首页 > 最新文献

2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
The Conjoined Microprocessor 连体微处理器
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495558
Ehsan Aerabi, A. E. Amirouche, Houda Ferradi, R. Géraud, D. Naccache, J. Vuillemin
Over the last twenty years, the research community has devised sophisticated methods for retrieving secret information from side-channel emanations, and for resisting such attacks. This paper introduces a new CPU architecture called the Conjoined Microprocessor (CμP). The CμP can randomly interleave the execution of two programs at very low extra hardware cost. We developed for the CμP a preprocessor tool that turns a target algorithm into two (or more) separate queues like Q0 and Q1 that can run in alternation. Q0 and Q1 fulfill the same operation as the original target algorithm. Power-analysis resistance is achieved by randomly alternating the execution of Q0 and Q1, with different runs resulting in different interleavings. Experiments reveal that this architecture is indeed effective against CPA.
在过去的二十年里,研究界已经设计出复杂的方法来从侧信道发射中检索秘密信息,并抵抗这种攻击。本文介绍了一种新的CPU体系结构,称为连体微处理器(CμP)。CμP可以以非常低的额外硬件成本随机地交错执行两个程序。我们为CμP开发了一个预处理器工具,它可以将目标算法转换为两个(或更多)独立的队列,如Q0和Q1,可以交替运行。Q0和Q1完成与原目标算法相同的操作。功率分析电阻是通过随机交替执行Q0和Q1来实现的,不同的运行导致不同的交错。实验结果表明,该结构对CPA攻击是有效的。
{"title":"The Conjoined Microprocessor","authors":"Ehsan Aerabi, A. E. Amirouche, Houda Ferradi, R. Géraud, D. Naccache, J. Vuillemin","doi":"10.1109/HST.2016.7495558","DOIUrl":"https://doi.org/10.1109/HST.2016.7495558","url":null,"abstract":"Over the last twenty years, the research community has devised sophisticated methods for retrieving secret information from side-channel emanations, and for resisting such attacks. This paper introduces a new CPU architecture called the Conjoined Microprocessor (CμP). The CμP can randomly interleave the execution of two programs at very low extra hardware cost. We developed for the CμP a preprocessor tool that turns a target algorithm into two (or more) separate queues like Q0 and Q1 that can run in alternation. Q0 and Q1 fulfill the same operation as the original target algorithm. Power-analysis resistance is achieved by randomly alternating the execution of Q0 and Q1, with different runs resulting in different interleavings. Experiments reveal that this architecture is indeed effective against CPA.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130640198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine learning resistant strong PUF: Possible or a pipe dream?
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495550
Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado, S. Kundu
Physically unclonable functions (PUFs) are emerging as hardware primitives for key-generation and light-weight authentication. Strong PUFs represent a variant of PUFs which respond to a user challenge with a response determined by its unique manufacturing process variations. Unfortunately many of the Strong PUFs have been shown to be vulnerable to model building attacks when an attacker has access to challenge and response pairs. In mounting a model building attack, typically machine learning is used to build a software model to forge the PUF. Researchers have long been interested in designing Strong PUFs that are resistant to model building attacks. However, with innovations in application of machine learning, nearly all Strong PUFs presented in the literature have been broken. In this paper, first we present results from a set of experiments designed to show that if certain randomness properties can be met, cascaded structure based Strong PUFs can indeed be made machine learning (ML) attack resistant against known ML attacks. Next we conduct machine learning experiments on an abstract PUF model using Support Vector Machines, Logistic Regression, Bagging, Boosting and Evolutionary techniques to establish criteria for machine learning resistant Strong PUF design. This paper does not suggest how to harvest the process variation, which remains within the purview of a circuit designer; rather it suggests what properties of the building blocks to aim for towards building a machine learning resistant Strong PUF - thus paving the path for a systematic design approach.
物理不可克隆函数(puf)正在成为密钥生成和轻量级身份验证的硬件原语。强puf代表puf的一种变体,它响应用户的挑战,响应由其独特的制造工艺变化决定。不幸的是,当攻击者可以访问挑战和响应对时,许多强puf很容易受到模型构建攻击。在进行模型构建攻击时,通常使用机器学习来构建软件模型来伪造PUF。长期以来,研究人员一直对设计能够抵抗模型构建攻击的强大puf感兴趣。然而,随着机器学习应用的创新,几乎所有文献中提出的Strong puf都被打破了。在本文中,我们首先展示了一组实验的结果,这些实验旨在表明,如果可以满足某些随机性属性,那么基于级联结构的强puf确实可以使机器学习(ML)攻击抵抗已知的ML攻击。接下来,我们使用支持向量机,逻辑回归,Bagging, Boosting和进化技术对抽象PUF模型进行机器学习实验,以建立抗机器学习的强PUF设计标准。本文不建议如何收获过程变化,这仍然是电路设计师的职权范围内;相反,它提出了构建块的哪些属性可以用于构建抗机器学习的强PUF——从而为系统设计方法铺平了道路。
{"title":"Machine learning resistant strong PUF: Possible or a pipe dream?","authors":"Arunkumar Vijayakumar, Vinay C. Patil, Charles B. Prado, S. Kundu","doi":"10.1109/HST.2016.7495550","DOIUrl":"https://doi.org/10.1109/HST.2016.7495550","url":null,"abstract":"Physically unclonable functions (PUFs) are emerging as hardware primitives for key-generation and light-weight authentication. Strong PUFs represent a variant of PUFs which respond to a user challenge with a response determined by its unique manufacturing process variations. Unfortunately many of the Strong PUFs have been shown to be vulnerable to model building attacks when an attacker has access to challenge and response pairs. In mounting a model building attack, typically machine learning is used to build a software model to forge the PUF. Researchers have long been interested in designing Strong PUFs that are resistant to model building attacks. However, with innovations in application of machine learning, nearly all Strong PUFs presented in the literature have been broken. In this paper, first we present results from a set of experiments designed to show that if certain randomness properties can be met, cascaded structure based Strong PUFs can indeed be made machine learning (ML) attack resistant against known ML attacks. Next we conduct machine learning experiments on an abstract PUF model using Support Vector Machines, Logistic Regression, Bagging, Boosting and Evolutionary techniques to establish criteria for machine learning resistant Strong PUF design. This paper does not suggest how to harvest the process variation, which remains within the purview of a circuit designer; rather it suggests what properties of the building blocks to aim for towards building a machine learning resistant Strong PUF - thus paving the path for a systematic design approach.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126650969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
Granularity and detection capability of an adaptive embedded Hardware Trojan detection system 一种自适应嵌入式硬件木马检测系统的粒度和检测能力
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495571
Maxime Lecomte, J. Fournier, P. Maurine
With the outsourcing of the integrated circuit (IC) manufacturing, embedded systems faces threats as Hardware Trojan. This paper presents a characterization of a Hardware Trojan detection method introduced in a former work. In this work, a network of sensors is uniformly spread over the IC surface to monitor locally the inner supply voltage. By conducting an analysis by lot, the authors are able to get rid of the main problem of Hardware Trojan detection: the effect of intra-die and inter-die process variations. In this paper, an analysis of the spatial coverage of the method is made experimentally on a set of FPGA boards. From the obtained results, a modification of the used sensor is proposed as well as an adaptive distinguisher which aims at reducing the false positive rate. These two improvements are also experimentally tested and validated with the same set of FPGA boards.
随着集成电路制造业务的外包,嵌入式系统面临着“硬件木马”的威胁。本文介绍了一种硬件木马检测方法的特点。在这项工作中,传感器网络均匀分布在IC表面,以局部监测内部电源电压。通过分组分析,解决了硬件木马检测的主要问题:模内和模间工艺变化的影响。本文在一组FPGA板上对该方法的空间覆盖进行了实验分析。根据得到的结果,提出了一种改进的传感器和一种旨在降低误报率的自适应区分器。这两种改进也在同一组FPGA板上进行了实验测试和验证。
{"title":"Granularity and detection capability of an adaptive embedded Hardware Trojan detection system","authors":"Maxime Lecomte, J. Fournier, P. Maurine","doi":"10.1109/HST.2016.7495571","DOIUrl":"https://doi.org/10.1109/HST.2016.7495571","url":null,"abstract":"With the outsourcing of the integrated circuit (IC) manufacturing, embedded systems faces threats as Hardware Trojan. This paper presents a characterization of a Hardware Trojan detection method introduced in a former work. In this work, a network of sensors is uniformly spread over the IC surface to monitor locally the inner supply voltage. By conducting an analysis by lot, the authors are able to get rid of the main problem of Hardware Trojan detection: the effect of intra-die and inter-die process variations. In this paper, an analysis of the spatial coverage of the method is made experimentally on a set of FPGA boards. From the obtained results, a modification of the used sensor is proposed as well as an adaptive distinguisher which aims at reducing the false positive rate. These two improvements are also experimentally tested and validated with the same set of FPGA boards.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114409111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SARLock: SAT attack resistant logic locking SARLock: SAT抗攻击逻辑锁定
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495588
Muhammad Yasin, Bodhisatwa Mazumdar, J. Rajendran, O. Sinanoglu
Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently presented that breaks all the existing combinational logic locking techniques. In this paper, we develop a lightweight countermeasure against this and other attacks that aim at gradually pruning the key search space. Our proposed logic locking technique, referred to as SARLock, maximizes the required number of distinguishing input patterns to recover the secret key. SARLock thwarts the SAT attack by rendering the attack effort exponential in the number of bits in the secret key, while its overhead grows only linearly.
逻辑锁定是一种知识产权(IP)保护技术,可以阻止IP盗版、硬件木马、逆向工程和IC生产过剩。研究人员已经多次尝试打破逻辑锁定技术并恢复其秘密密钥。最近提出了一种基于布尔可满足性(SAT)的攻击,它打破了所有现有的组合逻辑锁定技术。在本文中,我们开发了一种轻量级的对策来对付这种攻击和其他旨在逐渐修剪关键字搜索空间的攻击。我们提出的逻辑锁定技术(称为SARLock)可以最大化区分输入模式所需的数量,以恢复密钥。SARLock通过将攻击努力呈现为密钥位数的指数级来挫败SAT攻击,而其开销仅呈线性增长。
{"title":"SARLock: SAT attack resistant logic locking","authors":"Muhammad Yasin, Bodhisatwa Mazumdar, J. Rajendran, O. Sinanoglu","doi":"10.1109/HST.2016.7495588","DOIUrl":"https://doi.org/10.1109/HST.2016.7495588","url":null,"abstract":"Logic locking is an Intellectual Property (IP) protection technique that thwarts IP piracy, hardware Trojans, reverse engineering, and IC overproduction. Researchers have taken multiple attempts in breaking logic locking techniques and recovering its secret key. A Boolean Satisfiability (SAT) based attack has been recently presented that breaks all the existing combinational logic locking techniques. In this paper, we develop a lightweight countermeasure against this and other attacks that aim at gradually pruning the key search space. Our proposed logic locking technique, referred to as SARLock, maximizes the required number of distinguishing input patterns to recover the secret key. SARLock thwarts the SAT attack by rendering the attack effort exponential in the number of bits in the secret key, while its overhead grows only linearly.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 298
Round gating for low energy block ciphers 低能量分组密码的圆形门控
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495556
S. Banik, A. Bogdanov, F. Regazzoni, Takanori Isobe, Harunaga Hiwatari, T. Akishita
Pushed by the pervasive diffusion of devices operated by battery or by the energy harvested, energy has become one of the most important parameter to be optimized for embedded systems. Particularly relevant would be to optimize the energy consumption of security primitives. In this paper we explore design techniques for implementing block ciphers in a low energy fashion. We concentrate on round based implementation and we discuss how gating, applied at round level can affect and improve the energy consumption of the most common lightweight block cipher currently used in the internet of things. Additionally, we discuss how to needed gating wave can be generated. Experimental results show that our technique is able to reduce the energy consumption in most block ciphers by over 60% while incurring only a minimal overhead in hardware.
随着电池供电或能量采集设备的普及,能量已成为嵌入式系统需要优化的最重要参数之一。特别相关的是优化安全原语的能耗。在本文中,我们探讨了以低能量方式实现分组密码的设计技术。我们专注于基于轮的实现,并讨论了在轮级应用的门控如何影响和改善目前在物联网中使用的最常见的轻量级分组密码的能耗。此外,我们还讨论了如何产生所需的门控波。实验结果表明,我们的技术能够将大多数分组密码的能耗降低60%以上,同时只产生最小的硬件开销。
{"title":"Round gating for low energy block ciphers","authors":"S. Banik, A. Bogdanov, F. Regazzoni, Takanori Isobe, Harunaga Hiwatari, T. Akishita","doi":"10.1109/HST.2016.7495556","DOIUrl":"https://doi.org/10.1109/HST.2016.7495556","url":null,"abstract":"Pushed by the pervasive diffusion of devices operated by battery or by the energy harvested, energy has become one of the most important parameter to be optimized for embedded systems. Particularly relevant would be to optimize the energy consumption of security primitives. In this paper we explore design techniques for implementing block ciphers in a low energy fashion. We concentrate on round based implementation and we discuss how gating, applied at round level can affect and improve the energy consumption of the most common lightweight block cipher currently used in the internet of things. Additionally, we discuss how to needed gating wave can be generated. Experimental results show that our technique is able to reduce the energy consumption in most block ciphers by over 60% while incurring only a minimal overhead in hardware.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117296118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Information leakage behind the curtain: Abusing anti-EMI features for covert communication 幕后信息泄露:滥用防电磁干扰特性进行隐蔽通信
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495570
Johannes Bauer, Sebastian Schinzel, F. Freiling, Andreas Dewald
We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire bound connections of the compromised device, but is also by definition present in the vicinity of the device and can be picked up by radio equipment. As the covert channel is present only on the physical layer, the data on all layers above, as well as the timing behavior on those layers is indistinguishable from uncompromised devices.
我们提出了一类新的隐蔽信道,它可以利用普通硬件创建,但不能被检测到。我们的想法是滥用处理器的抗emi特性,在物理层上创建隐蔽通道。因此,发送方在如何通过模拟信道对数字信号进行编码时使用不变量来隐蔽地传输信息。这些泄露的数据存在于受损设备的电线绑定连接上,但根据定义,也存在于设备附近,可以被无线电设备拾取。由于隐蔽信道仅存在于物理层,因此上述所有层上的数据以及这些层上的定时行为与未受损害的设备无法区分。
{"title":"Information leakage behind the curtain: Abusing anti-EMI features for covert communication","authors":"Johannes Bauer, Sebastian Schinzel, F. Freiling, Andreas Dewald","doi":"10.1109/HST.2016.7495570","DOIUrl":"https://doi.org/10.1109/HST.2016.7495570","url":null,"abstract":"We present a new class of covert channels which can be created by utilizing common hardware but that cannot be detected by such. Our idea is to abuse anti-EMI features of a processor to create a covert channel on the physical layer. Thus, the sender uses the invariants in how digital signals are encoded over analog channels to covertly transport information. This leaked data is present on the wire bound connections of the compromised device, but is also by definition present in the vicinity of the device and can be picked up by radio equipment. As the covert channel is present only on the physical layer, the data on all layers above, as well as the timing behavior on those layers is indistinguishable from uncompromised devices.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129062341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electronic forensic techniques for manufacturer attribution 制造商归属的电子取证技术
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495572
Ryan L. Helinski, E. I. Cole, G. Robertson, Jonathan Woodbridge, L. Pierson
The microelectronics industry seeks screening tools that can be used to verify the origin of and track integrated circuits (ICs) throughout their lifecycle. Embedded circuits that measure process variation of an IC are well known. This paper adds to previous work using these circuits for studying manufacturer characteristics on final product ICs, particularly for the purpose of developing and verifying a signature for a microelectronics manufacturing facility (fab). We present the design, measurements and analysis of 159 silicon ICs which were built as a proof of concept for this purpose. 80 copies of our proof of concept IC were built at one fab, and 80 more copies were built across two lots at a second fab. Using these ICs, our prototype circuits allowed us to distinguish these two fabs with up to 98.7% accuracy and also distinguish the two lots from the second fab with up to 98.8% accuracy.
微电子行业寻求筛选工具,可用于验证集成电路(ic)的起源和跟踪其整个生命周期。测量集成电路过程变化的嵌入式电路是众所周知的。本文补充了先前使用这些电路研究最终产品ic上制造商特征的工作,特别是用于开发和验证微电子制造设施(fab)的签名。我们介绍了159个硅集成电路的设计,测量和分析,这些集成电路是为此目的构建的概念验证。我们的概念验证IC在一个晶圆厂制造了80个副本,在第二个晶圆厂的两个批次中制造了80多个副本。使用这些ic,我们的原型电路使我们能够以高达98.7%的准确度区分这两个晶圆厂,并以高达98.8%的准确度区分第二个晶圆厂的两个批次。
{"title":"Electronic forensic techniques for manufacturer attribution","authors":"Ryan L. Helinski, E. I. Cole, G. Robertson, Jonathan Woodbridge, L. Pierson","doi":"10.1109/HST.2016.7495572","DOIUrl":"https://doi.org/10.1109/HST.2016.7495572","url":null,"abstract":"The microelectronics industry seeks screening tools that can be used to verify the origin of and track integrated circuits (ICs) throughout their lifecycle. Embedded circuits that measure process variation of an IC are well known. This paper adds to previous work using these circuits for studying manufacturer characteristics on final product ICs, particularly for the purpose of developing and verifying a signature for a microelectronics manufacturing facility (fab). We present the design, measurements and analysis of 159 silicon ICs which were built as a proof of concept for this purpose. 80 copies of our proof of concept IC were built at one fab, and 80 more copies were built across two lots at a second fab. Using these ICs, our prototype circuits allowed us to distinguish these two fabs with up to 98.7% accuracy and also distinguish the two lots from the second fab with up to 98.8% accuracy.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Functional block identification in circuit design recovery 电路设计复原中的功能块识别
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495560
Jacob Couch, Elizabeth Reilly, Morgan Schuyler, Bradley Barrett
Design recovery is commonly conducted across many different platforms to gain knowledge about the underlying internals of a system. In this paper, a concept of segmentation and fuzzy matching is introduced to identify IP blocks within a design. Through this process, known IP blocks, especially in optimized ASIC and FPGA designs, can be identified within a netlist. Furthermore, these algorithms are computationally more efficient in comparison to the traditional subgraph isomorphism problem.
设计恢复通常在许多不同的平台上进行,以获得有关系统底层内部的知识。本文引入了分割和模糊匹配的概念来识别设计中的IP块。通过这个过程,已知的IP块,特别是在优化的ASIC和FPGA设计中,可以在一个网络列表中识别。此外,与传统的子图同构问题相比,这些算法的计算效率更高。
{"title":"Functional block identification in circuit design recovery","authors":"Jacob Couch, Elizabeth Reilly, Morgan Schuyler, Bradley Barrett","doi":"10.1109/HST.2016.7495560","DOIUrl":"https://doi.org/10.1109/HST.2016.7495560","url":null,"abstract":"Design recovery is commonly conducted across many different platforms to gain knowledge about the underlying internals of a system. In this paper, a concept of segmentation and fuzzy matching is introduced to identify IP blocks within a design. Through this process, known IP blocks, especially in optimized ASIC and FPGA designs, can be identified within a netlist. Furthermore, these algorithms are computationally more efficient in comparison to the traditional subgraph isomorphism problem.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A new approach for rowhammer attacks 锤子攻击的新方法
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495576
Rui Qiao, Mark Seaborn
Rowhammer is a hardware bug identified in recent commodity DRAMs: repeated row activations can cause bit flips in adjacent rows. Rowhammer has been recognized as both a reliability and security issue. And it is a classic example that layered abstractions and trust (in this case, virtual memory) can be broken from hardware level. Previous rowhammer attacks either rely on rarely used special instructions or complicated memory access patterns. In this paper, we propose a new approach for rowhammer that is based on x86 non-temporal instructions. This approach bypasses existing rowhammer defense and is much less constrained for a more challenging task: remote rowhammer attacks, i.e., triggering rowhammer with existing, benign code. Moreover, we extend our approach and identify libc memset and memcpy functions as a new rowhammer primitive. Our discussions on rowhammer protection suggest that it is critical to understand this new threat to be able to defend in depth.
Rowhammer是在最近的商品dram中发现的一个硬件错误:重复的行激活可能导致相邻行的位翻转。Rowhammer被认为是一个可靠性和安全性问题。分层抽象和信任(在本例中是虚拟内存)可以从硬件级别分解,这是一个经典的例子。以前的滚锤攻击要么依赖于很少使用的特殊指令,要么依赖于复杂的内存访问模式。在本文中,我们提出了一种基于x86非时序指令的rowhammer新方法。这种方法绕过了现有的rowhammer防御,并且对于更具挑战性的任务(远程rowhammer攻击,即用现有的良性代码触发rowhammer)的约束要小得多。此外,我们扩展了我们的方法,并将libc memset和memcpy函数标识为一个新的rowhammer原语。我们对铲车保护的讨论表明,了解这种新的威胁是至关重要的,以便能够深入防御。
{"title":"A new approach for rowhammer attacks","authors":"Rui Qiao, Mark Seaborn","doi":"10.1109/HST.2016.7495576","DOIUrl":"https://doi.org/10.1109/HST.2016.7495576","url":null,"abstract":"Rowhammer is a hardware bug identified in recent commodity DRAMs: repeated row activations can cause bit flips in adjacent rows. Rowhammer has been recognized as both a reliability and security issue. And it is a classic example that layered abstractions and trust (in this case, virtual memory) can be broken from hardware level. Previous rowhammer attacks either rely on rarely used special instructions or complicated memory access patterns. In this paper, we propose a new approach for rowhammer that is based on x86 non-temporal instructions. This approach bypasses existing rowhammer defense and is much less constrained for a more challenging task: remote rowhammer attacks, i.e., triggering rowhammer with existing, benign code. Moreover, we extend our approach and identify libc memset and memcpy functions as a new rowhammer primitive. Our discussions on rowhammer protection suggest that it is critical to understand this new threat to be able to defend in depth.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"398 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Low-area hardware implementations of CLOC, SILC and AES-OTR CLOC、SILC和AES-OTR的低域硬件实现
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495559
S. Banik, A. Bogdanov, Kazuhiko Minematsu
The most compact implementation of the AES-128 algorithm was the 8-bit serial circuit proposed in the work of Moradi et. al. (Eurocrypt 2011). The circuit has an 8-bit datapath and occupies area equivalent to around 2400 GE. Since many authenticated encryption modes use the AES-128 algorithm as the underlying block cipher, we investigate if they can be implemented in a compact fashion using the 8-bit serialized AES circuit. In this context we investigate three authenticated encryption modes CLOC, SILC and AES-OTR. Using the standard cell library of the STM 90nm process, we implemented CLOC and SILC with around 3110 GE whereas AES-OTR was implemented with around 4720 GE.
AES-128算法最紧凑的实现是Moradi等人(Eurocrypt 2011)提出的8位串行电路。该电路有一个8位的数据通路,占用的面积相当于大约2400千兆字节。由于许多经过身份验证的加密模式使用AES-128算法作为底层分组密码,因此我们研究它们是否可以使用8位串行AES电路以紧凑的方式实现。在此背景下,我们研究了三种身份验证加密模式CLOC, SILC和AES-OTR。使用STM 90nm工艺的标准细胞库,我们在大约3110 GE的情况下实现了CLOC和SILC,而AES-OTR在大约4720 GE的情况下实现了。
{"title":"Low-area hardware implementations of CLOC, SILC and AES-OTR","authors":"S. Banik, A. Bogdanov, Kazuhiko Minematsu","doi":"10.1109/HST.2016.7495559","DOIUrl":"https://doi.org/10.1109/HST.2016.7495559","url":null,"abstract":"The most compact implementation of the AES-128 algorithm was the 8-bit serial circuit proposed in the work of Moradi et. al. (Eurocrypt 2011). The circuit has an 8-bit datapath and occupies area equivalent to around 2400 GE. Since many authenticated encryption modes use the AES-128 algorithm as the underlying block cipher, we investigate if they can be implemented in a compact fashion using the 8-bit serialized AES circuit. In this context we investigate three authenticated encryption modes CLOC, SILC and AES-OTR. Using the standard cell library of the STM 90nm process, we implemented CLOC and SILC with around 3110 GE whereas AES-OTR was implemented with around 4720 GE.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115740008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1