首页 > 最新文献

2019 IEEE 4th International Verification and Security Workshop (IVSW)最新文献

英文 中文
Verification of Physical Chip Layouts Using GDSII Design Data 使用GDSII设计数据验证物理芯片布局
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854432
Aayush Singla, Bernhard Lippmann, H. Graeb
Modern semiconductor products adopting worldwide distributed manufacturing face the threat of malicious manipulation. An efficient and correct proof of absence of any modification is targeted to be achieved through the comparison of original layout design data with the physical chip layout recovered by reverse engineering. This paper presents an algorithm for this task. It is validated on design and layout data from sample analysis results on 40 nm layers.
采用全球分布式制造的现代半导体产品面临着恶意操纵的威胁。通过将原始布局设计数据与逆向工程恢复的芯片物理布局数据进行比较,以达到有效、正确的无修改证明。本文提出了一种算法。在40 nm层的样品分析结果中,对设计和布局数据进行了验证。
{"title":"Verification of Physical Chip Layouts Using GDSII Design Data","authors":"Aayush Singla, Bernhard Lippmann, H. Graeb","doi":"10.1109/IVSW.2019.8854432","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854432","url":null,"abstract":"Modern semiconductor products adopting worldwide distributed manufacturing face the threat of malicious manipulation. An efficient and correct proof of absence of any modification is targeted to be achieved through the comparison of original layout design data with the physical chip layout recovered by reverse engineering. This paper presents an algorithm for this task. It is validated on design and layout data from sample analysis results on 40 nm layers.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132654649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Comprehensive Approach to a Trusted Test Infrastructure 可信测试基础结构的综合方法
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854428
Marc Merandat, Vincent Reynaud, E. Valea, J. Quévremont, Nicolas Valette, P. Maistri, R. Leveugle, M. Flottes, Sophie Dupuis, B. Rouzeyre, G. D. Natale
The testability of electronic devices is of critical importance and it is often supported by IEEE standards. The available methods, on the other hand, can be an entry point to a malicious attacker, if no proper countermeasure is adopted. In this paper, we report the latest results from the HADES project, presenting a portfolio of solution towards a secure test infrastructure.
电子设备的可测试性是至关重要的,它通常由IEEE标准支持。另一方面,如果没有采取适当的对策,可用的方法可能成为恶意攻击者的入口点。在本文中,我们报告了HADES项目的最新结果,提出了一个安全测试基础设施的解决方案组合。
{"title":"A Comprehensive Approach to a Trusted Test Infrastructure","authors":"Marc Merandat, Vincent Reynaud, E. Valea, J. Quévremont, Nicolas Valette, P. Maistri, R. Leveugle, M. Flottes, Sophie Dupuis, B. Rouzeyre, G. D. Natale","doi":"10.1109/IVSW.2019.8854428","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854428","url":null,"abstract":"The testability of electronic devices is of critical importance and it is often supported by IEEE standards. The available methods, on the other hand, can be an entry point to a malicious attacker, if no proper countermeasure is adopted. In this paper, we report the latest results from the HADES project, presenting a portfolio of solution towards a secure test infrastructure.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114302743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Two-Stage Architectures for Resilient Lightweight PUFs 弹性轻量级puf的两阶段架构
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854400
Haibo Su, Basel Halak, Mark Zwolinski
A Physical Unclonable Function provides a secure method for lightweight device authentication, in contrast to traditional encryption methods that are expensive in terms of resources. Unfortunately, they have proved to be vulnerable to modelling attacks. This work shows that two-stage structures improve the resilience against machine learning attacks. We have evaluated a number of two-stage structures using combinations of Arbiter PUFs (APUF), Current Mirror PUFs (CM-PUF) and Differential Comparator PUFs (DC-PUF). Of these, a DC-DC-PUF with an XOR at the output has a predictability of about 50% Additionally, it has a high reliability of 95.2% and only requires 26.1% of the area of the best existing approach.
物理不可克隆功能为轻量级设备的身份验证提供了一种安全的方法,而传统的加密方法需要耗费大量的资源。不幸的是,它们被证明很容易受到建模攻击。这项工作表明,两阶段结构提高了对机器学习攻击的弹性。我们使用仲裁puf (APUF),电流镜puf (CM-PUF)和差分比较puf (DC-PUF)的组合评估了许多两级结构。其中,输出为异或的DC-DC-PUF具有约50%的可预测性,此外,它具有95.2%的高可靠性,仅需要现有最佳方法26.1%的面积。
{"title":"Two-Stage Architectures for Resilient Lightweight PUFs","authors":"Haibo Su, Basel Halak, Mark Zwolinski","doi":"10.1109/IVSW.2019.8854400","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854400","url":null,"abstract":"A Physical Unclonable Function provides a secure method for lightweight device authentication, in contrast to traditional encryption methods that are expensive in terms of resources. Unfortunately, they have proved to be vulnerable to modelling attacks. This work shows that two-stage structures improve the resilience against machine learning attacks. We have evaluated a number of two-stage structures using combinations of Arbiter PUFs (APUF), Current Mirror PUFs (CM-PUF) and Differential Comparator PUFs (DC-PUF). Of these, a DC-DC-PUF with an XOR at the output has a predictability of about 50% Additionally, it has a high reliability of 95.2% and only requires 26.1% of the area of the best existing approach.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129960549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices 能量受限物联网设备的两层互认证
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854438
Yıldıran Yılmaz, Basel Halak
Authentication is a fundamental part of essential security operations and is a cornerstone for the Internet of Things (IoT) security. In this work an energy-efficient and secure mutual authentication protocol is proposed for constrained IoT devices wherein a combination of RC5 (Rivest Cipher) and ECC (Elliptic Curve Cryptography) cryptosystems are used. The protocol is implemented, and its functionality is verified on Zolertia RE-mote IoT devices. It supports secure data transmission along with authentication. Unlike existing schemes, mutual authentication in the proposed protocol is achieved with only two flights between client and server. The security against most common attacks is analysed, furthermore energy consumption of our protocol is evaluated and compared with existing protocol e.g. DTLS handshake. Our protocol saves up to 57% energy compared to the DTLS handshake protocol per authentication cycle.
身份验证是基本安全操作的基本组成部分,是物联网(IoT)安全的基石。在这项工作中,针对受限的物联网设备提出了一种节能且安全的相互认证协议,其中使用RC5 (Rivest Cipher)和ECC(椭圆曲线加密)密码系统的组合。该协议已实现,并在Zolertia远程物联网设备上验证了其功能。它支持安全的数据传输以及身份验证。与现有方案不同,本文提出的协议仅在客户端和服务器之间进行两次飞行即可实现相互认证。分析了针对大多数常见攻击的安全性,进一步评估了我们的协议的能耗,并与现有协议(如DTLS握手)进行了比较。与DTLS握手协议相比,我们的协议在每个身份验证周期节省高达57%的能量。
{"title":"A Two-Flights Mutual Authentication for Energy-Constrained IoT Devices","authors":"Yıldıran Yılmaz, Basel Halak","doi":"10.1109/IVSW.2019.8854438","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854438","url":null,"abstract":"Authentication is a fundamental part of essential security operations and is a cornerstone for the Internet of Things (IoT) security. In this work an energy-efficient and secure mutual authentication protocol is proposed for constrained IoT devices wherein a combination of RC5 (Rivest Cipher) and ECC (Elliptic Curve Cryptography) cryptosystems are used. The protocol is implemented, and its functionality is verified on Zolertia RE-mote IoT devices. It supports secure data transmission along with authentication. Unlike existing schemes, mutual authentication in the proposed protocol is achieved with only two flights between client and server. The security against most common attacks is analysed, furthermore energy consumption of our protocol is evaluated and compared with existing protocol e.g. DTLS handshake. Our protocol saves up to 57% energy compared to the DTLS handshake protocol per authentication cycle.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using Hardware Performance Counters to Detect Control Hijacking Attacks 使用硬件性能计数器检测控制劫持攻击
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854399
Miao Yu, Basel Halak, Mark Zwolinski
Code reuse techniques can circumvent existing security measures. For example, attacks such as Return Oriented Programming (ROP) use fragments of the existing code base to create an attack. Since this code is already in the system, the Data Execution Prevention methods cannot prevent the execution of this reorganised code. Existing software-based Control Flow Integrity can prevent this attack, but the overhead is enormous. Most of the improved methods utilise reduced granularity in exchange for a small performance overhead. Hardware-based detection also faces the same performance overhead and accuracy issues. Benefit from HPC's large-area loading on modern CPU chips, we propose a detection method based on the monitoring of hardware performance counters, which is a lightweight system-level detection for malicious code execution to solve the restrictions of other software and hardware security measures, and is not as complicated as Control Flow Integrity.
代码重用技术可以绕过现有的安全措施。例如,诸如面向返回编程(ROP)之类的攻击使用现有代码库的片段来创建攻击。由于此代码已经存在于系统中,因此数据执行阻止方法无法阻止此重组代码的执行。现有的基于软件的控制流完整性可以防止这种攻击,但开销很大。大多数改进的方法利用减少的粒度来换取较小的性能开销。基于硬件的检测也面临同样的性能开销和准确性问题。得益于高性能计算在现代CPU芯片上的大面积加载,我们提出了一种基于硬件性能计数器监控的检测方法,是一种轻量级的系统级恶意代码执行检测,解决了其他软硬件安全措施的限制,且不像Control Flow Integrity那样复杂。
{"title":"Using Hardware Performance Counters to Detect Control Hijacking Attacks","authors":"Miao Yu, Basel Halak, Mark Zwolinski","doi":"10.1109/IVSW.2019.8854399","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854399","url":null,"abstract":"Code reuse techniques can circumvent existing security measures. For example, attacks such as Return Oriented Programming (ROP) use fragments of the existing code base to create an attack. Since this code is already in the system, the Data Execution Prevention methods cannot prevent the execution of this reorganised code. Existing software-based Control Flow Integrity can prevent this attack, but the overhead is enormous. Most of the improved methods utilise reduced granularity in exchange for a small performance overhead. Hardware-based detection also faces the same performance overhead and accuracy issues. Benefit from HPC's large-area loading on modern CPU chips, we propose a detection method based on the monitoring of hardware performance counters, which is a lightweight system-level detection for malicious code execution to solve the restrictions of other software and hardware security measures, and is not as complicated as Control Flow Integrity.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131250506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional Coverage 动态调整测试序列持续时间以提高功能覆盖率
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854389
Z. Takakis, Dimitrios Mangiras, C. Nicopoulos, G. Dimitrakopoulos
The importance of functional coverage during frontend verification is steadily increasing. Complete coverage statistics, possibly spanning from block- to top-level, are required as a proof of verification quality and project development status. In this work, we present a coverage-driven verification methodology that relies on coverage-directed stimulus generation, with the goal being to increase functional coverage and decrease test application time. The test application time given to each one of the available constrained-random test sequences is dynamically adjusted by a feedback-based mechanism that observes online the quality of each applied test. The higher the quality, the more cycles are assigned to this test for future trials. Misbehaving test sequences are automatically replaced by new ones, in order to spend verification cycles on other tests that actually improve functional coverage. The proposed methodology is successfully applied to the register renaming sub-system of a 2-way superscalar out-of-order RISC-V processor. The results demonstrate both increased functional coverage and reduced test application time, as compared to a purely random approach.
在前端验证过程中,功能覆盖的重要性正在稳步增加。完整的覆盖统计,可能跨越从块到顶层,需要作为验证质量和项目开发状态的证明。在这项工作中,我们提出了一种覆盖驱动的验证方法,它依赖于覆盖导向的刺激生成,目标是增加功能覆盖并减少测试应用时间。每个可用的约束随机测试序列的测试应用时间通过基于反馈的机制动态调整,该机制在线观察每个应用测试的质量。质量越高,分配给该测试的周期越多,以便将来进行试验。错误的测试序列会被新的序列自动替换,以便将验证周期花在实际改善功能覆盖的其他测试上。该方法已成功应用于双向超标量乱序RISC-V处理器的寄存器重命名子系统。结果表明,与纯随机方法相比,增加了功能覆盖率,减少了测试应用时间。
{"title":"Dynamic Adjustment of Test-Sequence Duration for Increasing the Functional Coverage","authors":"Z. Takakis, Dimitrios Mangiras, C. Nicopoulos, G. Dimitrakopoulos","doi":"10.1109/IVSW.2019.8854389","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854389","url":null,"abstract":"The importance of functional coverage during frontend verification is steadily increasing. Complete coverage statistics, possibly spanning from block- to top-level, are required as a proof of verification quality and project development status. In this work, we present a coverage-driven verification methodology that relies on coverage-directed stimulus generation, with the goal being to increase functional coverage and decrease test application time. The test application time given to each one of the available constrained-random test sequences is dynamically adjusted by a feedback-based mechanism that observes online the quality of each applied test. The higher the quality, the more cycles are assigned to this test for future trials. Misbehaving test sequences are automatically replaced by new ones, in order to spend verification cycles on other tests that actually improve functional coverage. The proposed methodology is successfully applied to the register renaming sub-system of a 2-way superscalar out-of-order RISC-V processor. The results demonstrate both increased functional coverage and reduced test application time, as compared to a purely random approach.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124431572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Design Flow of FPGA Based RISC-V Implementation 基于FPGA的RISC-V实现的安全设计流程
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854418
A. Siddiqui, G. Shirley, S. Bendre, Girija Bhagwat, J. Plusquellic, F. Saqib
In the process of globalization, heterogeneous SoCs play an important role in an embedded application, security aspects of such a system are crucial. The system is susceptible to many attacks out of which we focus on two main attacks, namely, boot time attacks, where malware are injected to leak information and modify the functionality and run-time software attacks causing memory corruption. In this paper, we propose a hardware/software-based solution to secure the system integrity by providing secure boot which prevents malicious and unauthorized software during startup and Information Flow Tracking (IFT) technique to track the spurious data during run-time and preventing buffer overflow attacks. This proposed solution is implemented on the RISC-V and provides a self-authentication mechanism for FPGAs using TPM.
在全球化的进程中,异构soc在嵌入式应用中扮演着重要的角色,系统的安全性至关重要。系统容易受到许多攻击,其中我们主要关注两种主要攻击,即启动时攻击,其中注入恶意软件以泄漏信息并修改功能,以及导致内存损坏的运行时软件攻击。在本文中,我们提出了一种基于硬件/软件的解决方案,通过提供安全引导来防止启动期间的恶意和未经授权的软件,并提供信息流跟踪(IFT)技术来跟踪运行期间的虚假数据并防止缓冲区溢出攻击,以确保系统的完整性。提出的解决方案在RISC-V上实现,并使用TPM为fpga提供自认证机制。
{"title":"Secure Design Flow of FPGA Based RISC-V Implementation","authors":"A. Siddiqui, G. Shirley, S. Bendre, Girija Bhagwat, J. Plusquellic, F. Saqib","doi":"10.1109/IVSW.2019.8854418","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854418","url":null,"abstract":"In the process of globalization, heterogeneous SoCs play an important role in an embedded application, security aspects of such a system are crucial. The system is susceptible to many attacks out of which we focus on two main attacks, namely, boot time attacks, where malware are injected to leak information and modify the functionality and run-time software attacks causing memory corruption. In this paper, we propose a hardware/software-based solution to secure the system integrity by providing secure boot which prevents malicious and unauthorized software during startup and Information Flow Tracking (IFT) technique to track the spurious data during run-time and preventing buffer overflow attacks. This proposed solution is implemented on the RISC-V and provides a self-authentication mechanism for FPGAs using TPM.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection 利用逻辑锁定限制开关活动以改进基于功率分析的木马检测
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854402
Arash Nejat, Z. Kazemi, V. Beroulle, D. Hély, M. Fazeli
Nowadays due to economic reasons most of the semiconductor companies prefer to outsource the manufacturing part of their designs to third fabrication foundries, the so-called fabs. Untrustworthy fabs can extract circuit blocks, the called intellectual properties (IPs), from the layouts and then pirate them. Such fabs are suspected of hardware Trojan (HT) threat in which malicious circuits are added to the layouts for sabotage objectives. HTs lead up to increase power consumption in HT-infected circuits. However, due to process variations, the power of HTs including few gates in million-gate circuits is not detectable in power consumption analysis (PCA). Thus, such circuits should be considered as a collection of small sub-circuits, and PCA must be individually performed for each one of them. In this article, we introduce an approach facilitating PCA-based HT detection methods. Concerning this approach, we propose a new logic locking method and algorithm. Logic locking methods and algorithm are usually employed against IP piracy. They modify circuits such that they do not correctly work without applying a correct key to. Our experiments at the gate level and post-synthesis show that the proposed locking method and algorithm increase the proportion of HT activity and consequently HT power to circuit power.
如今,由于经济原因,大多数半导体公司更愿意将其设计的制造部分外包给第三代制造代工厂,即所谓的晶圆厂。不可信的晶圆厂可以从布局中提取电路块,即所谓的知识产权(ip),然后盗版它们。这样的晶圆厂被怀疑存在硬件木马(HT)威胁,其中恶意电路被添加到布局中以破坏目标。高温导致高温感染电路的功耗增加。然而,由于工艺变化,在功耗分析(PCA)中无法检测到百万门电路中包含少量门的高温超导的功率。因此,这些电路应被视为小子电路的集合,并且必须对其中的每个子电路单独执行PCA。在本文中,我们介绍了一种基于pca的高温检测方法。针对这种方法,我们提出了一种新的逻辑锁定方法和算法。针对IP盗版,通常采用逻辑锁定方法和算法。他们修改电路,使它们不能正确工作,除非应用正确的键。我们在门级和合成后的实验表明,所提出的锁定方法和算法增加了HT活性的比例,从而增加了HT功率占电路功率的比例。
{"title":"Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection","authors":"Arash Nejat, Z. Kazemi, V. Beroulle, D. Hély, M. Fazeli","doi":"10.1109/IVSW.2019.8854402","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854402","url":null,"abstract":"Nowadays due to economic reasons most of the semiconductor companies prefer to outsource the manufacturing part of their designs to third fabrication foundries, the so-called fabs. Untrustworthy fabs can extract circuit blocks, the called intellectual properties (IPs), from the layouts and then pirate them. Such fabs are suspected of hardware Trojan (HT) threat in which malicious circuits are added to the layouts for sabotage objectives. HTs lead up to increase power consumption in HT-infected circuits. However, due to process variations, the power of HTs including few gates in million-gate circuits is not detectable in power consumption analysis (PCA). Thus, such circuits should be considered as a collection of small sub-circuits, and PCA must be individually performed for each one of them. In this article, we introduce an approach facilitating PCA-based HT detection methods. Concerning this approach, we propose a new logic locking method and algorithm. Logic locking methods and algorithm are usually employed against IP piracy. They modify circuits such that they do not correctly work without applying a correct key to. Our experiments at the gate level and post-synthesis show that the proposed locking method and algorithm increase the proportion of HT activity and consequently HT power to circuit power.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Reliability of the Ring Oscillator Physically Unclonable Functions 环形振荡器物理不可克隆函数的可靠性研究
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854401
Honorio Martín, E. Vatajelu, G. D. Natale, O. Keren
In this paper we study the reliability of ring oscillator PUFs. We correlate the reliability with the distance between the measured oscillation frequencies, for different operating conditions. We propose a reliability evaluation metric based on differential frequency threshold, which allows the design of a robust PUF. In addition, we evaluate the characteristics of the resulting PUF and we devise a scenario for guaranteeing the overall reliability by selecting appropriate error correcting codes.
本文对环形振荡器puf的可靠性进行了研究。在不同的工作条件下,我们将可靠性与测量到的振荡频率之间的距离联系起来。我们提出了一种基于差频阈值的可靠性评估度量,该度量允许设计鲁棒PUF。此外,我们评估了最终PUF的特性,并设计了一个场景,通过选择适当的纠错码来保证整体可靠性。
{"title":"On the Reliability of the Ring Oscillator Physically Unclonable Functions","authors":"Honorio Martín, E. Vatajelu, G. D. Natale, O. Keren","doi":"10.1109/IVSW.2019.8854401","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854401","url":null,"abstract":"In this paper we study the reliability of ring oscillator PUFs. We correlate the reliability with the distance between the measured oscillation frequencies, for different operating conditions. We propose a reliability evaluation metric based on differential frequency threshold, which allows the design of a robust PUF. In addition, we evaluate the characteristics of the resulting PUF and we devise a scenario for guaranteeing the overall reliability by selecting appropriate error correcting codes.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Electroforming-free Memristors for Hardware Security Primitives 用于硬件安全原语的免电铸记忆电阻器
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854394
N. Du, M. Kiani, Xianyue Zhao, D. Bürger, O. Schmidt, R. Ecke, S. Schulz, H. Schmidt, I. Polian
Emerging memristive devices have been recently suggested for use in secret key generation and other hardware security applications. This position paper brings together the views of researchers from material science and hardware-oriented security. It discusses the question which types of memristors are better suitable for the construction of major hardware security primitives. Specifically, this paper points out the problems caused by electroforming, a necessary step for most of today's memristive devices, and advocates the usage of electroforming-free memristors. It discusses which security properties can be met by such devices and where more research is required.
新兴的忆阻器件最近被建议用于密钥生成和其他硬件安全应用。这份意见书汇集了材料科学和面向硬件安全的研究人员的观点。讨论了哪种类型的忆阻器更适合构建主要硬件安全原语的问题。具体地说,本文指出了电铸所引起的问题,电铸是当今大多数忆阻器的必要步骤,并提倡使用免电铸的忆阻器。它讨论了这些设备可以满足哪些安全属性,以及需要进行更多研究的地方。
{"title":"Electroforming-free Memristors for Hardware Security Primitives","authors":"N. Du, M. Kiani, Xianyue Zhao, D. Bürger, O. Schmidt, R. Ecke, S. Schulz, H. Schmidt, I. Polian","doi":"10.1109/IVSW.2019.8854394","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854394","url":null,"abstract":"Emerging memristive devices have been recently suggested for use in secret key generation and other hardware security applications. This position paper brings together the views of researchers from material science and hardware-oriented security. It discusses the question which types of memristors are better suitable for the construction of major hardware security primitives. Specifically, this paper points out the problems caused by electroforming, a necessary step for most of today's memristive devices, and advocates the usage of electroforming-free memristors. It discusses which security properties can be met by such devices and where more research is required.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122010178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2019 IEEE 4th International Verification and Security Workshop (IVSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1