首页 > 最新文献

2019 IEEE 4th International Verification and Security Workshop (IVSW)最新文献

英文 中文
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks 用于网络物理系统安全评估的低成本故障注入框架:时钟故障攻击
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854391
Z. Kazemi, Athanasios Papadimitriou, I. Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, D. Hély, V. Beroulle
Fault injection methods as a type of physical attack have gained significant importance in the security of MCU-based Internet-of-Things (IoTs) systems and they continue to become more and more important as the value of assets continues to increase. These attacks can pose severe security risks to the entire IoT system and their effects can quickly lead to security breaches. However, embedded software developers most often do not have the necessary expertise concerning existing vulnerabilities against such attacks. This makes it necessary to have a practical evaluation platform for measuring the degree of security, in a rapid and accurate way. These platforms are important not only from the performance and capability point of view, but also they need to be cost-effective, which is a critical factor to consider during their design. We present in this work a generic low cost and open platform, called HackMyMCU framework. While this platform offers both side channel and fault injection capabilities, this paper focuses on its clock glitch attacks. A first review of existing clock-based fault injectors is initially performed. Then we present two different clock glitchers and we use them to evaluate a modern MCU. The suggested methods consider the necessary parameters for the development of cost-effective and easy to use evaluation platforms which utilize easily accessible equipment. The findings show that a common and low-cost evaluation platform can be implemented with the goal to validate appropriate countermeasures against such attacks.
故障注入方法作为一种物理攻击,在基于mcu的物联网系统安全中具有重要意义,随着资产价值的不断增加,它将变得越来越重要。这些攻击会给整个物联网系统带来严重的安全风险,其影响会迅速导致安全漏洞。然而,嵌入式软件开发人员通常不具备针对此类攻击的现有漏洞的必要专业知识。这就需要有一个实用的评估平台来快速、准确地测量安全程度。这些平台不仅从性能和能力的角度来看很重要,而且还需要具有成本效益,这是设计过程中需要考虑的关键因素。在这项工作中,我们提出了一个通用的低成本和开放平台,称为HackMyMCU框架。该平台同时提供侧信道和故障注入功能,本文主要研究其时钟故障攻击。首先对现有的基于时钟的故障注入器进行第一次检查。然后,我们提出了两种不同的时钟故障,并使用它们来评估现代MCU。建议的方法考虑了开发具有成本效益和易于使用的评估平台所需的参数,这些评估平台使用易于访问的设备。研究结果表明,可以实现一个通用的低成本评估平台,以验证针对此类攻击的适当对策。
{"title":"On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks","authors":"Z. Kazemi, Athanasios Papadimitriou, I. Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, D. Hély, V. Beroulle","doi":"10.1109/IVSW.2019.8854391","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854391","url":null,"abstract":"Fault injection methods as a type of physical attack have gained significant importance in the security of MCU-based Internet-of-Things (IoTs) systems and they continue to become more and more important as the value of assets continues to increase. These attacks can pose severe security risks to the entire IoT system and their effects can quickly lead to security breaches. However, embedded software developers most often do not have the necessary expertise concerning existing vulnerabilities against such attacks. This makes it necessary to have a practical evaluation platform for measuring the degree of security, in a rapid and accurate way. These platforms are important not only from the performance and capability point of view, but also they need to be cost-effective, which is a critical factor to consider during their design. We present in this work a generic low cost and open platform, called HackMyMCU framework. While this platform offers both side channel and fault injection capabilities, this paper focuses on its clock glitch attacks. A first review of existing clock-based fault injectors is initially performed. Then we present two different clock glitchers and we use them to evaluate a modern MCU. The suggested methods consider the necessary parameters for the development of cost-effective and easy to use evaluation platforms which utilize easily accessible equipment. The findings show that a common and low-cost evaluation platform can be implemented with the goal to validate appropriate countermeasures against such attacks.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Nonlinear Product Codes for Reliability and Security 可靠性和安全性的非线性产品代码
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854455
Batya Karp, O. Amrani, O. Keren
Multi-dimensional codes using a coset based code as one of the base codes have been suggested to increase the code distance and at the same time simplify the encoding and decoding of long codes. We show that while these codes provide sufficient reliability, they can not provide security. We then present two-dimensional product codes using robust codes as the base codes which provide both reliability and security.
为了增加码距,同时简化长码的编码和解码,提出了采用基于协集的码作为基码之一的多维码。我们表明,虽然这些代码提供了足够的可靠性,但它们不能提供安全性。然后,我们提出了二维产品代码,使用鲁棒代码作为基础代码,提供可靠性和安全性。
{"title":"Nonlinear Product Codes for Reliability and Security","authors":"Batya Karp, O. Amrani, O. Keren","doi":"10.1109/IVSW.2019.8854455","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854455","url":null,"abstract":"Multi-dimensional codes using a coset based code as one of the base codes have been suggested to increase the code distance and at the same time simplify the encoding and decoding of long codes. We show that while these codes provide sufficient reliability, they can not provide security. We then present two-dimensional product codes using robust codes as the base codes which provide both reliability and security.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynotes 主题演讲
Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854417
D. Fellner
Over the last fifteen years, hardware security and trust has evolved into a major new area of research at the intersection of semiconductor manufacturing, VLSI design and test, computer-aided design, architecture and system security. During the same period, machine learning has experience a major revival in interest and has flourished from a nearly forgotten area to the talk of the town. In this presentation, we will first briefly review various machine learning-based solutions which have been developed to address a number of concerns in hardware security and trust, including hardware Trojan detection, counterfeit IC identification, provenance attestation, hardware-based malware detection, side-channel attacks, PUF modeling, etc. Then, we will examine the key attributes of these problems which make them amenable to machine learning-based solutions and we will discuss the potential and the fundamental limitations of such approaches. Lastly, we will ponder the role of and necessity for advanced contemporary machine learning methods in the context of hardware security and we will conclude with suggestions for avoiding common pitfalls when employing such methods.
在过去的十五年中,硬件安全和信任已经发展成为半导体制造,VLSI设计和测试,计算机辅助设计,架构和系统安全交叉的一个重要的新研究领域。在同一时期,机器学习经历了一次重大的复兴,并从一个几乎被遗忘的领域蓬勃发展到城镇的话题。在本次演讲中,我们将首先简要回顾各种基于机器学习的解决方案,这些解决方案已经开发出来,用于解决硬件安全和信任方面的一些问题,包括硬件木马检测,假冒IC识别,来源证明,基于硬件的恶意软件检测,侧信道攻击,PUF建模等。然后,我们将研究这些问题的关键属性,这些属性使它们适合基于机器学习的解决方案,我们将讨论这些方法的潜力和基本限制。最后,我们将思考先进的当代机器学习方法在硬件安全背景下的作用和必要性,并在使用这些方法时提出避免常见陷阱的建议。
{"title":"Keynotes","authors":"D. Fellner","doi":"10.1109/IVSW.2019.8854417","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854417","url":null,"abstract":"Over the last fifteen years, hardware security and trust has evolved into a major new area of research at the intersection of semiconductor manufacturing, VLSI design and test, computer-aided design, architecture and system security. During the same period, machine learning has experience a major revival in interest and has flourished from a nearly forgotten area to the talk of the town. In this presentation, we will first briefly review various machine learning-based solutions which have been developed to address a number of concerns in hardware security and trust, including hardware Trojan detection, counterfeit IC identification, provenance attestation, hardware-based malware detection, side-channel attacks, PUF modeling, etc. Then, we will examine the key attributes of these problems which make them amenable to machine learning-based solutions and we will discuss the potential and the fundamental limitations of such approaches. Lastly, we will ponder the role of and necessity for advanced contemporary machine learning methods in the context of hardware security and we will conclude with suggestions for avoiding common pitfalls when employing such methods.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About IVSW 关于IVSW
Pub Date : 2018-07-01 DOI: 10.1109/IVSW.2019.8854435
About IVSW
关于IVSW
{"title":"About IVSW","authors":"","doi":"10.1109/IVSW.2019.8854435","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854435","url":null,"abstract":"About IVSW","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2019 IEEE 4th International Verification and Security Workshop (IVSW 2019) 2019 IEEE第四届国际验证与安全研讨会(IVSW 2019)
Pub Date : 1900-01-01 DOI: 10.1109/ivsw.2019.8854382
2019 IEEE 4th International Verification and Security Workshop (IVSW 2019)
2019 IEEE第四届国际验证与安全研讨会(IVSW 2019)
{"title":"2019 IEEE 4th International Verification and Security Workshop (IVSW 2019)","authors":"","doi":"10.1109/ivsw.2019.8854382","DOIUrl":"https://doi.org/10.1109/ivsw.2019.8854382","url":null,"abstract":"2019 IEEE 4<sup>th</sup> International Verification and Security Workshop (IVSW 2019)","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"34 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 IEEE 4th International Verification and Security Workshop (IVSW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1