全需求与每天在计算机犯罪和网络战争中发现和利用的安全事件成正比。目前正在进行研究,以提高产品的安全缺陷检测和渗透测试的有效性,但是在文献较少的地方,是在大规模以硬件为中心的环境中应用安全保证过程的实际案例研究中。本文通过使用151个项目的样本大小提供硬件安全保证实践的实际案例研究来补充文献。此外,它记录并分析了使用安全开发生命周期(SDL)的定量加权风险评级对硬件项目部署选择性自动化的有效性,包括对衍生项目的现有SDL抵押品的战略性重用。评估的方法提供了可接受的准确性和劳动力节约,但是结果表明,专注于定量风险评分分配的自动化引入了对实际安全问题的稀释;相反,使用定性分析和安全保证任务分配的方法更有益。
{"title":"Hardware security risk assessment: A case study","authors":"Brent Sherman, David M. Wheeler","doi":"10.1109/HST.2016.7495579","DOIUrl":"https://doi.org/10.1109/HST.2016.7495579","url":null,"abstract":"The security demands on development teams are growing in direct proportion to the security incidents discovered and leveraged in computer crime and cyber warfare every day. There is ongoing research to increase the effectiveness of security defect detection and penetration testing of products, but where the literature is thin, is in actual case studies that apply security assurance processes in a large-scale hardware-centric environment. This paper adds to the literature by providing an actual case study of hardware security assurance practices using a sample size of 151 projects. Furthermore, it documents and analyzes the efficacy of deploying selective automation using quantitative weighted risk ratings of the Security Development Lifecycle (SDL) to hardware projects, including strategic reuse of existing SDL collaterals for derivative projects. The evaluated methodology provided acceptable accuracy and labor savings, but the results indicate that automation focusing on assignment of a quantitative risk scoring introduces a dilution of real security concerns; instead, an approach using qualitative analysis and assignment of security assurance tasks is more beneficial.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115631729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys 一种新的安全技术,生成真正随机和高可靠的可重构的基于ropuf的加密密钥
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495580
Fathi H. Amsaad, Atul Prasad Deb Nath, C. Roychaudhuri, M. Niamat
Silicon Physically Unclonable Functions (SPUFs) are delay based PUFs that exploit stochastic manufacturing process variations of Integrated Circuits (ICs) on silicon chips to construct unclonable cryptographic secret keys which are unique for each chip. One variant of SPUFs, named Ring Oscillator (RO) PUFs, is typically used for the authentication of silicon technology devices including FPGA chips. Prior research on the area of ROPUF shows that RO frequencies are affected by spatial systematic process variations and hence the generated responses are not statistically random. In addition to the negative effects of systematic variations on overall ROPUF performance, reduced randomness in the generated responses can lead to major hardware security threats. In this paper, Logarithmic and absolute Diverseness Technique (LDT), a novel security technique based on base-10 logarithm and square root of RO deviations from the global RO mean, is proposed to nullify the effects of spatial systematic variation on the response bits of a unique reconfigurable ROPUF design (r-ROPUF) and improve the reliability of the structure. The proposed technique is implemented on the data obtained from 30 Spartan 3E FPGA chips. IBM-SPSS statistical software is used to demonstrate the transformation of RO frequencies to statistically normal frequencies with high reliability through the implementation of the proposed technique. Additionally, it is shown via MATLAB simulation that the technique nullifies the effects of spatial systematic variation on the average RO frequencies extracted from four different r-ROPUF structures. Finally, the response bits generated from each r-ROPUF structure successfully passed the entire National Institute of Standards and Technology (NIST) statistical tests for randomness and exhibited true randomness and higher reliability comped to earlier techniques.
硅物理不可克隆函数是一种基于延迟的物理不可克隆函数,它利用硅芯片上集成电路(ic)的随机制造工艺变化来构造每个芯片唯一的不可克隆加密密钥。spuf的一种变体,称为环形振荡器(RO) puf,通常用于包括FPGA芯片在内的硅技术设备的认证。先前对ROPUF面积的研究表明,RO频率受空间系统过程变化的影响,因此产生的响应不是统计随机的。除了系统变化对整体ROPUF性能的负面影响外,生成响应中的随机性降低还可能导致主要的硬件安全威胁。为了消除空间系统变化对可重构ROPUF (r-ROPUF)响应位的影响,提高结构的可靠性,提出了一种基于以10为基数的RO偏离全局均值的对数和平方根的对数绝对分散技术(LDT)。该技术在30个Spartan 3E FPGA芯片上获得的数据上实现。利用IBM-SPSS统计软件演示了通过实施所提出的技术将RO频率转换为具有高可靠性的统计正态频率。此外,通过MATLAB仿真表明,该技术消除了空间系统变化对从四种不同r-ROPUF结构中提取的平均RO频率的影响。最后,每个r-ROPUF结构生成的响应位成功地通过了整个美国国家标准与技术研究所(NIST)的随机性统计测试,与早期的技术相比,显示出真正的随机性和更高的可靠性。
{"title":"A novel security technique to generate truly random and highly reliable reconfigurable ROPUF-based cryptographic keys","authors":"Fathi H. Amsaad, Atul Prasad Deb Nath, C. Roychaudhuri, M. Niamat","doi":"10.1109/HST.2016.7495580","DOIUrl":"https://doi.org/10.1109/HST.2016.7495580","url":null,"abstract":"Silicon Physically Unclonable Functions (SPUFs) are delay based PUFs that exploit stochastic manufacturing process variations of Integrated Circuits (ICs) on silicon chips to construct unclonable cryptographic secret keys which are unique for each chip. One variant of SPUFs, named Ring Oscillator (RO) PUFs, is typically used for the authentication of silicon technology devices including FPGA chips. Prior research on the area of ROPUF shows that RO frequencies are affected by spatial systematic process variations and hence the generated responses are not statistically random. In addition to the negative effects of systematic variations on overall ROPUF performance, reduced randomness in the generated responses can lead to major hardware security threats. In this paper, Logarithmic and absolute Diverseness Technique (LDT), a novel security technique based on base-10 logarithm and square root of RO deviations from the global RO mean, is proposed to nullify the effects of spatial systematic variation on the response bits of a unique reconfigurable ROPUF design (r-ROPUF) and improve the reliability of the structure. The proposed technique is implemented on the data obtained from 30 Spartan 3E FPGA chips. IBM-SPSS statistical software is used to demonstrate the transformation of RO frequencies to statistically normal frequencies with high reliability through the implementation of the proposed technique. Additionally, it is shown via MATLAB simulation that the technique nullifies the effects of spatial systematic variation on the average RO frequencies extracted from four different r-ROPUF structures. Finally, the response bits generated from each r-ROPUF structure successfully passed the entire National Institute of Standards and Technology (NIST) statistical tests for randomness and exhibited true randomness and higher reliability comped to earlier techniques.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127515137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The other side of the coin: Analyzing software encoding schemes against fault injection attacks 硬币的另一面:分析针对错误注入攻击的软件编码方案
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495584
J. Breier, Dirmanto Jap, S. Bhasin
The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA counter-measure with an exploitable fault probability as low as 0.0048.
嵌入式系统的多功能性和成本使得它无处不在。如此广泛的应用使嵌入式系统暴露在各种物理威胁之下,如侧信道攻击(SCA)和故障攻击(FA)。最近,提出了一些软件编码方案来防止SCA。这些保护方案是基于双轨预充逻辑(DPL),以前显示抗SCA和FA。在本文中,我们分析了以前提出的针对FA的软件编码方案。我们的研究结果表明,软件编码只提供有限的抗FA。最后,对软件编码方案进行了改进。通过这种改进,软件编码可以作为常见的SCA和FA对策,可利用的故障概率低至0.0048。
{"title":"The other side of the coin: Analyzing software encoding schemes against fault injection attacks","authors":"J. Breier, Dirmanto Jap, S. Bhasin","doi":"10.1109/HST.2016.7495584","DOIUrl":"https://doi.org/10.1109/HST.2016.7495584","url":null,"abstract":"The versatility and cost of embedded systems have made it ubiquitous. Such wide-application exposes an embedded system to a variety of physical threats like side-channel attacks (SCA) and fault attacks (FA). Recently, a couple of software encoding schemes were proposed as a protection against SCA. These protection schemes are based on dual-rail precharge logic (DPL), previously shown resistant to both SCA and FA. In this paper, we analyze the previously proposed software encoding schemes against FA. Our results show that software encoding offers only limited resistance to FA. Finally, improvement to software-encoding schemes is improved. With this improvement, software encoding can serve as a common SCA and FA counter-measure with an exploitable fault probability as low as 0.0048.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
CryptoML: Secure outsourcing of big data machine learning applications CryptoML:大数据机器学习应用的安全外包
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495574
Azalia Mirhoseini, A. Sadeghi, F. Koushanfar
We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir's secret sharing. The protocol is customized for our new sketching technique to maximize the client's resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.
我们提出了CryptoML,这是第一个实用的框架,用于在大量数据集上广泛的当代基于矩阵的机器学习(ML)应用程序的安全高效授权。在CryptoML中,具有内存和计算资源约束的委托客户机希望将存储和ml相关的计算分配给云服务器,同时保留其数据的隐私性。我们首先提出了委托性能成本的主要组成部分,并创建了一个矩阵草图技术,旨在通过数据预处理使成本最小化。然后,我们提出了一种新的基于可证明安全的Shamir秘密共享的交互式授权协议。该协议是为我们的新素描技术定制的,以最大限度地提高客户的资源效率。CryptoML在安全委托的效率和ML任务的准确性之间进行了新的权衡。概念验证评估证实了CryptoML对具有数十亿条非零记录的数据集的适用性。
{"title":"CryptoML: Secure outsourcing of big data machine learning applications","authors":"Azalia Mirhoseini, A. Sadeghi, F. Koushanfar","doi":"10.1109/HST.2016.7495574","DOIUrl":"https://doi.org/10.1109/HST.2016.7495574","url":null,"abstract":"We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir's secret sharing. The protocol is customized for our new sketching technique to maximize the client's resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124601737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A layout-driven framework to assess vulnerability of ICs to microprobing attacks 一个布局驱动的框架来评估ic对微探测攻击的脆弱性
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495575
Qihang Shi, N. Asadizanjani, Domenic Forte, M. Tehranipoor
Microprobing attacks against integrated circuits (IC) for security critical applications have become a serious concern. With the help of modern circuit editing techniques, an attacker could remove layers of materials and expose wires carrying security critical information for probing. Existing protection methods use active shielding to detect such attacks. However, this technique has been proven to be ineffective, while layers of trigger wire mesh introduce prohibitive cost overhead. In this paper, we investigate the problem of protection against microprobing attacks and present a method to scan layout for microprobing vulnerabilities so that more secure and less costly protections can be developed. Exemplary applications on OpenSPARC T1 core layout is used to evaluate the proposed flow and substantiate findings.
针对集成电路(IC)安全关键应用的微探测攻击已经成为一个严重的问题。在现代电路编辑技术的帮助下,攻击者可以移除材料层并暴露携带安全关键信息的电线以进行探测。现有的保护方法使用主动屏蔽来检测此类攻击。然而,这种技术已被证明是无效的,而触发钢丝网层引入了令人望而却步的成本开销。本文研究了针对微探测攻击的防护问题,并提出了一种扫描布局中的微探测漏洞的方法,以便开发更安全、成本更低的防护措施。使用OpenSPARC T1核心布局的示例应用程序来评估所提出的流程并证实发现。
{"title":"A layout-driven framework to assess vulnerability of ICs to microprobing attacks","authors":"Qihang Shi, N. Asadizanjani, Domenic Forte, M. Tehranipoor","doi":"10.1109/HST.2016.7495575","DOIUrl":"https://doi.org/10.1109/HST.2016.7495575","url":null,"abstract":"Microprobing attacks against integrated circuits (IC) for security critical applications have become a serious concern. With the help of modern circuit editing techniques, an attacker could remove layers of materials and expose wires carrying security critical information for probing. Existing protection methods use active shielding to detect such attacks. However, this technique has been proven to be ineffective, while layers of trigger wire mesh introduce prohibitive cost overhead. In this paper, we investigate the problem of protection against microprobing attacks and present a method to scan layout for microprobing vulnerabilities so that more secure and less costly protections can be developed. Exemplary applications on OpenSPARC T1 core layout is used to evaluate the proposed flow and substantiate findings.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129576136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
期刊
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1