首页 > 最新文献

Workshop on Hardware and Architectural Support for Security and Privacy最新文献

英文 中文
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers 短论文:共享NISQ量子计算机的设备和位置特定指纹
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505261
Mi Allen, Deng Shuwen, Szefer Jakub
Fingerprinting of quantum computer devices is a new threat that poses a challenge to shared, cloud-based quantum computers. Fingerprinting can allow adversaries to map quantum computer infras-tructures, uniquely identify cloud-based devices which otherwise have no public identifiers, and it can assist other adversarial attacks. This work shows idle tomography-based fingerprinting method based on crosstalk-induced errors in NISQ quantum computers. The device- and locality-specific fingerprinting results show prediction accuracy values of 99 . 1% and 95 . 3%, respectively.
量子计算机设备的指纹识别是对基于云的共享量子计算机构成挑战的新威胁。指纹识别可以让攻击者映射量子计算机基础设施,唯一地识别基于云的设备,否则没有公共标识符,它可以帮助其他对抗性攻击。本工作展示了NISQ量子计算机中基于串扰诱导误差的空闲层析指纹识别方法。设备和地点特定的指纹识别结果显示预测精度值为99。1%和95。3%,分别。
{"title":"Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers","authors":"Mi Allen, Deng Shuwen, Szefer Jakub","doi":"10.1145/3505253.3505261","DOIUrl":"https://doi.org/10.1145/3505253.3505261","url":null,"abstract":"Fingerprinting of quantum computer devices is a new threat that poses a challenge to shared, cloud-based quantum computers. Fingerprinting can allow adversaries to map quantum computer infras-tructures, uniquely identify cloud-based devices which otherwise have no public identifiers, and it can assist other adversarial attacks. This work shows idle tomography-based fingerprinting method based on crosstalk-induced errors in NISQ quantum computers. The device- and locality-specific fingerprinting results show prediction accuracy values of 99 . 1% and 95 . 3%, respectively.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115612121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection trust -IoT:基于物联网中可信设备功率分析的智能生态系统,用于硬件木马检测
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505262
Hawzhin Mohammed, Faiq Khalid, P. Sawyer, Gabriella V. Cataloni, S. R. Hasan
Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or need dataset generation from non-trusted RC-IoT devices or both. We argue that the health of modern RC-IoT devices requires a final line of defense against possible hardware attacks that go undetected during the IC design and test process. Hence, in this paper, we propose a defense methodology against non-zero-day and zero-day attacks, leveraging machine learning techniques trained on the dataset obtained without design time intervention and using ‘only’ trusted IoT devices. In the process, a complete eco-system is developed where data is generated through a trusted group of devices, and machine learning is done on these trusted datasets. Next, this trusted trained model is deployed in regular IoT systems that contain untrusted devices, where the attack on untrusted devices can be detected in real-time. Our results indicate that for non-zero-day attacks, the proposed technique can concurrently detect DoS and power depletion attacks with an accuracy of about 80%. Similarly, zero-day attack experiments are able to detect the attack without fail as well.
现代资源受限(RC)物联网(IoT)设备受到多种类型的攻击,包括硬件级攻击。大多数现有的最先进的解决方案都是侵入性的,需要昂贵的设计时间干预,或者需要从不可信的RC-IoT设备生成数据集,或者两者兼而有之。我们认为,现代RC-IoT设备的健康需要最后一道防线,以抵御在IC设计和测试过程中未被检测到的可能的硬件攻击。因此,在本文中,我们提出了一种针对非零日攻击和零日攻击的防御方法,利用在没有设计时间干预的情况下获得的数据集上训练的机器学习技术,并使用“仅”可信的物联网设备。在这个过程中,一个完整的生态系统被开发出来,数据是通过一组可信的设备生成的,机器学习是在这些可信的数据集上完成的。接下来,将此可信训练模型部署在包含不受信任设备的常规物联网系统中,可以实时检测对不受信任设备的攻击。我们的研究结果表明,对于非零日攻击,所提出的技术可以同时检测DoS和功耗攻击,准确率约为80%。同样,零日攻击实验也能够毫无失误地检测到攻击。
{"title":"InTrust-IoT: Intelligent Ecosystem based on Power Profiling of Trusted device(s) in IoT for Hardware Trojan Detection","authors":"Hawzhin Mohammed, Faiq Khalid, P. Sawyer, Gabriella V. Cataloni, S. R. Hasan","doi":"10.1145/3505253.3505262","DOIUrl":"https://doi.org/10.1145/3505253.3505262","url":null,"abstract":"Modern Resource-Constrained (RC) Internet of Things (IoT) devices are subject to several types of attacks, including hardware-level attacks. Most of the existing state-of-the-art solutions are invasive, require expensive design time interventions, or need dataset generation from non-trusted RC-IoT devices or both. We argue that the health of modern RC-IoT devices requires a final line of defense against possible hardware attacks that go undetected during the IC design and test process. Hence, in this paper, we propose a defense methodology against non-zero-day and zero-day attacks, leveraging machine learning techniques trained on the dataset obtained without design time intervention and using ‘only’ trusted IoT devices. In the process, a complete eco-system is developed where data is generated through a trusted group of devices, and machine learning is done on these trusted datasets. Next, this trusted trained model is deployed in regular IoT systems that contain untrusted devices, where the attack on untrusted devices can be detected in real-time. Our results indicate that for non-zero-day attacks, the proposed technique can concurrently detect DoS and power depletion attacks with an accuracy of about 80%. Similarly, zero-day attack experiments are able to detect the attack without fail as well.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SPARSE: Spatially Aware LFI Resilient State Machine Encoding 稀疏:空间感知LFI弹性状态机编码
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505254
Muhtadi Choudhury, Shahin Tajik, Domenic Forte
As finite state machines (FSMs) control the behavior of sequential circuits, they can be a target for attacks. With laser-based fault injection (LFI), an adversary may attain unauthorized access to sensitive states by altering the values of individual state flip-flops (FFs). Although standard error correction/detection techniques improve FSM resiliency, all states and FFs of an FSM are assumed equally critical to protect, incurring significant overhead. In this paper, we introduce a novel spatial vulnerability metric to aid the security analysis, which precisely manifests the susceptibility of FSM designs to LFI based on state FF sensitivity and placement. A novel encoding and spatially aware physical design framework (SPARSE) are then proposed that co-optimize the FSM encoding and state FF placement to minimize LFI susceptibility. SPARSE’s encoding uses the minimum number of FFs by placing security-sensitive FFs a sufficient distance apart from other FFs. SPARSE is demonstrated on 5 benchmarks using commercial CAD tools and outperforms other FSM encoding schemes in terms of security, area, and PDP.
由于有限状态机(FSMs)控制顺序电路的行为,它们可能成为攻击的目标。使用基于激光的故障注入(LFI),攻击者可以通过改变单个状态触发器(ff)的值来获得对敏感状态的未经授权的访问。尽管标准的纠错/检测技术提高了FSM的弹性,但假定FSM的所有状态和ff对保护都同样重要,从而导致了显著的开销。在本文中,我们引入了一种新的空间脆弱性度量来辅助安全性分析,该度量精确地体现了FSM设计对LFI的敏感性,该脆弱性度量基于状态FF的敏感性和位置。然后提出了一种新的编码和空间感知物理设计框架(SPARSE),该框架协同优化FSM编码和状态FF放置,以最小化LFI敏感性。SPARSE的编码通过将安全敏感的ff与其他ff保持足够的距离来使用ff的最小数量。使用商业CAD工具在5个基准测试中演示了SPARSE,并且在安全性、面积和PDP方面优于其他FSM编码方案。
{"title":"SPARSE: Spatially Aware LFI Resilient State Machine Encoding","authors":"Muhtadi Choudhury, Shahin Tajik, Domenic Forte","doi":"10.1145/3505253.3505254","DOIUrl":"https://doi.org/10.1145/3505253.3505254","url":null,"abstract":"As finite state machines (FSMs) control the behavior of sequential circuits, they can be a target for attacks. With laser-based fault injection (LFI), an adversary may attain unauthorized access to sensitive states by altering the values of individual state flip-flops (FFs). Although standard error correction/detection techniques improve FSM resiliency, all states and FFs of an FSM are assumed equally critical to protect, incurring significant overhead. In this paper, we introduce a novel spatial vulnerability metric to aid the security analysis, which precisely manifests the susceptibility of FSM designs to LFI based on state FF sensitivity and placement. A novel encoding and spatially aware physical design framework (SPARSE) are then proposed that co-optimize the FSM encoding and state FF placement to minimize LFI susceptibility. SPARSE’s encoding uses the minimum number of FFs by placing security-sensitive FFs a sufficient distance apart from other FFs. SPARSE is demonstrated on 5 benchmarks using commercial CAD tools and outperforms other FSM encoding schemes in terms of security, area, and PDP.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research 可信执行环境的区块链应用的经验教训及其对未来研究的影响
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505259
Rabimba Karanjai, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao, W. Shi
Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in which critical software applications can execute securely in an isolated environment. Even under the circumstance that a host OS is compromised by an adversary, key security properties such as confidentiality and integrity of the software inside the TEEs can be guaranteed. The promise of integrity and security has driven developers to adopt it for use cases involving access control, PKS, IoT among other things. Among these applications include blockchain-related use cases. The usage of the TEEs doesn’t come without its own implementation challenges and potential pitfalls. In this paper, we examine the assumptions, security models, and operational environments of the proposed TEE use cases of blockchain-based applications. The exercise and analysis help the hardware TEE research community to identify some open challenges and opportunities for research and rethink the design of hardware TEEs in general.
现代计算机系统倾向于依赖大型可信计算基地(tcb)进行操作。为了解决TCB膨胀问题,硬件供应商开发了一些机制来支持或促进可信执行环境(TEE)的创建,在TEE中,关键软件应用程序可以在隔离的环境中安全地执行。即使在主机操作系统被攻击者破坏的情况下,tee内部软件的机密性和完整性等关键安全属性也可以得到保证。对完整性和安全性的承诺促使开发人员在涉及访问控制、PKS、物联网等用例中采用它。这些应用程序包括与区块链相关的用例。tee的使用有其自身的实现挑战和潜在的缺陷。在本文中,我们研究了基于区块链的应用程序的拟议TEE用例的假设、安全模型和操作环境。练习和分析有助于硬件TEE研究社区确定一些开放的挑战和研究机会,并重新思考硬件TEE的总体设计。
{"title":"Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research","authors":"Rabimba Karanjai, Lei Xu, Lin Chen, Fengwei Zhang, Zhimin Gao, W. Shi","doi":"10.1145/3505253.3505259","DOIUrl":"https://doi.org/10.1145/3505253.3505259","url":null,"abstract":"Modern computer systems tend to rely on large trusted computing bases (TCBs) for operations. To address the TCB bloating problem, hardware vendors have developed mechanisms to enable or facilitate the creation of a trusted execution environment (TEE) in which critical software applications can execute securely in an isolated environment. Even under the circumstance that a host OS is compromised by an adversary, key security properties such as confidentiality and integrity of the software inside the TEEs can be guaranteed. The promise of integrity and security has driven developers to adopt it for use cases involving access control, PKS, IoT among other things. Among these applications include blockchain-related use cases. The usage of the TEEs doesn’t come without its own implementation challenges and potential pitfalls. In this paper, we examine the assumptions, security models, and operational environments of the proposed TEE use cases of blockchain-based applications. The exercise and analysis help the hardware TEE research community to identify some open challenges and opportunities for research and rethink the design of hardware TEEs in general.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"187 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy 一种用于安全和隐私的量子电路混淆方法
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505260
A. Suresh, Abdullah Ash-Saki, Mahababul Alam, R. Topaloglu, Swaroop Ghosh
In the Noisy Intermediate-Scale Quantum (NISQ) realm, efficient quantum circuit compilation is critical to ensure successful computation. Several third-party compilers are improving the compilation times and depth/gate counts. Untrusted third parties or a particular version of a trusted compiler may allow an attacker to steal, clone, and/or reverse engineer the quantum circuit. We propose to obfuscate quantum circuits by employing dummy CNOT gates to prevent such threats. If the adversary clones the obfuscated design, he/she will get faulty results. We propose a metric-based dummy gate insertion process to ensure maximum corruption of functionality measured using Total Variation Distance (TVD) and validated using IBM’s noisy simulators. Our metric guided dummy gate insertion process achieves TVD of up to 28.83%, and performs 10.14% better than the average TVD and performs within 12.45% of the best obtainable TVD for the test benchmarks. The removal of dummy gates by the designer post-compilation to restore functionality as well as other finer details have been addressed.
在噪声中尺度量子(NISQ)领域,高效的量子电路编译是保证计算成功的关键。一些第三方编译器正在改进编译时间和深度/门计数。不受信任的第三方或受信任编译器的特定版本可能允许攻击者窃取、克隆和/或逆向工程量子电路。我们建议通过使用虚拟CNOT门来混淆量子电路以防止此类威胁。如果对手复制被混淆的设计,他/她将得到错误的结果。我们提出了一种基于度量的虚拟门插入过程,以确保使用总变化距离(TVD)测量并使用IBM的噪声模拟器进行验证的功能的最大损坏。我们的度量引导虚拟栅极插入工艺实现了高达28.83%的TVD,比平均TVD好10.14%,并且在测试基准中可获得的最佳TVD的12.45%以内。设计师在编译后删除虚拟门以恢复功能以及其他更精细的细节已经得到解决。
{"title":"Short Paper: A Quantum Circuit Obfuscation Methodology for Security and Privacy","authors":"A. Suresh, Abdullah Ash-Saki, Mahababul Alam, R. Topaloglu, Swaroop Ghosh","doi":"10.1145/3505253.3505260","DOIUrl":"https://doi.org/10.1145/3505253.3505260","url":null,"abstract":"In the Noisy Intermediate-Scale Quantum (NISQ) realm, efficient quantum circuit compilation is critical to ensure successful computation. Several third-party compilers are improving the compilation times and depth/gate counts. Untrusted third parties or a particular version of a trusted compiler may allow an attacker to steal, clone, and/or reverse engineer the quantum circuit. We propose to obfuscate quantum circuits by employing dummy CNOT gates to prevent such threats. If the adversary clones the obfuscated design, he/she will get faulty results. We propose a metric-based dummy gate insertion process to ensure maximum corruption of functionality measured using Total Variation Distance (TVD) and validated using IBM’s noisy simulators. Our metric guided dummy gate insertion process achieves TVD of up to 28.83%, and performs 10.14% better than the average TVD and performs within 12.45% of the best obtainable TVD for the test benchmarks. The removal of dummy gates by the designer post-compilation to restore functionality as well as other finer details have been addressed.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122539444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Memory Management for RISC-V Enclaves 一种新的RISC-V封装内存管理方法
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505257
Hao Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui, Fengwei Zhang
Trusted Execution Environment (TEE) is a popular technology to protect sensitive data and programs. Recent TEEs have proposed the concept of enclaves to execute code processing sensitive data, which cannot be tampered with even by a malicious OS. However, due to hardware limitations and security requirements, existing TEE architectures usually offer limited memory management, such as dynamic memory allocation, defragmentation, etc. In this paper, we present Ashman—a novel software-based memory management extension of TEE on RISC-V, including dynamic memory allocation, migration, and defragmentation. We integrate Ashman into a self-designed TEE and evaluate the performance on a real-world development board. Experimental results have shown that Ashman provides memory management functions similar to native user applications while ensuring enclave security without modifying hardware.
可信执行环境(TEE)是一种保护敏感数据和程序的流行技术。最近的tee提出了enclave的概念,用于执行处理敏感数据的代码,即使是恶意操作系统也无法篡改。然而,由于硬件限制和安全需求,现有TEE体系结构通常提供有限的内存管理,例如动态内存分配、碎片整理等。在本文中,我们提出了一个新的基于软件的内存管理扩展TEE在RISC-V,包括动态内存分配,迁移和碎片整理。我们将Ashman集成到自己设计的TEE中,并在实际开发板上评估其性能。实验结果表明,Ashman提供了类似于本地用户应用程序的内存管理功能,同时无需修改硬件即可确保enclave安全性。
{"title":"A Novel Memory Management for RISC-V Enclaves","authors":"Hao Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui, Fengwei Zhang","doi":"10.1145/3505253.3505257","DOIUrl":"https://doi.org/10.1145/3505253.3505257","url":null,"abstract":"Trusted Execution Environment (TEE) is a popular technology to protect sensitive data and programs. Recent TEEs have proposed the concept of enclaves to execute code processing sensitive data, which cannot be tampered with even by a malicious OS. However, due to hardware limitations and security requirements, existing TEE architectures usually offer limited memory management, such as dynamic memory allocation, defragmentation, etc. In this paper, we present Ashman—a novel software-based memory management extension of TEE on RISC-V, including dynamic memory allocation, migration, and defragmentation. We integrate Ashman into a self-designed TEE and evaluate the performance on a real-world development board. Experimental results have shown that Ashman provides memory management functions similar to native user applications while ensuring enclave security without modifying hardware.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115184211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code 迈向可信的物联网传感系统:实现PUF作为信任根和消息认证码的安全密钥生成器
Pub Date : 2021-10-18 DOI: 10.1145/3505253.3505258
Kota Yoshida, K. Suzaki, T. Fujino
Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are often composed of multiple components, i.e., a main device and subordinate sensors. The main device is responsible for gathering and processing the data from the subordinate sensor and reports the result to a server. In order to guarantee data correctness, we introduce two types of physically unclonable function (PUF): one for the main device and one for the subordinate sensor. The main device has a trusted execution environment (TEE) for critical processing, and the correctness of the TEE is guaranteed by remote attestation based on a PUF. The subordinate sensor sends the sensor data to the main device with a message authentication code (MAC) based on a PUF. We implemented a trusted IoT sensing system using a RISC-V Keystone with a PRINCE Glitch PUF for the main device and a Raspberry Pi that simulates a CMOS image sensor PUF for the subordinate sensor.
值得信赖的传感器数据对于物联网传感系统非常重要。因此,这些系统需要保证传感器数据是由正确的设备获取的,并且没有被篡改。然而,物联网传感系统可能非常复杂,通常由多个组件组成,即主设备和从属传感器。主设备负责从下级传感器收集和处理数据,并将结果报告给服务器。为了保证数据的正确性,我们引入了两种类型的物理不可克隆功能(PUF):一种用于主设备,一种用于从属传感器。主设备具有用于关键处理的可信执行环境(TEE), TEE的正确性通过基于PUF的远程认证来保证。从属传感器根据PUF将传感器数据与MAC (message authentication code)一起发送给主设备。我们使用RISC-V Keystone实现了一个可信的物联网传感系统,其主设备为PRINCE Glitch PUF,副传感器为模拟CMOS图像传感器PUF的树莓派。
{"title":"Towards Trusted IoT Sensing Systems: Implementing PUF as Secure Key Generator for Root of Trust and Message Authentication Code","authors":"Kota Yoshida, K. Suzaki, T. Fujino","doi":"10.1145/3505253.3505258","DOIUrl":"https://doi.org/10.1145/3505253.3505258","url":null,"abstract":"Trustworthy sensor data is important for IoT sensing systems. As such, these systems need to guarantee that the sensor data is acquired by the correct device and has not been tampered with. However, IoT sensing systems can be quite complex and are often composed of multiple components, i.e., a main device and subordinate sensors. The main device is responsible for gathering and processing the data from the subordinate sensor and reports the result to a server. In order to guarantee data correctness, we introduce two types of physically unclonable function (PUF): one for the main device and one for the subordinate sensor. The main device has a trusted execution environment (TEE) for critical processing, and the correctness of the TEE is guaranteed by remote attestation based on a PUF. The subordinate sensor sends the sensor data to the main device with a message authentication code (MAC) based on a PUF. We implemented a trusted IoT sensing system using a RISC-V Keystone with a PRINCE Glitch PUF for the main device and a Raspberry Pi that simulates a CMOS image sensor PUF for the subordinate sensor.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114568606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Practical and Scalable Security Verification of Secure Architectures 安全体系结构的实用和可扩展的安全验证
Pub Date : 2018-07-05 DOI: 10.1145/3505253.3505256
Jakub Szefer, Tianwei Zhang, R. Lee
We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. interactions between users, compute servers, network entities, etc. Meanwhile, internal verification considers the interactions between hardware and software components within each server. This verification framework is general-purpose and can be applied to a stand-alone server, or a large-scale distributed system. We evaluate our verification method on the CloudMonatt and HyperWall architectures as examples.
我们提出了一种新的实用框架,用于安全体系结构的安全验证。具体来说,我们将验证任务分为外部验证和内部验证。外部验证考虑外部协议,即用户、计算服务器、网络实体等之间的交互。同时,内部验证考虑每个服务器内硬件和软件组件之间的交互。此验证框架是通用的,可以应用于独立服务器或大型分布式系统。我们以CloudMonatt和HyperWall架构为例评估了我们的验证方法。
{"title":"Practical and Scalable Security Verification of Secure Architectures","authors":"Jakub Szefer, Tianwei Zhang, R. Lee","doi":"10.1145/3505253.3505256","DOIUrl":"https://doi.org/10.1145/3505253.3505256","url":null,"abstract":"We present a new and practical framework for security verification of secure architectures. Specifically, we break the verification task into external verification and internal verification. External verification considers the external protocols, i.e. interactions between users, compute servers, network entities, etc. Meanwhile, internal verification considers the interactions between hardware and software components within each server. This verification framework is general-purpose and can be applied to a stand-alone server, or a large-scale distributed system. We evaluate our verification method on the CloudMonatt and HyperWall architectures as examples.","PeriodicalId":342645,"journal":{"name":"Workshop on Hardware and Architectural Support for Security and Privacy","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126046787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Workshop on Hardware and Architectural Support for Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1