首页 > 最新文献

2022 IEEE European Test Symposium (ETS)最新文献

英文 中文
TaintLock: Preventing IP Theft through Lightweight Dynamic Scan Encryption using Taint Bits* TaintLock:防止IP盗窃通过轻量级动态扫描加密使用污位*
Pub Date : 2022-05-23 DOI: 10.1109/ETS54262.2022.9810399
Jonti Talukdar, Arjun Chaudhuri, K. Chakrabarty
We propose TaintLock, a lightweight dynamic scan data authentication and encryption scheme that performs per-pattern authentication and encryption using taint and signature bits embedded within the test pattern. To prevent IP theft, we pair TaintLock with truly random logic locking (TRLL) to ensure resilience against both Oracle-guided and Oracle-free attacks, including scan deobfuscation attacks. TaintLock uses a substitution-permutation (SP) network to cryptographically authenticate each test pattern using embedded taint and signature bits. It further uses cryptographically generated keys to encrypt scan data for unauthenticated users dynamically. We show that it offers a low overhead, non-intrusive secure scan solution without impacting test coverage or test time while preventing IP theft.
我们提出了TaintLock,一个轻量级的动态扫描数据认证和加密方案,它使用嵌入在测试模式中的污点和签名位执行每个模式的认证和加密。为了防止IP被盗,我们将TaintLock与真正的随机逻辑锁定(TRLL)配对,以确保对oracle引导和无oracle攻击的弹性,包括扫描去混淆攻击。TaintLock使用替换置换(SP)网络,使用嵌入的污点和签名位对每个测试模式进行加密验证。它进一步使用加密生成的密钥动态地为未经身份验证的用户加密扫描数据。我们表明,它提供了一个低开销,非侵入式安全扫描解决方案,而不会影响测试覆盖率或测试时间,同时防止IP盗窃。
{"title":"TaintLock: Preventing IP Theft through Lightweight Dynamic Scan Encryption using Taint Bits*","authors":"Jonti Talukdar, Arjun Chaudhuri, K. Chakrabarty","doi":"10.1109/ETS54262.2022.9810399","DOIUrl":"https://doi.org/10.1109/ETS54262.2022.9810399","url":null,"abstract":"We propose TaintLock, a lightweight dynamic scan data authentication and encryption scheme that performs per-pattern authentication and encryption using taint and signature bits embedded within the test pattern. To prevent IP theft, we pair TaintLock with truly random logic locking (TRLL) to ensure resilience against both Oracle-guided and Oracle-free attacks, including scan deobfuscation attacks. TaintLock uses a substitution-permutation (SP) network to cryptographically authenticate each test pattern using embedded taint and signature bits. It further uses cryptographically generated keys to encrypt scan data for unauthenticated users dynamically. We show that it offers a low overhead, non-intrusive secure scan solution without impacting test coverage or test time while preventing IP theft.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114512253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real-Time Control-Flow Integrity for Multicore Mixed-Criticality IoT Systems 多核混合临界物联网系统的实时控制流完整性
Pub Date : 2022-05-23 DOI: 10.1109/ETS54262.2022.9810441
Vahid Eftekhari Moghadam, P. Prinetto, Gianluca Roascio
The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-critical or safety-critical applications domains, like automotive or aeronautical, make devices attractive targets for attackers. Nowadays, several of these are mixed-criticality systems, i.e., they run both high-criticality tasks (e.g., a car control system) and low-criticality ones (e.g., infotainment). High-criticality routines often employ Real-Time Operating Systems (RTOS) to enforce hard real-time requirements, while the tasks with lower constraints can be delegated to more generic-purpose operating systems (GPOS).Much of the control code for these devices is written in memory-unsafe languages such as C and C++. This makes them susceptible to powerful binary attacks, such as the famous Return-Oriented Programming (ROP). Control-Flow Integrity (CFI) is the most investigated security technique to protect against such threats. At now, CFI solutions for real-time embedded systems are not as mature as the ones for general-purpose systems, and even more, there is a lack of in-depth studies on how different operating systems with different security requirements and timing constraints can coexist on a single multicore platform.This paper aims at drawing attention to the subject, discussing the current scientific proposal, and in turn proposing a solution for an optimized asymmetric verification system for execution integrity. By using an embedded hypervisor, predefined cores could be dedicated to only high or low-criticality tasks, with the high-priority core being monitored by the lower-criticality core, relying on offline binary instrumentation and a light exchange of information and signals at runtime. The work also presents preliminary results about a possible implementation for multicore ARM platforms, running both RTOS and GPOS, both in terms of security and performance penalties.
物联网(IoT)的普及以及智能控制系统在许多关键任务或安全关键应用领域(如汽车或航空)的使用,使设备成为攻击者的诱人目标。如今,其中一些是混合临界系统,即它们既运行高临界任务(例如,汽车控制系统),也运行低临界任务(例如,信息娱乐)。高临界例程通常使用实时操作系统(RTOS)来执行硬实时需求,而具有较低约束的任务可以委托给更通用的操作系统(GPOS)。这些设备的大部分控制代码都是用内存不安全的语言(如C和c++)编写的。这使得它们容易受到强大的二进制攻击,例如著名的面向返回编程(ROP)。控制流完整性(CFI)是研究最多的防范此类威胁的安全技术。目前,实时嵌入式系统的CFI解决方案还没有通用系统的CFI解决方案成熟,更缺乏对具有不同安全需求和时间约束的不同操作系统如何在单一多核平台上共存的深入研究。本文旨在引起人们对这一问题的关注,讨论当前的科学建议,并提出一个优化的非对称执行完整性验证系统的解决方案。通过使用嵌入式管理程序,预定义的核心可以只用于高或低临界任务,高优先级核心由低临界核心监视,依赖于离线二进制检测和运行时信息和信号的少量交换。这项工作还提出了在多核ARM平台上可能实现的初步结果,同时运行RTOS和GPOS,无论是在安全性还是性能方面。
{"title":"Real-Time Control-Flow Integrity for Multicore Mixed-Criticality IoT Systems","authors":"Vahid Eftekhari Moghadam, P. Prinetto, Gianluca Roascio","doi":"10.1109/ETS54262.2022.9810441","DOIUrl":"https://doi.org/10.1109/ETS54262.2022.9810441","url":null,"abstract":"The spread of the Internet of Things (IoT) and the use of smart control systems in many mission-critical or safety-critical applications domains, like automotive or aeronautical, make devices attractive targets for attackers. Nowadays, several of these are mixed-criticality systems, i.e., they run both high-criticality tasks (e.g., a car control system) and low-criticality ones (e.g., infotainment). High-criticality routines often employ Real-Time Operating Systems (RTOS) to enforce hard real-time requirements, while the tasks with lower constraints can be delegated to more generic-purpose operating systems (GPOS).Much of the control code for these devices is written in memory-unsafe languages such as C and C++. This makes them susceptible to powerful binary attacks, such as the famous Return-Oriented Programming (ROP). Control-Flow Integrity (CFI) is the most investigated security technique to protect against such threats. At now, CFI solutions for real-time embedded systems are not as mature as the ones for general-purpose systems, and even more, there is a lack of in-depth studies on how different operating systems with different security requirements and timing constraints can coexist on a single multicore platform.This paper aims at drawing attention to the subject, discussing the current scientific proposal, and in turn proposing a solution for an optimized asymmetric verification system for execution integrity. By using an embedded hypervisor, predefined cores could be dedicated to only high or low-criticality tasks, with the high-priority core being monitored by the lower-criticality core, relying on offline binary instrumentation and a light exchange of information and signals at runtime. The work also presents preliminary results about a possible implementation for multicore ARM platforms, running both RTOS and GPOS, both in terms of security and performance penalties.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical Memory Diagnosis 分层记忆诊断
Pub Date : 2022-05-23 DOI: 10.1109/ETS54262.2022.9810467
G. Medeiros, M. Fieback, A. Gebregiorgis, M. Taouil, L. Bolzani, S. Hamdioui
High-quality memory diagnosis methodologies are critical enablers for scaled memory devices as they reduce time to market and provide valuable information regarding test escapes and customer returns. This paper presents an efficient Hierarchical Memory Diagnosis (HMD) approach that accurately diagnoses faults in the entire memory. Faults are diagnosed hierarchically; first, their location, then their nature (i.e., static or dynamic), and finally, their functional fault model. The HMD approach leads to a more accurate diagnostic, enabling the precise identification of yield loss causes.
高质量的内存诊断方法是扩展内存设备的关键推动者,因为它们缩短了上市时间,并提供有关测试逃逸和客户返回的宝贵信息。提出了一种高效的层次记忆诊断方法,可以准确诊断整个记忆中的故障。故障分级诊断;首先是它们的位置,然后是它们的性质(即,静态或动态),最后是它们的功能故障模型。HMD方法可以进行更准确的诊断,能够精确识别产量损失的原因。
{"title":"Hierarchical Memory Diagnosis","authors":"G. Medeiros, M. Fieback, A. Gebregiorgis, M. Taouil, L. Bolzani, S. Hamdioui","doi":"10.1109/ETS54262.2022.9810467","DOIUrl":"https://doi.org/10.1109/ETS54262.2022.9810467","url":null,"abstract":"High-quality memory diagnosis methodologies are critical enablers for scaled memory devices as they reduce time to market and provide valuable information regarding test escapes and customer returns. This paper presents an efficient Hierarchical Memory Diagnosis (HMD) approach that accurately diagnoses faults in the entire memory. Faults are diagnosed hierarchically; first, their location, then their nature (i.e., static or dynamic), and finally, their functional fault model. The HMD approach leads to a more accurate diagnostic, enabling the precise identification of yield loss causes.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125874110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Path Delay with BTI Recovery Effect 具有BTI恢复效应的路径延迟研究
Pub Date : 2022-05-23 DOI: 10.1109/ETS54262.2022.9810373
Jiebing Wu, Yongsheng Sun, Yuan Wang, Yukai Lin, M. Fan, Junlin Huang
Aging degradation dominated by bias temperature instability (BTI) effect is one of the important considerations in system on chip (SOC) design margin. Research on path delay with BTI recovery effect which mitigates degradation is meaningful to set a reasonable aging margin. Since BTI recovery effect known in transistor level occurs very fast, it is a challenge to sample aged path delay in a short interval. In this paper, we propose an aging monitor to investigate the impact of BTI recovery effect on path delay degradation (Δdelay) in nanosecond intervals. The results show that the power function of recovery time accurately fits the trend of Δdelay after the removal of stress. The higher the stress voltage, the faster the absolute value of Δdelay recovers. Increasing stress time obviously reduces the recovery speed of Δdelay. It’s note that BTI recovery effect occurs not only after the removal of stress but also during AC stress. Therefore, the Δdelay is so dependent on stress type that the Δdelay with BTI recovery is 0.2 times of that without BTI recovery. The silicon data also contributes to aging model’s calibration by the introduction of BTI recovery coefficient, which has a ~4% design margin benefit in a 1GHz SOC design.
以偏置温度不稳定性(BTI)效应为主导的老化退化是影响片上系统(SOC)设计余量的重要因素之一。研究具有BTI恢复效应的路径延迟,对设置合理的老化裕度具有重要意义。由于晶体管级已知的BTI恢复效应发生得非常快,因此在短时间间隔内采样老化路径延迟是一个挑战。在本文中,我们提出了一个老化监视器来研究BTI恢复效应对路径延迟退化的影响(Δdelay)在纳秒间隔。结果表明,去除应力后,恢复时间的幂函数与Δdelay的趋势吻合较好。应力电压越高,Δdelay绝对值恢复得越快。增加应力时间明显降低Δdelay的恢复速度。值得注意的是,BTI恢复效应不仅发生在去除应力之后,也发生在交流应力期间。因此,Δdelay对应力类型的依赖性很大,有BTI恢复的Δdelay是没有BTI恢复的Δdelay的0.2倍。通过引入BTI恢复系数,硅数据还有助于老化模型的校准,在1GHz SOC设计中具有~4%的设计边际效益。
{"title":"Research on Path Delay with BTI Recovery Effect","authors":"Jiebing Wu, Yongsheng Sun, Yuan Wang, Yukai Lin, M. Fan, Junlin Huang","doi":"10.1109/ETS54262.2022.9810373","DOIUrl":"https://doi.org/10.1109/ETS54262.2022.9810373","url":null,"abstract":"Aging degradation dominated by bias temperature instability (BTI) effect is one of the important considerations in system on chip (SOC) design margin. Research on path delay with BTI recovery effect which mitigates degradation is meaningful to set a reasonable aging margin. Since BTI recovery effect known in transistor level occurs very fast, it is a challenge to sample aged path delay in a short interval. In this paper, we propose an aging monitor to investigate the impact of BTI recovery effect on path delay degradation (Δdelay) in nanosecond intervals. The results show that the power function of recovery time accurately fits the trend of Δdelay after the removal of stress. The higher the stress voltage, the faster the absolute value of Δdelay recovers. Increasing stress time obviously reduces the recovery speed of Δdelay. It’s note that BTI recovery effect occurs not only after the removal of stress but also during AC stress. Therefore, the Δdelay is so dependent on stress type that the Δdelay with BTI recovery is 0.2 times of that without BTI recovery. The silicon data also contributes to aging model’s calibration by the introduction of BTI recovery coefficient, which has a ~4% design margin benefit in a 1GHz SOC design.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125882785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Memristor-based security primitives 基于忆阻器的安全原语
Pub Date : 2022-05-23 DOI: 10.1109/ETS54262.2022.9810403
Sergio Vinagrero Gutierrez
With the rapid growth of IoT and embedded devices, the development of low power, high density, high performance SoCs has pushed the embedded memories to their limits and opened the field to the development of emerging memory technologies. The Resistive Random Access Memory (ReRAM) has emerged as a promising choice for embedded memories due to its reduced read/write latency and high CMOS integration capability. Intrinsic properties of ReRAMs make them suitable for the implementation of basic security primitives such as Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs). The studies to be carried out during this thesis will allow the creation of robust, low cost and reliable security primitives by exploiting the inner variability of memristive technologies.
随着物联网和嵌入式设备的快速发展,低功耗、高密度、高性能soc的发展将嵌入式存储器推向了极限,为新兴存储技术的发展打开了大门。电阻式随机存取存储器(ReRAM)已成为嵌入式存储器的一个有前途的选择,因为它减少了读/写延迟和高CMOS集成能力。reram的固有属性使其适合于实现基本的安全原语,如物理不可克隆函数(puf)和真随机数生成器(trng)。在本文中进行的研究将允许通过利用记忆技术的内部可变性来创建健壮,低成本和可靠的安全原语。
{"title":"Memristor-based security primitives","authors":"Sergio Vinagrero Gutierrez","doi":"10.1109/ETS54262.2022.9810403","DOIUrl":"https://doi.org/10.1109/ETS54262.2022.9810403","url":null,"abstract":"With the rapid growth of IoT and embedded devices, the development of low power, high density, high performance SoCs has pushed the embedded memories to their limits and opened the field to the development of emerging memory technologies. The Resistive Random Access Memory (ReRAM) has emerged as a promising choice for embedded memories due to its reduced read/write latency and high CMOS integration capability. Intrinsic properties of ReRAMs make them suitable for the implementation of basic security primitives such as Physically Unclonable Functions (PUFs) and True Random Number Generators (TRNGs). The studies to be carried out during this thesis will allow the creation of robust, low cost and reliable security primitives by exploiting the inner variability of memristive technologies.","PeriodicalId":334931,"journal":{"name":"2022 IEEE European Test Symposium (ETS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 IEEE European Test Symposium (ETS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1