首页 > 最新文献

2011 IEEE International Symposium on Hardware-Oriented Security and Trust最新文献

英文 中文
Low-cost recovery for the code integrity protection in secure embedded processors 安全嵌入式处理器中代码完整性保护的低成本恢复
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5955004
N. Huu, B. Robisson, M. Agoyan, Nathalie Drach-Temam
To ensure the code integrity in secure embedded processors, most previous works focus on detecting attacks without paying their attention to recovery. This paper proposes a novel hardware recovery approach allowing the processor to resume the execution after detecting an attack. The experimental results demonstrate that our scheme introduces a very low impact on the performance while requiring a reasonable hardware overhead.
为了保证安全嵌入式处理器中代码的完整性,以往的工作大多集中在检测攻击而不关注恢复。本文提出了一种新的硬件恢复方法,允许处理器在检测到攻击后恢复执行。实验结果表明,我们的方案对性能的影响很小,同时需要合理的硬件开销。
{"title":"Low-cost recovery for the code integrity protection in secure embedded processors","authors":"N. Huu, B. Robisson, M. Agoyan, Nathalie Drach-Temam","doi":"10.1109/HST.2011.5955004","DOIUrl":"https://doi.org/10.1109/HST.2011.5955004","url":null,"abstract":"To ensure the code integrity in secure embedded processors, most previous works focus on detecting attacks without paying their attention to recovery. This paper proposes a novel hardware recovery approach allowing the processor to resume the execution after detecting an attack. The experimental results demonstrate that our scheme introduces a very low impact on the performance while requiring a reasonable hardware overhead.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On improving reliability of delay based Physically Unclonable Functions under temperature variations 温度变化下基于物理不可克隆函数的延迟可靠性提高研究
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5955012
Raghavan Kumar, Harikrishnan Chandrikakutty, S. Kundu
Physically Unclonable Functions (PUFs) are a special class of circuits used for challenge-response authentication. The challenge-response pair for PUFs should be mathematically unpredictable, but must be reliable and remain unvarying. The reliability of PUFs implemented in CMOS circuits is frequently compromised by environmental conditions such as voltage and temperature. In this paper, we propose two methods for improving the reliability of delay based PUFs, by reducing temperature sensitivity. The first method focuses on improving the gate overdrive (VGS − Vt(T)), by operating the PUF at an optimized supply voltage (V′DD), also called as ZTC (Zero Temperature Coefficient) voltage. The optimum supply voltage for a 24 stage PUF is almost 23% lower than the nominal supply voltage in 45nm CMOS technology. The second method exploits the negative temperature coefficient (TCR) property of n+ and p+ polysilicon placed as source feedback resistors. A 16% improvement in reliability has been demonstrated for both the methods. Moreover, we also demonstrate that these design optimizations do not compromise the PUF uniqueness.
物理不可克隆功能(puf)是一类特殊的电路,用于质询-响应认证。puf的挑战-响应对在数学上应该是不可预测的,但必须是可靠的并且保持不变。在CMOS电路中实现的puf的可靠性经常受到环境条件(如电压和温度)的影响。在本文中,我们提出了两种通过降低温度敏感性来提高延迟puf可靠性的方法。第一种方法通过在优化的电源电压(V 'DD)下操作PUF,也称为ZTC(零温度系数)电压,着重于改善栅极超速驱动(VGS−Vt(T))。24级PUF的最佳电源电压几乎比45nm CMOS技术的标称电源电压低23%。第二种方法是利用n+和p+多晶硅作为源反馈电阻的负温度系数(TCR)特性。两种方法的可靠性都提高了16%。此外,我们还证明了这些设计优化不会损害PUF的唯一性。
{"title":"On improving reliability of delay based Physically Unclonable Functions under temperature variations","authors":"Raghavan Kumar, Harikrishnan Chandrikakutty, S. Kundu","doi":"10.1109/HST.2011.5955012","DOIUrl":"https://doi.org/10.1109/HST.2011.5955012","url":null,"abstract":"Physically Unclonable Functions (PUFs) are a special class of circuits used for challenge-response authentication. The challenge-response pair for PUFs should be mathematically unpredictable, but must be reliable and remain unvarying. The reliability of PUFs implemented in CMOS circuits is frequently compromised by environmental conditions such as voltage and temperature. In this paper, we propose two methods for improving the reliability of delay based PUFs, by reducing temperature sensitivity. The first method focuses on improving the gate overdrive (VGS − Vt(T)), by operating the PUF at an optimized supply voltage (V′DD), also called as ZTC (Zero Temperature Coefficient) voltage. The optimum supply voltage for a 24 stage PUF is almost 23% lower than the nominal supply voltage in 45nm CMOS technology. The second method exploits the negative temperature coefficient (TCR) property of n+ and p+ polysilicon placed as source feedback resistors. A 16% improvement in reliability has been demonstrated for both the methods. Moreover, we also demonstrate that these design optimizations do not compromise the PUF uniqueness.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Security challenges and opportunities in adaptive and reconfigurable hardware 自适应和可重构硬件中的安全挑战和机遇
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954986
Victor Costan, S. Devadas
We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and low cost that make cloud computing attractive in the first place. We propose augmenting regular cloud servers with a Trusted Computation Base (TCB) that can securely perform high-performance computations. Our TCB achieves cost savings by spreading functionality across two paired chips. We show that making a Field-Programmable Gate Array (FPGA) a part of the TCB benefits security and performance, and we explore a new method for defending the computation inside the TCB against side-channel attacks.
我们提出了一种新的方法来构建硬件支持,为在云中运行的计算提供强大的安全保证(大规模数据中心中的共享硬件),同时保持高性能和低成本,这使得云计算首先具有吸引力。我们建议使用可信计算基础(TCB)来增强常规云服务器,以安全地执行高性能计算。我们的TCB通过在两个配对芯片上扩展功能来节省成本。我们证明将现场可编程门阵列(FPGA)作为TCB的一部分有利于安全性和性能,并且我们探索了一种新的方法来保护TCB内部的计算免受侧信道攻击。
{"title":"Security challenges and opportunities in adaptive and reconfigurable hardware","authors":"Victor Costan, S. Devadas","doi":"10.1109/HST.2011.5954986","DOIUrl":"https://doi.org/10.1109/HST.2011.5954986","url":null,"abstract":"We present a novel approach to building hardware support for providing strong security guarantees for computations running in the cloud (shared hardware in massive data centers), while maintaining the high performance and low cost that make cloud computing attractive in the first place. We propose augmenting regular cloud servers with a Trusted Computation Base (TCB) that can securely perform high-performance computations. Our TCB achieves cost savings by spreading functionality across two paired chips. We show that making a Field-Programmable Gate Array (FPGA) a part of the TCB benefits security and performance, and we explore a new method for defending the computation inside the TCB against side-channel attacks.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122713203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms TinyTPM:一个轻量级模块,旨在IP保护和可信的嵌入式平台
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954987
Thomas Feller, Sunil Malipatlolla, David Meister, S. Huss
Currently, embedded system implementations are increasingly exploiting reconfigurable devices such as Field Programmable Gate Arrays (FPGAs). Due to the volatile nature of SRAM-based FPGAs it is necessary to secure such systems against intellectual property (IP) theft and overproduction. Additionally, the trustworthy operation of these systems has to be guarded in order to protect the processed data. We propose in this paper a novel cryptographic module called TinyTPM, which enforces trustworthy operation and IP protection for embedded systems. Our approach covers the following two key principles: (i) trustworthy attestation of the embedded system state, (ii) IP protection by providing authenticated and encrypted update procedures for FPGAs. The TinyTPM consumes only a few resources and is therefore well-suited to design secure, efficient, and low cost FPGA-based embedded systems. This architecture has been implemented as a proof-of-concept on top of a Xilinx Virtex-5 FPGA platform and demonstrates both, security and efficiency.
目前,嵌入式系统越来越多地利用可重构器件,如现场可编程门阵列(fpga)。由于基于sram的fpga的易失性,有必要保护此类系统免受知识产权(IP)盗窃和生产过剩的影响。此外,必须保护这些系统的可靠操作,以保护处理过的数据。本文提出了一种新颖的密码模块TinyTPM,它可以实现嵌入式系统的可信操作和IP保护。我们的方法涵盖以下两个关键原则:(i)嵌入式系统状态的可信认证,(ii)通过为fpga提供经过认证和加密的更新过程来保护IP。TinyTPM只消耗很少的资源,因此非常适合设计安全、高效和低成本的基于fpga的嵌入式系统。该架构已在赛灵思Virtex-5 FPGA平台上作为概念验证实现,并证明了安全性和效率。
{"title":"TinyTPM: A lightweight module aimed to IP protection and trusted embedded platforms","authors":"Thomas Feller, Sunil Malipatlolla, David Meister, S. Huss","doi":"10.1109/HST.2011.5954987","DOIUrl":"https://doi.org/10.1109/HST.2011.5954987","url":null,"abstract":"Currently, embedded system implementations are increasingly exploiting reconfigurable devices such as Field Programmable Gate Arrays (FPGAs). Due to the volatile nature of SRAM-based FPGAs it is necessary to secure such systems against intellectual property (IP) theft and overproduction. Additionally, the trustworthy operation of these systems has to be guarded in order to protect the processed data. We propose in this paper a novel cryptographic module called TinyTPM, which enforces trustworthy operation and IP protection for embedded systems. Our approach covers the following two key principles: (i) trustworthy attestation of the embedded system state, (ii) IP protection by providing authenticated and encrypted update procedures for FPGAs. The TinyTPM consumes only a few resources and is therefore well-suited to design secure, efficient, and low cost FPGA-based embedded systems. This architecture has been implemented as a proof-of-concept on top of a Xilinx Virtex-5 FPGA platform and demonstrates both, security and efficiency.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114441398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Performance evaluation of protocols resilient to physical attacks 抗物理攻击协议的性能评估
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954995
S. Guilley, L. Sauvage, J. Danger, Nidhal Selmane, Denis Réal
Cryptographic implementations are vulnerable to physical attacks. Many countermeasures to resist them have been proposed in the past. However, they are all specific to a given attacker and allow to mitigate the risk only up to a certain level: improved attacks on those countermeasures can most of the time be devised. Therefore, a new trend consists in making cryptographic implementations resilient to physical attacks. This strategy makes it possible to prove the countermeasure against all possible types of attackers captured by a security model. Several resilient schemes for the protection of block ciphers exist. For a given security objective, they all permit to reach the same security level. Therefore, they differentiate only according to their efficiency. We first show that the genuine versions of these protocols achieve different I/O bandwidth and computational performance. Our second contribution is to improve those protocols thanks to a message blinding, assuming passive attacks require more than two traces to be successful. Then, we bring as a third contribution the fact that the improved versions of the protocols are very much alike, and that the difference between them depends only from the specific details of their instantiation.
加密实现容易受到物理攻击。过去已经提出了许多抵制它们的对策。然而,它们都是特定于给定攻击者的,并且只允许将风险降低到一定程度:大多数时候可以设计针对这些对策的改进攻击。因此,新的趋势是使加密实现能够抵御物理攻击。此策略可以证明针对安全模型捕获的所有可能类型的攻击者的对策。存在几种保护分组密码的弹性方案。对于给定的安全目标,它们都允许达到相同的安全级别。因此,它们只根据效率来区分。我们首先展示了这些协议的真实版本实现了不同的I/O带宽和计算性能。我们的第二个贡献是改进这些协议,这要归功于消息盲,假设被动攻击需要两个以上的跟踪才能成功。然后,我们带来了第三个贡献,即协议的改进版本非常相似,它们之间的差异仅取决于它们实例化的具体细节。
{"title":"Performance evaluation of protocols resilient to physical attacks","authors":"S. Guilley, L. Sauvage, J. Danger, Nidhal Selmane, Denis Réal","doi":"10.1109/HST.2011.5954995","DOIUrl":"https://doi.org/10.1109/HST.2011.5954995","url":null,"abstract":"Cryptographic implementations are vulnerable to physical attacks. Many countermeasures to resist them have been proposed in the past. However, they are all specific to a given attacker and allow to mitigate the risk only up to a certain level: improved attacks on those countermeasures can most of the time be devised. Therefore, a new trend consists in making cryptographic implementations resilient to physical attacks. This strategy makes it possible to prove the countermeasure against all possible types of attackers captured by a security model. Several resilient schemes for the protection of block ciphers exist. For a given security objective, they all permit to reach the same security level. Therefore, they differentiate only according to their efficiency. We first show that the genuine versions of these protocols achieve different I/O bandwidth and computational performance. Our second contribution is to improve those protocols thanks to a message blinding, assuming passive attacks require more than two traces to be successful. Then, we bring as a third contribution the fact that the improved versions of the protocols are very much alike, and that the difference between them depends only from the specific details of their instantiation.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131810242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New security threats against chips containing scan chain structures 针对包含扫描链结构的芯片的新安全威胁
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5955005
Jean DaRolt, G. D. Natale, M. Flottes, B. Rouzeyre
Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and showed the need for secure scan implementations. These attacks assume a single scan chain. However the conception of large designs and restrictions in terms of test costs may require the implementation of many scan chains and additional test infrastructures for test response compaction. In this paper, we present a new generic scan attack that covers a wide range of industrial test infrastructures, including spatial response compressors.
插入扫描链是保证集成电路中顺序元件可见性和可控性的最常用技术,但当芯片处理机密信息时,扫描链可能成为访问机密(或隐藏)信息的后门,从而危及整体安全。已经描述了几种基于扫描的加密函数攻击,并显示了安全扫描实现的必要性。这些攻击假设一个单一的扫描链。然而,大型设计的概念和测试成本方面的限制可能需要实现许多扫描链和额外的测试基础设施来进行测试响应压缩。在本文中,我们提出了一种新的通用扫描攻击,它涵盖了广泛的工业测试基础设施,包括空间响应压缩机。
{"title":"New security threats against chips containing scan chain structures","authors":"Jean DaRolt, G. D. Natale, M. Flottes, B. Rouzeyre","doi":"10.1109/HST.2011.5955005","DOIUrl":"https://doi.org/10.1109/HST.2011.5955005","url":null,"abstract":"Insertion of scan chains is the most common technique to ensure observability and controllability of sequential elements in an IC. However, when the chip deals with secret information, the scan chain can be used as back door for accessing secret (or hidden) information, and thus jeopardize the overall security. Several scan-based attacks on cryptographic functions have been described and showed the need for secure scan implementations. These attacks assume a single scan chain. However the conception of large designs and restrictions in terms of test costs may require the implementation of many scan chains and additional test infrastructures for test response compaction. In this paper, we present a new generic scan attack that covers a wide range of industrial test infrastructures, including spatial response compressors.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130994536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection 一种用于硬件木马检测的健壮的时间自引用方法
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954999
S. Narasimhan, Xinmu Wang, Dongdong Du, R. Chakraborty, S. Bhunia
Malicious modification of integrated circuits, referred to as Hardware Trojans, in untrusted fabrication facility has emerged as a major security threat. Logic testing approaches are not very effective for detecting large sequential Trojans which require multiple state transitions often triggered by rare circuit events in order to activate and cause malfunction. On the other hand, side-channel analysis has emerged as an effective approach for detection of such large sequential Trojans. However, existing side-channel approaches suffer from large reduction in detection sensitivity with increasing process variations or decreasing Trojan size. In this paper, we propose TeSR, a Temporal Self-Referencing approach that compares the current signature of a chip at two different time windows to completely eliminate the effect of process noise, thus providing high detection sensitivity for Trojans of varying size. Furthermore, unlike existing approaches, it does not require golden chip instances as a reference. Simulation results for three complex designs and three representative sequential Trojan circuits demonstrate the effectiveness of the approach under large inter- and intra-die process variations.
恶意修改集成电路,被称为硬件木马,在不可信的制造设施已经成为一个主要的安全威胁。逻辑测试方法对于检测大型顺序木马不是很有效,这些木马需要多次状态转换,通常由罕见的电路事件触发,以激活并导致故障。另一方面,侧信道分析已成为检测此类大型序列木马的有效方法。然而,现有的侧信道方法会随着进程变化的增加或木马大小的减小而大大降低检测灵敏度。在本文中,我们提出了TeSR,一种时间自引用方法,它比较芯片在两个不同时间窗口的当前特征,以完全消除过程噪声的影响,从而为不同大小的木马提供高检测灵敏度。此外,与现有的方法不同,它不需要黄金芯片实例作为参考。对三种复杂设计和三种具有代表性的顺序特洛伊电路的仿真结果表明,该方法在模间和模内工艺变化较大的情况下是有效的。
{"title":"TeSR: A robust Temporal Self-Referencing approach for Hardware Trojan detection","authors":"S. Narasimhan, Xinmu Wang, Dongdong Du, R. Chakraborty, S. Bhunia","doi":"10.1109/HST.2011.5954999","DOIUrl":"https://doi.org/10.1109/HST.2011.5954999","url":null,"abstract":"Malicious modification of integrated circuits, referred to as Hardware Trojans, in untrusted fabrication facility has emerged as a major security threat. Logic testing approaches are not very effective for detecting large sequential Trojans which require multiple state transitions often triggered by rare circuit events in order to activate and cause malfunction. On the other hand, side-channel analysis has emerged as an effective approach for detection of such large sequential Trojans. However, existing side-channel approaches suffer from large reduction in detection sensitivity with increasing process variations or decreasing Trojan size. In this paper, we propose TeSR, a Temporal Self-Referencing approach that compares the current signature of a chip at two different time windows to completely eliminate the effect of process noise, thus providing high detection sensitivity for Trojans of varying size. Furthermore, unlike existing approaches, it does not require golden chip instances as a reference. Simulation results for three complex designs and three representative sequential Trojan circuits demonstrate the effectiveness of the approach under large inter- and intra-die process variations.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 129
Security Checkers: Detecting processor malicious inclusions at runtime 安全检查器:在运行时检测处理器恶意包含
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954992
Michael Bilzor, Ted Huffmire, C. Irvine, T. Levin
To counter the growing threat of malicious subversions to the design of a microprocessor, there is a great need for simple, automated methods for detecting such malevolent changes. Based on the adoption of the Property Specification Language (PSL) for behavioral verification, and the advent of tools for automatically generating synthesizable hardware design language (HDL) constructs for verifying a PSL assertion, we propose a new method called Security Checkers, which uses security-focused PSL assertions to create hardware design units for detecting malicious inclusions at runtime. We describe the process flow for creating Security Checkers and demonstrate by example how they can be used to detect malicious inclusions in a processor design. Because the checkers can be used in simulation, FPGA emulation, or as part of a fabricated design, we illustrate how this technique can be used to detect malicious inclusions over a much broader segment of the processor development lifecycle, compared to existing methods.
为了对抗对微处理器设计的恶意颠覆日益增长的威胁,非常需要一种简单、自动化的方法来检测这种恶意更改。基于采用属性规范语言(PSL)进行行为验证,以及自动生成用于验证PSL断言的可合成硬件设计语言(HDL)构造的工具的出现,我们提出了一种称为安全检查器的新方法,该方法使用以安全为中心的PSL断言来创建硬件设计单元,以便在运行时检测恶意包含。我们描述了创建安全检查器的流程,并通过示例演示了如何使用它们来检测处理器设计中的恶意包含。由于检查器可用于仿真、FPGA仿真或作为制造设计的一部分,因此,与现有方法相比,我们将说明如何使用该技术在处理器开发生命周期的更广泛的范围内检测恶意包含。
{"title":"Security Checkers: Detecting processor malicious inclusions at runtime","authors":"Michael Bilzor, Ted Huffmire, C. Irvine, T. Levin","doi":"10.1109/HST.2011.5954992","DOIUrl":"https://doi.org/10.1109/HST.2011.5954992","url":null,"abstract":"To counter the growing threat of malicious subversions to the design of a microprocessor, there is a great need for simple, automated methods for detecting such malevolent changes. Based on the adoption of the Property Specification Language (PSL) for behavioral verification, and the advent of tools for automatically generating synthesizable hardware design language (HDL) constructs for verifying a PSL assertion, we propose a new method called Security Checkers, which uses security-focused PSL assertions to create hardware design units for detecting malicious inclusions at runtime. We describe the process flow for creating Security Checkers and demonstrate by example how they can be used to detect malicious inclusions in a processor design. Because the checkers can be used in simulation, FPGA emulation, or as part of a fabricated design, we illustrate how this technique can be used to detect malicious inclusions over a much broader segment of the processor development lifecycle, compared to existing methods.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129632356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology 灵活的架构优化和使用定制HLS方法的组签名算法的ASIC实现
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5954996
S. Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako
Group signature is one of the main theme in recent digital signature studies. Typical signature algorithm is a combination of more than 70 elliptic curve (ECC), modular (RSA), long-bit integer and hash arithmetic functions. A full H/W IP core is strongly desired for the use of group signature in SoCs in slow-clock and low-power mobile devices and embedded systems. Flexible adjustment of H/W speed and size, depending on different systems and LSI process technologies, is also required. However, for designing and verifying H/W, the group signature algorithm is too complicated to use a standard RTL (Register Transfer Level) design methodology nor any recent HLS (High Level Synthesis). Therefore, we incorporated a two-level behavioral synthesis approach, where an optimized macro-architecture is explored by a custom-made scheduler, after a database of multiple number of microarchitectures are effectively constructed by conventional HLS. We implemented the signature algorithm on a low-cost 0.25um gate-array. The H/W size is approximately 1M gates and our chip can compute a group signature at the equivalent speed (0.135 seconds@100MHz clock) with 3GHz PC S/W, while the power consumption is two orders of magnitude lower (425mW@100MHz).
群签名是近年来数字签名研究的主题之一。典型的签名算法是70多个椭圆曲线(ECC)、模(RSA)、长位整数和哈希算法函数的组合。对于在慢时钟和低功耗移动设备和嵌入式系统的soc中使用组签名,强烈需要一个完整的H/W IP核。根据不同的系统和LSI工艺技术,还需要灵活调整H/W速度和尺寸。然而,对于设计和验证H/W,组签名算法过于复杂,无法使用标准的RTL(寄存器传输级别)设计方法或任何最新的HLS(高级合成)。因此,我们采用了一种两级行为综合方法,在传统HLS有效构建了多个微体系结构的数据库之后,由定制调度器探索优化的宏观体系结构。我们在低成本的0.25um门阵列上实现了签名算法。H/W尺寸约为1M门,我们的芯片可以以3GHz PC S/W的等效速度(0.135 seconds@100MHz时钟)计算组签名,而功耗低两个数量级(425mW@100MHz)。
{"title":"Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology","authors":"S. Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako","doi":"10.1109/HST.2011.5954996","DOIUrl":"https://doi.org/10.1109/HST.2011.5954996","url":null,"abstract":"Group signature is one of the main theme in recent digital signature studies. Typical signature algorithm is a combination of more than 70 elliptic curve (ECC), modular (RSA), long-bit integer and hash arithmetic functions. A full H/W IP core is strongly desired for the use of group signature in SoCs in slow-clock and low-power mobile devices and embedded systems. Flexible adjustment of H/W speed and size, depending on different systems and LSI process technologies, is also required. However, for designing and verifying H/W, the group signature algorithm is too complicated to use a standard RTL (Register Transfer Level) design methodology nor any recent HLS (High Level Synthesis). Therefore, we incorporated a two-level behavioral synthesis approach, where an optimized macro-architecture is explored by a custom-made scheduler, after a database of multiple number of microarchitectures are effectively constructed by conventional HLS. We implemented the signature algorithm on a low-cost 0.25um gate-array. The H/W size is approximately 1M gates and our chip can compute a group signature at the equivalent speed (0.135 seconds@100MHz clock) with 3GHz PC S/W, while the power consumption is two orders of magnitude lower (425mW@100MHz).","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129884778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Placement of trust anchors in embedded computer systems 嵌入式计算机系统中信任锚的放置
Pub Date : 2011-06-05 DOI: 10.1109/HST.2011.5955006
S. Papa, W. Casper, S. Nair
The use of Trust Anchors in a well designed embedded system can help create more secure designs. Trust Anchors can be used to establish, extend, and maintain trust during power-up and run-time operation of a system. A system may contain one or more trust anchors working isolated or in a coordinated manner within the system. Embedded computer systems may be subject to network and physical attacks and so the use of trust anchors may help protect the system from these attacks. By evaluating potential attacks the placement and functionality of trusted hardware and software in the system may be defined to help mitigate the attacks. This paper uses several different attacks on an embedded computer as examples to describe the placement of trust anchors, hardware and software protection mechanisms, and other functionality needed to protect the system against these attacks.
在设计良好的嵌入式系统中使用Trust anchor可以帮助创建更安全的设计。信任锚可用于在系统启动和运行时操作期间建立、扩展和维护信任。一个系统可能包含一个或多个信任锚,它们在系统内以独立或协调的方式工作。嵌入式计算机系统可能会受到网络和物理攻击,因此使用信任锚可以帮助保护系统免受这些攻击。通过评估潜在的攻击,可以定义可信硬件和软件在系统中的位置和功能,以帮助减轻攻击。本文以嵌入式计算机上的几种不同攻击为例,描述了信任锚的放置、硬件和软件保护机制以及保护系统免受这些攻击所需的其他功能。
{"title":"Placement of trust anchors in embedded computer systems","authors":"S. Papa, W. Casper, S. Nair","doi":"10.1109/HST.2011.5955006","DOIUrl":"https://doi.org/10.1109/HST.2011.5955006","url":null,"abstract":"The use of Trust Anchors in a well designed embedded system can help create more secure designs. Trust Anchors can be used to establish, extend, and maintain trust during power-up and run-time operation of a system. A system may contain one or more trust anchors working isolated or in a coordinated manner within the system. Embedded computer systems may be subject to network and physical attacks and so the use of trust anchors may help protect the system from these attacks. By evaluating potential attacks the placement and functionality of trusted hardware and software in the system may be defined to help mitigate the attacks. This paper uses several different attacks on an embedded computer as examples to describe the placement of trust anchors, hardware and software protection mechanisms, and other functionality needed to protect the system against these attacks.","PeriodicalId":300377,"journal":{"name":"2011 IEEE International Symposium on Hardware-Oriented Security and Trust","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116774531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2011 IEEE International Symposium on Hardware-Oriented Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1