首页 > 最新文献

2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
Scalable SoC trust verification using integrated theorem proving and model checking 使用集成定理证明和模型检查的可扩展SoC信任验证
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495569
Xiaolong Guo, R. Dutta, P. Mishra, Yier Jin
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted vendors have raised security concerns for system designers. Existing solutions for detecting and preventing software attacks do not usually consider the presence of malicious logic in hardware. Similarly, hardware solutions for detecting Trojans and/or design backdoors do not consider the software running on it. Formal methods provide powerful solutions in detecting malicious behaviors in both hardware and software. However, they suffer from scalability issues and cannot be easily used for large-scale computer systems. To alleviate the scalability challenge, we propose a new integrated formal verification framework to evaluate the trust of computer systems constructed from untrusted third-party software and hardware resources. This framework combines an automated model checker with an interactive theorem prover for proving system-level security properties. We evaluate a vulnerable program executed on a bare metal LEON3 SPARC V8 processor and prove system security with considerable reduction in effort. Our method systematically reduces the effort required for verifying the program running on the System-on-Chip (SoC) compared to traditional interactive theorem proving methods.
硬件知识产权(IP)内核和来自不可信供应商的软件程序的广泛使用引起了系统设计人员的安全关注。现有的检测和防止软件攻击的解决方案通常不会考虑硬件中是否存在恶意逻辑。同样,用于检测木马和/或设计后门的硬件解决方案也不考虑在其上运行的软件。形式化方法为检测硬件和软件中的恶意行为提供了强大的解决方案。然而,它们存在可伸缩性问题,不能很容易地用于大型计算机系统。为了缓解可扩展性的挑战,我们提出了一个新的集成形式验证框架来评估由不受信任的第三方软件和硬件资源构建的计算机系统的信任。该框架将自动模型检查器与用于证明系统级安全属性的交互式定理证明器相结合。我们评估了在裸机LEON3 SPARC V8处理器上执行的一个易受攻击的程序,并以相当少的工作量证明了系统的安全性。与传统的交互式定理证明方法相比,我们的方法系统地减少了验证在片上系统(SoC)上运行的程序所需的工作量。
{"title":"Scalable SoC trust verification using integrated theorem proving and model checking","authors":"Xiaolong Guo, R. Dutta, P. Mishra, Yier Jin","doi":"10.1109/HST.2016.7495569","DOIUrl":"https://doi.org/10.1109/HST.2016.7495569","url":null,"abstract":"The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted vendors have raised security concerns for system designers. Existing solutions for detecting and preventing software attacks do not usually consider the presence of malicious logic in hardware. Similarly, hardware solutions for detecting Trojans and/or design backdoors do not consider the software running on it. Formal methods provide powerful solutions in detecting malicious behaviors in both hardware and software. However, they suffer from scalability issues and cannot be easily used for large-scale computer systems. To alleviate the scalability challenge, we propose a new integrated formal verification framework to evaluate the trust of computer systems constructed from untrusted third-party software and hardware resources. This framework combines an automated model checker with an interactive theorem prover for proving system-level security properties. We evaluate a vulnerable program executed on a bare metal LEON3 SPARC V8 processor and prove system security with considerable reduction in effort. Our method systematically reduces the effort required for verifying the program running on the System-on-Chip (SoC) compared to traditional interactive theorem proving methods.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129230120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation 一个高度可靠和防篡改的RRAM PUF:设计和实验验证
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495549
Rui Liu, Huaqiang Wu, Yachun Pang, H. Qian, Shimeng Yu
This work presents a highly reliable and tamper-resistant design of Physical Unclonable Function (PUF) exploiting Resistive Random Access Memory (RRAM). The RRAM PUF properties such as uniqueness and reliability are experimentally measured on 1 kb HfO2 based RRAM arrays. Firstly, our experimental results show that selection of the split reference and offset of the split sense amplifier (S/A) significantly affect the uniqueness. More dummy cells are able to generate a more accurate split reference, and relaxing transistor's sizes of the split S/A can reduce the offset, thus achieving better uniqueness. The average inter-Hamming distance (HD) of 40 RRAM PUF instances is ~42%. Secondly, we propose using the sum of the read-out currents of multiple RRAM cells for generating one response bit, which statistically minimizes the risk of early retention failure of a single cell. The measurement results show that with 8 cells per bit, 0% intra-HD can maintain more than 50 hours at 150 °C or equivalently 10 years at 69 °C by 1/kT extrapolation. Finally, we propose a layout obfuscation scheme where all the S/A are randomly embedded into the RRAM array to improve the RRAM PUF's resistance against invasive tampering. The RRAM cells are uniformly placed between M4 and M5 across the array. If the adversary attempts to invasively probe the output of the S/A, he has to remove the top-level interconnect and destroy the RRAM cells between the interconnect layers. Therefore, the RRAM PUF has the “self-destructive” feature. The hardware overhead of the proposed design strategies is benchmarked in 64 × 128 RRAM PUF array at 65 nm, while these proposed optimization strategies increase latency, energy and area over a naive implementation, they significantly improve the performance and security.
这项工作提出了一种利用电阻性随机存取存储器(RRAM)的高可靠和抗篡改的物理不可克隆功能(PUF)设计。在1kb HfO2基RRAM阵列上实验测量了RRAM PUF的唯一性和可靠性。首先,我们的实验结果表明,分感放大器(S/A)的分基准和偏置的选择显著影响唯一性。更多的虚拟单元可以产生更精确的分频参考,放宽分频S/ a的晶体管尺寸可以减小偏移量,从而获得更好的唯一性。40个RRAM PUF实例的平均hamming距离(HD)约为42%。其次,我们建议使用多个RRAM单元的读出电流之和来产生一个响应位,这在统计上最大限度地降低了单个单元早期保留失败的风险。测量结果表明,根据1/kT外推法,在每比特8个细胞的情况下,0%的intra-HD可以在150°C下保持50小时以上,或在69°C下保持10年以上。最后,我们提出了一种布局混淆方案,将所有的S/ a随机嵌入到RRAM阵列中,以提高RRAM PUF对侵入性篡改的抵抗力。RRAM单元均匀地放置在整个阵列的M4和M5之间。如果攻击者试图侵入性地探测S/A的输出,他必须移除顶层互连并破坏互连层之间的RRAM单元。因此,RRAM PUF具有“自毁”特性。所提出的设计策略的硬件开销在65nm的64 × 128 RRAM PUF阵列上进行了基准测试,虽然这些优化策略比原始实现增加了延迟,能量和面积,但它们显着提高了性能和安全性。
{"title":"A highly reliable and tamper-resistant RRAM PUF: Design and experimental validation","authors":"Rui Liu, Huaqiang Wu, Yachun Pang, H. Qian, Shimeng Yu","doi":"10.1109/HST.2016.7495549","DOIUrl":"https://doi.org/10.1109/HST.2016.7495549","url":null,"abstract":"This work presents a highly reliable and tamper-resistant design of Physical Unclonable Function (PUF) exploiting Resistive Random Access Memory (RRAM). The RRAM PUF properties such as uniqueness and reliability are experimentally measured on 1 kb HfO2 based RRAM arrays. Firstly, our experimental results show that selection of the split reference and offset of the split sense amplifier (S/A) significantly affect the uniqueness. More dummy cells are able to generate a more accurate split reference, and relaxing transistor's sizes of the split S/A can reduce the offset, thus achieving better uniqueness. The average inter-Hamming distance (HD) of 40 RRAM PUF instances is ~42%. Secondly, we propose using the sum of the read-out currents of multiple RRAM cells for generating one response bit, which statistically minimizes the risk of early retention failure of a single cell. The measurement results show that with 8 cells per bit, 0% intra-HD can maintain more than 50 hours at 150 °C or equivalently 10 years at 69 °C by 1/kT extrapolation. Finally, we propose a layout obfuscation scheme where all the S/A are randomly embedded into the RRAM array to improve the RRAM PUF's resistance against invasive tampering. The RRAM cells are uniformly placed between M4 and M5 across the array. If the adversary attempts to invasively probe the output of the S/A, he has to remove the top-level interconnect and destroy the RRAM cells between the interconnect layers. Therefore, the RRAM PUF has the “self-destructive” feature. The hardware overhead of the proposed design strategies is benchmarked in 64 × 128 RRAM PUF array at 65 nm, while these proposed optimization strategies increase latency, energy and area over a naive implementation, they significantly improve the performance and security.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121497694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Adaptive real-time Trojan detection framework through machine learning 基于机器学习的自适应实时木马检测框架
Pub Date : 2016-05-03 DOI: 10.1109/HST.2016.7495568
A. Kulkarni, Youngok Pino, T. Mohsenin
Hardware Trojans inserted at the time of design or fabrication by untrustworthy design house or foundry, poses important security concerns. With the increase in attacker's resources and capabilities, we can anticipate an unexpected new attack from the attacker at run-time. Therefore, the challenge is not only to reduce hardware overhead of added security feature but also to secure design from new attacks introduced at real-time. In this work, we propose a Real-time Online Learning approach for Securing many-core design. In order to prevent unexpected attacks, many-core provides feed-back to online learning algorithm based on core information and its behavior to incoming data packet. The proposed Online Learning approach updates the model run-time at each data transfer based on feed-back from many-core. For demonstration, Online Machine Learning model is initially trained with two types of (known) attacks and Trojan free router packets and then unexpected attack is introduced later at run-time. The results show that, feedback based Online Machine Learning algorithm has 8% higher overall detection accuracy and an average of 3% higher accuracy for unexpected attacks at each interval of 1000 test records than Supervised Machine Learning algorithms. The proposed feed-back based Trojan detection framework is demonstrated using a custom many-core architecture integrated with “Modified Balanced Winnow” Online Machine Learning algorithm on Xilinx Virtex-7 FPGA. Post place and route implementation results show that, secured many-core architecture requires 4 extra cycles to complete data transfer. The proposed architecture achieves 56% reduction in area and 50% less latency overhead as compared to previous published work [1]. Furthermore, we evaluate our framework for many-core platform by employing seizure detection application as a case study.
硬件木马在设计或制造时由不可靠的设计公司或铸造厂插入,造成了重要的安全问题。随着攻击者资源和能力的增加,我们可以在运行时预测来自攻击者的意外新攻击。因此,我们面临的挑战不仅是减少增加的安全功能的硬件开销,而且还要确保设计免受实时引入的新攻击。在这项工作中,我们提出了一种实时在线学习方法来保护多核设计。为了防止意外攻击,多核根据核心信息及其对传入数据包的行为向在线学习算法提供反馈。提出的在线学习方法在每次数据传输时基于多核反馈更新模型运行时。为了演示,在线机器学习模型最初使用两种类型(已知)攻击和木马免费路由器数据包进行训练,然后在稍后的运行时引入意外攻击。结果表明,基于反馈的在线机器学习算法比监督式机器学习算法在1000个测试记录间隔内的意外攻击的总体检测准确率提高8%,平均准确率提高3%。基于反馈的木马检测框架在Xilinx Virtex-7 FPGA上使用集成了“Modified Balanced Winnow”在线机器学习算法的自定义多核架构进行了演示。Post place和route实现结果表明,安全的多核架构需要额外的4个周期才能完成数据传输。与之前发表的作品[1]相比,所提出的架构实现了56%的面积减少和50%的延迟开销减少。此外,我们通过使用癫痫检测应用程序作为案例研究来评估我们的多核平台框架。
{"title":"Adaptive real-time Trojan detection framework through machine learning","authors":"A. Kulkarni, Youngok Pino, T. Mohsenin","doi":"10.1109/HST.2016.7495568","DOIUrl":"https://doi.org/10.1109/HST.2016.7495568","url":null,"abstract":"Hardware Trojans inserted at the time of design or fabrication by untrustworthy design house or foundry, poses important security concerns. With the increase in attacker's resources and capabilities, we can anticipate an unexpected new attack from the attacker at run-time. Therefore, the challenge is not only to reduce hardware overhead of added security feature but also to secure design from new attacks introduced at real-time. In this work, we propose a Real-time Online Learning approach for Securing many-core design. In order to prevent unexpected attacks, many-core provides feed-back to online learning algorithm based on core information and its behavior to incoming data packet. The proposed Online Learning approach updates the model run-time at each data transfer based on feed-back from many-core. For demonstration, Online Machine Learning model is initially trained with two types of (known) attacks and Trojan free router packets and then unexpected attack is introduced later at run-time. The results show that, feedback based Online Machine Learning algorithm has 8% higher overall detection accuracy and an average of 3% higher accuracy for unexpected attacks at each interval of 1000 test records than Supervised Machine Learning algorithms. The proposed feed-back based Trojan detection framework is demonstrated using a custom many-core architecture integrated with “Modified Balanced Winnow” Online Machine Learning algorithm on Xilinx Virtex-7 FPGA. Post place and route implementation results show that, secured many-core architecture requires 4 extra cycles to complete data transfer. The proposed architecture achieves 56% reduction in area and 50% less latency overhead as compared to previous published work [1]. Furthermore, we evaluate our framework for many-core platform by employing seizure detection application as a case study.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115172460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption engines 集成全数字低差稳压器作为加密引擎中功率攻击的对策
Pub Date : 2016-05-01 DOI: 10.1109/HST.2016.7495573
Arvind Singh, Monodeep Kar, Anand Rajan, V. De, S. Mukhopadhyay
Low-drop-out (LDO) voltage regulator modules are being increasingly integrated in the modern processors for efficient power management. This paper shows that an integrated All-Digital LDO (ADLDO) can also be used as a countermeasure against power measurement based side channel attacks. The current transformation introduced by integrated digital LDOs, coupled with the noise due to quantization and limited sampling rate in the control loop, helps suppress the side channel leakage. The ADLDO-based countermeasure is analyzed considering an Advanced Encryption Standard (AES) engine designed in 130nmCMOS. Correlation power analysis and signal-to-noise ratio of the current waveforms at the input of the ADLDO shows significant improvement in power attack resistance over the AES input current.
低降差(LDO)稳压模块越来越多地集成到现代处理器中,以实现高效的电源管理。本文表明,集成的全数字LDO (ADLDO)也可以用来对抗基于功率测量的侧信道攻击。集成数字ldo引入的电流变换,加上控制回路中量化和有限采样率引起的噪声,有助于抑制侧信道泄漏。考虑到130nmCMOS中设计的高级加密标准(AES)引擎,分析了基于adldo的对抗策略。ADLDO输入端电流波形的相关功率分析和信噪比表明,与AES输入电流相比,ADLDO的抗功率攻击能力有显著提高。
{"title":"Integrated all-digital low-dropout regulator as a countermeasure to power attack in encryption engines","authors":"Arvind Singh, Monodeep Kar, Anand Rajan, V. De, S. Mukhopadhyay","doi":"10.1109/HST.2016.7495573","DOIUrl":"https://doi.org/10.1109/HST.2016.7495573","url":null,"abstract":"Low-drop-out (LDO) voltage regulator modules are being increasingly integrated in the modern processors for efficient power management. This paper shows that an integrated All-Digital LDO (ADLDO) can also be used as a countermeasure against power measurement based side channel attacks. The current transformation introduced by integrated digital LDOs, coupled with the noise due to quantization and limited sampling rate in the control loop, helps suppress the side channel leakage. The ADLDO-based countermeasure is analyzed considering an Advanced Encryption Standard (AES) engine designed in 130nmCMOS. Correlation power analysis and signal-to-noise ratio of the current waveforms at the input of the ADLDO shows significant improvement in power attack resistance over the AES input current.","PeriodicalId":194799,"journal":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125938327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1