首页 > 最新文献

Workshop on Trustworthy Embedded Devices最新文献

英文 中文
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes 利用差分序列编码和卷积编码突破固定PUF块限制
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517304
Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, G. Sigl
Secret key generation with Physical Unclonable Functions (PUFs) is an alternative to conventional secure key storage with non-volatile memory. In a PUF, secret bits are generated by evaluating the internal state of a physical source. Typically, error correction is applied in two stages to remove the instability in the measurement that is caused by environmental influences. We present a new syndrome coding scheme, called Differential Sequence Coding (DSC), for the first error correction stage. DSC applies a fixed reliability criterion and searches the PUF output sequence sequentially until a number of suitable PUF outputs is found. This permits to guarantee the reliability of the indexed PUF outputs. Our analysis demonstrates that DSC is information theoretically secure and highly efficient. To the best of our knowledge, we are the first to propose a convolutional code with Viterbi decoder as second stage error correction for PUFs. We adapt an existing bounding technique for the output bit error probability to our scenario to make reliability statements without the need of laborious simulations. Aiming for a low implementation overhead in hardware, a serialized low complexity FPGA implementation of DSC and the Viterbi decoder is used in this work. For a reference SRAM PUF scenario, PUF size is reduced by 20% and the helper data size decreases by over 40% compared to the best referenced FPGA implementations in each class with a minor increase in the number of slices.
使用物理不可克隆函数(puf)生成密钥是使用非易失性存储器的传统安全密钥存储的替代方案。在PUF中,通过评估物理源的内部状态来生成秘密位。通常,误差校正分两个阶段应用,以消除由环境影响引起的测量中的不稳定性。我们提出了一种新的综合征编码方案,称为差分序列编码(DSC),用于第一个纠错阶段。DSC应用一个固定的可靠性标准,并按顺序搜索PUF输出序列,直到找到一些合适的PUF输出。这样可以保证索引PUF输出的可靠性。我们的分析表明,DSC在理论上是信息安全的和高效的。据我们所知,我们是第一个提出带有维特比解码器的卷积码作为puf的第二阶段纠错的人。我们将现有的输出误码概率边界技术应用于我们的场景,从而在不需要费力的模拟的情况下做出可靠性声明。为了降低硬件的实现开销,本文采用串行化的低复杂度FPGA实现DSC和Viterbi解码器。对于参考SRAM PUF场景,与每个类中最佳参考FPGA实现相比,PUF大小减少了20%,helper数据大小减少了40%以上,切片数量略有增加。
{"title":"Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes","authors":"Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, G. Sigl","doi":"10.1145/2517300.2517304","DOIUrl":"https://doi.org/10.1145/2517300.2517304","url":null,"abstract":"Secret key generation with Physical Unclonable Functions (PUFs) is an alternative to conventional secure key storage with non-volatile memory.\u0000 In a PUF, secret bits are generated by evaluating the internal state of a physical source. Typically, error correction is applied in two stages to remove the instability in the measurement that is caused by environmental influences.\u0000 We present a new syndrome coding scheme, called Differential Sequence Coding (DSC), for the first error correction stage. DSC applies a fixed reliability criterion and searches the PUF output sequence sequentially until a number of suitable PUF outputs is found. This permits to guarantee the reliability of the indexed PUF outputs. Our analysis demonstrates that DSC is information theoretically secure and highly efficient.\u0000 To the best of our knowledge, we are the first to propose a convolutional code with Viterbi decoder as second stage error correction for PUFs. We adapt an existing bounding technique for the output bit error probability to our scenario to make reliability statements without the need of laborious simulations.\u0000 Aiming for a low implementation overhead in hardware, a serialized low complexity FPGA implementation of DSC and the Viterbi decoder is used in this work.\u0000 For a reference SRAM PUF scenario, PUF size is reduced by 20% and the helper data size decreases by over 40% compared to the best referenced FPGA implementations in each class with a minor increase in the number of slices.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131107894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 54
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic 基于复合字段算法的流密码WG-16的高效硬件实现
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517305
Xinxin Fan, N. Zidarič, M. Aagaard, G. Gong
The Welch-Gong (WG) stream cipher family was designed based on the WG transformation and is able to generate keystreams with mathematically proven randomness properties such as long period, balance, ideal tuple distribution, ideal two-level autocorrelation and high and exact linear complexity. In this paper, we present a compact hardware architecture and its pipelined implementation of the stream cipher WG-16, an efficient instance of the WG stream cipher family, using composite field arithmetic and a newly proposed property of the trace function in tower field representation. Instead of using the original binary field F2^16, we demonstrate that its isomorphic tower field F(((2^2)^2)^2)^2 can lead to a more efficient hardware implementation. Efficient conversion matrices connecting the binary field F2^16 and the tower field F(((2^2)^2)^2)^2 are also derived. Our implementation results show that the pipelined WG-16 hardware core can achieve the throughput of 124 MHz at the cost of 478 slices in an FPGA and 552 MHz at the cost of 12,031 GEs in a 65 nm ASIC, respectively.
基于WG变换设计的Welch-Gong (WG)流密码族能够生成具有数学证明的长周期、平衡、理想元组分布、理想两级自相关和高精确线性复杂度等随机性特性的密钥流。本文利用复合域算法和塔域表示中跟踪函数的一个新性质,给出了一个紧凑的流密码WG-16的硬件结构及其流水线实现。WG-16是WG流密码族的一个有效实例。而不是使用原来的二进制域F2^16,我们证明了它的同构塔域F(((2^2)^2)^2)^2可以导致更有效的硬件实现。导出了连接二进制域F2^16和塔域F(((2^2)^2)^2)^2的有效转换矩阵。我们的实现结果表明,流水线化的WG-16硬件核心可以在FPGA中以478片的成本实现124 MHz的吞吐量,在65 nm ASIC中以12031个ge的成本实现552 MHz的吞吐量。
{"title":"Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic","authors":"Xinxin Fan, N. Zidarič, M. Aagaard, G. Gong","doi":"10.1145/2517300.2517305","DOIUrl":"https://doi.org/10.1145/2517300.2517305","url":null,"abstract":"The Welch-Gong (WG) stream cipher family was designed based on the WG transformation and is able to generate keystreams with mathematically proven randomness properties such as long period, balance, ideal tuple distribution, ideal two-level autocorrelation and high and exact linear complexity. In this paper, we present a compact hardware architecture and its pipelined implementation of the stream cipher WG-16, an efficient instance of the WG stream cipher family, using composite field arithmetic and a newly proposed property of the trace function in tower field representation. Instead of using the original binary field F2^16, we demonstrate that its isomorphic tower field F(((2^2)^2)^2)^2 can lead to a more efficient hardware implementation. Efficient conversion matrices connecting the binary field F2^16 and the tower field F(((2^2)^2)^2)^2 are also derived. Our implementation results show that the pipelined WG-16 hardware core can achieve the throughput of 124 MHz at the cost of 478 slices in an FPGA and 552 MHz at the cost of 12,031 GEs in a 65 nm ASIC, respectively.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127948272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Feasibly clonable functions 可行的克隆函数
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2528523
C. Boit, Clemens Helfmeier, Dmitry Nedospasov
Physically Unclonable Functions (PUF) are continuously being integrated into next generation security products. Nevertheless, their implementations and algorithms are the subject of much debate amongst the security community. One proposed use application for PUFs is replacing secure key storage. Yet the full unique PUF response of the most common type of PUFs can be recovered by using standard failure analysis equipment. SRAM PUFs used as key storage can only be considered to marginally improve security over conventional non-volatile key storage.
物理不可克隆功能(PUF)不断被集成到下一代安全产品中。尽管如此,它们的实现和算法仍然是安全社区中争论的主题。puf的一个建议用途是取代安全密钥存储。然而,通过使用标准故障分析设备,可以恢复最常见类型的PUF的完整独特PUF响应。与传统的非易失性密钥存储相比,用作密钥存储的SRAM puf只能略微提高安全性。
{"title":"Feasibly clonable functions","authors":"C. Boit, Clemens Helfmeier, Dmitry Nedospasov","doi":"10.1145/2517300.2528523","DOIUrl":"https://doi.org/10.1145/2517300.2528523","url":null,"abstract":"Physically Unclonable Functions (PUF) are continuously being integrated into next generation security products. Nevertheless, their implementations and algorithms are the subject of much debate amongst the security community. One proposed use application for PUFs is replacing secure key storage. Yet the full unique PUF response of the most common type of PUFs can be recovered by using standard failure analysis equipment. SRAM PUFs used as key storage can only be considered to marginally improve security over conventional non-volatile key storage.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126057325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical unclonable functions: devices for cryptostorage 物理不可克隆功能:用于加密存储的设备
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2528524
D. Merli, R. Plaga
The concept of the Physical Unclonable Function (PUF) is exhaustively characerised as an information storage device with a security mechanism that shall impede the duplication of its specified functionality and that is indivisible from its storage mechanism. Thereby, in analogy to cryptography (security mechanisms indivisible from the writing), PUF research and development is identified as the new security-engineering discipline of "cryptostorage". Previous PUF architectures are shown to conform to this framework. A preliminary classification scheme to organize future research and security evaluation of PUF-like primitives is developed.
物理不可克隆功能(PUF)的概念被详尽地描述为具有安全机制的信息存储设备,该安全机制应阻止其指定功能的复制,并且与其存储机制不可分割。因此,与密码学(与书写不可分割的安全机制)类似,PUF的研究和开发被确定为新的安全工程学科“加密存储”。以前的PUF体系结构符合这个框架。提出了一个初步的分类方案,用于组织今后对类puf原语的研究和安全性评价。
{"title":"Physical unclonable functions: devices for cryptostorage","authors":"D. Merli, R. Plaga","doi":"10.1145/2517300.2528524","DOIUrl":"https://doi.org/10.1145/2517300.2528524","url":null,"abstract":"The concept of the Physical Unclonable Function (PUF) is exhaustively characerised as an information storage device with a security mechanism that shall impede the duplication of its specified functionality and that is indivisible from its storage mechanism. Thereby, in analogy to cryptography (security mechanisms indivisible from the writing), PUF research and development is identified as the new security-engineering discipline of \"cryptostorage\". Previous PUF architectures are shown to conform to this framework. A preliminary classification scheme to organize future research and security evaluation of PUF-like primitives is developed.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bias-based modeling and entropy analysis of PUFs 基于偏差的puf建模与熵分析
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517301
Robbert van den Berg, B. Škorić, Vincent van der Leest
Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for secure key storage and anti-counterfeiting. For both applications it is imperative that PUFs provide enough entropy. The aim of this paper is to propose a new model for binary-output PUFs such as SRAM, DFF, Latch and Buskeeper PUFs, and a method to accurately estimate their entropy. In our model the measurable property of a PUF is its set of cell biases. We determine an upper bound on the "extractable entropy", i.e. the number of key bits that can be robustly extracted, by calculating the mutual information between the bias measurements done at enrollment and reconstruction. In previously known methods only uniqueness was studied using information-theoretic measures, while robustness was typically expressed in terms of error probabilities or distances. It is not always straightforward to use a combination of these two metrics in order to make an informed decision about the performance of different PUF types. Our new approach has the advantage that it simultaneously captures both of properties that are vital for key storage: uniqueness and robustness. Therefore it will be possible to fairly compare performance of PUF implementations using our new method. Statistical validation of the new methodology shows that it clearly captures both of these properties of PUFs. In other words: if one of these aspects (either uniqueness or robustness) is less than optimal, the extractable entropy decreases. Analysis on a large database of PUF measurement data shows very high entropy for SRAM PUFs, but rather poor results for all other memory-based PUFs in this database.
物理不可克隆函数(puf)正日益成为一种众所周知的安全原语,用于安全密钥存储和防伪。对于这两个应用程序,puf必须提供足够的熵。本文的目的是为SRAM、DFF、Latch和Buskeeper puf等二进制输出puf提出一种新的模型,并提出一种准确估计其熵的方法。在我们的模型中,PUF的可测量属性是它的单元偏差集。通过计算在登记和重建时进行的偏差测量之间的互信息,我们确定了“可提取熵”的上界,即可以鲁棒提取的密钥位的数量。在以前已知的方法中,只使用信息论方法研究唯一性,而鲁棒性通常用误差概率或距离来表示。为了对不同PUF类型的性能做出明智的决策,并不总是直接使用这两个指标的组合。我们的新方法的优点是它同时捕获了对密钥存储至关重要的两个属性:唯一性和健壮性。因此,使用我们的新方法公平地比较PUF实现的性能是可能的。新方法的统计验证表明,它清楚地捕获了puf的这两个属性。换句话说:如果这些方面中的一个(唯一性或鲁棒性)不是最优的,那么可提取的熵就会减少。对PUF测量数据的大型数据库的分析表明,SRAM PUF的熵非常高,而该数据库中所有其他基于内存的PUF的熵则相当差。
{"title":"Bias-based modeling and entropy analysis of PUFs","authors":"Robbert van den Berg, B. Škorić, Vincent van der Leest","doi":"10.1145/2517300.2517301","DOIUrl":"https://doi.org/10.1145/2517300.2517301","url":null,"abstract":"Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for secure key storage and anti-counterfeiting. For both applications it is imperative that PUFs provide enough entropy. The aim of this paper is to propose a new model for binary-output PUFs such as SRAM, DFF, Latch and Buskeeper PUFs, and a method to accurately estimate their entropy. In our model the measurable property of a PUF is its set of cell biases. We determine an upper bound on the \"extractable entropy\", i.e. the number of key bits that can be robustly extracted, by calculating the mutual information between the bias measurements done at enrollment and reconstruction.\u0000 In previously known methods only uniqueness was studied using information-theoretic measures, while robustness was typically expressed in terms of error probabilities or distances. It is not always straightforward to use a combination of these two metrics in order to make an informed decision about the performance of different PUF types. Our new approach has the advantage that it simultaneously captures both of properties that are vital for key storage: uniqueness and robustness. Therefore it will be possible to fairly compare performance of PUF implementations using our new method. Statistical validation of the new methodology shows that it clearly captures both of these properties of PUFs. In other words: if one of these aspects (either uniqueness or robustness) is less than optimal, the extractable entropy decreases. Analysis on a large database of PUF measurement data shows very high entropy for SRAM PUFs, but rather poor results for all other memory-based PUFs in this database.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129012161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Secure PRNG seeding on commercial off-the-shelf microcontrollers 在商业现成的微控制器上安全的PRNG播种
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517306
A. V. Herrewege, Vincent van der Leest, André Schaller, S. Katzenbeisser, I. Verbauwhede
The generation of high quality random numbers is crucial to many cryptographic applications, including cryptographic protocols, secret of keys, nonces or salts. Their values must contain enough randomness to be unpredictable to attackers. Pseudo-random number generators require initial data with high entropy as a seed to produce a large stream of high quality random data. Yet, despite the importance of randomness, proper high quality random number generation is often ignored. Primarily embedded devices often suffer from weak random number generators. In this work, we focus on identifying and evaluating SRAM in commercial off-the-shelf microcontrollers as an entropy source for PRNG seeding. We measure and evaluate the SRAM start-up patterns of two popular types of microcontrollers, a STMicroelectronics STM32F100R8 and a Microchip PIC16F1825. We also present an efficient software-only architecture for secure PRNG seeding. After analyzing over 1000000 measurements in total, we conclude that of these two devices, the PIC16F1825 cannot be used to securely seed a PRNG. The STM32F100R8, however, has the ability to generate very strong seeds from the noise in its SRAM start-up pattern. These seeds can then be used to ensure a PRNG generates high quality data.
高质量随机数的生成对许多密码学应用至关重要,包括密码学协议、密钥秘密、随机数或盐。它们的值必须包含足够的随机性,使攻击者无法预测。伪随机数生成器需要高熵的初始数据作为种子来产生大量高质量的随机数据流。然而,尽管随机性的重要性,适当的高质量随机数生成往往被忽视。主要是嵌入式设备经常受到弱随机数生成器的影响。在这项工作中,我们专注于识别和评估商业现成微控制器中的SRAM作为PRNG播种的熵源。我们测量和评估了两种流行类型的微控制器的SRAM启动模式,意法半导体STM32F100R8和Microchip PIC16F1825。我们还提出了一种用于安全PRNG播种的高效的纯软件架构。在总共分析了超过1000000次测量后,我们得出结论,在这两个器件中,PIC16F1825不能用于安全地播种PRNG。然而,STM32F100R8能够从其SRAM启动模式中的噪声中产生非常强的种子。这些种子可以用来确保PRNG生成高质量的数据。
{"title":"Secure PRNG seeding on commercial off-the-shelf microcontrollers","authors":"A. V. Herrewege, Vincent van der Leest, André Schaller, S. Katzenbeisser, I. Verbauwhede","doi":"10.1145/2517300.2517306","DOIUrl":"https://doi.org/10.1145/2517300.2517306","url":null,"abstract":"The generation of high quality random numbers is crucial to many cryptographic applications, including cryptographic protocols, secret of keys, nonces or salts. Their values must contain enough randomness to be unpredictable to attackers. Pseudo-random number generators require initial data with high entropy as a seed to produce a large stream of high quality random data. Yet, despite the importance of randomness, proper high quality random number generation is often ignored. Primarily embedded devices often suffer from weak random number generators.\u0000 In this work, we focus on identifying and evaluating SRAM in commercial off-the-shelf microcontrollers as an entropy source for PRNG seeding. We measure and evaluate the SRAM start-up patterns of two popular types of microcontrollers, a STMicroelectronics STM32F100R8 and a Microchip PIC16F1825. We also present an efficient software-only architecture for secure PRNG seeding. After analyzing over 1000000 measurements in total, we conclude that of these two devices, the PIC16F1825 cannot be used to securely seed a PRNG. The STM32F100R8, however, has the ability to generate very strong seeds from the noise in its SRAM start-up pattern. These seeds can then be used to ensure a PRNG generates high quality data.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129148488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Securing implantable cardiac medical devices: use of radio frequency energy harvesting 保护植入式心脏医疗装置:使用射频能量收集
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517307
N. Ellouze, M. Allouche, H. B. Ahmed, S. Rekhis, N. Boudriga
Implantable Medical Devices (IMDs) are surgically implanted into a human body to collect physiological data and perform medical therapeutic functions. They are increasingly being used to improve the quality of life of patients by treating chronic ailments such as cardiac arrhythmia, diabetes, and Parkinson's disease. Wireless IMDs have shown recently important security concerns. In particular, it has been stated that lethal attacks can be launched on these devices. In this paper, we propose a solution to secure IMDs against unauthorized access, battery depletion, and denial of service attacks. A Radio Frequency energy harvesting solution is used to design a powerless mutual authentication protocol. A technique for dynamic biometric keys extraction from electrocardiogram signals collected at both sides (the programmer and the IMD) is used, allowing to secure access to the IMD devices in regular and emergency situations.
植入式医疗设备(imd)是通过外科手术植入人体,收集生理数据并执行医学治疗功能的设备。通过治疗心律失常、糖尿病和帕金森氏症等慢性疾病,它们越来越多地被用于改善患者的生活质量。无线imd最近显示出重要的安全问题。特别是,有人指出,可以对这些装置发动致命攻击。在本文中,我们提出了一种解决方案来保护imd免受未经授权的访问,电池耗尽和拒绝服务攻击。采用射频能量收集方案设计了无源互鉴协议。使用了从两侧(编程器和IMD)收集的心电图信号中提取动态生物识别密钥的技术,允许在常规和紧急情况下安全地访问IMD设备。
{"title":"Securing implantable cardiac medical devices: use of radio frequency energy harvesting","authors":"N. Ellouze, M. Allouche, H. B. Ahmed, S. Rekhis, N. Boudriga","doi":"10.1145/2517300.2517307","DOIUrl":"https://doi.org/10.1145/2517300.2517307","url":null,"abstract":"Implantable Medical Devices (IMDs) are surgically implanted into a human body to collect physiological data and perform medical therapeutic functions. They are increasingly being used to improve the quality of life of patients by treating chronic ailments such as cardiac arrhythmia, diabetes, and Parkinson's disease. Wireless IMDs have shown recently important security concerns. In particular, it has been stated that lethal attacks can be launched on these devices. In this paper, we propose a solution to secure IMDs against unauthorized access, battery depletion, and denial of service attacks. A Radio Frequency energy harvesting solution is used to design a powerless mutual authentication protocol. A technique for dynamic biometric keys extraction from electrocardiogram signals collected at both sides (the programmer and the IMD) is used, allowing to secure access to the IMD devices in regular and emergency situations.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133091907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Machine code verification of a tiny ARM hypervisor 一个微小的ARM管理程序的机器码验证
Pub Date : 2013-11-04 DOI: 10.1145/2517300.2517302
M. Dam, R. Guanciale, Hamed Nemati
Hypervisors are low level execution platforms that provide isolated partitions on shared resources, allowing to design secure systems without using dedicated hardware devices. A key requirement of this kind of solution is the formal verification of the software trusted computing base, preferably at the binary level. We accomplish a detailed verification of an ARMv7 tiny hypervisor, proving its correctness at the machine code level. We present our verification strategy, which mixes the usage of the theorem prover HOL4, the computation of weakest preconditions, and the use of SMT solvers to largely automate the verification process. The automation relies on an integration of HOL4 with BAP, the Binary Analysis Platform developed at CMU. To enable the adoption of the BAP back-ends to compute weakest preconditions and control flow graphs, a HOL4-based tool was implemented that transforms ARMv7 assembly programs to the BAP Intermediate Language. Since verifying contracts by computing the weakest precondition depends on resolving indirect jumps, we implemented a procedure that integrates SMT solvers and BAP to discover all the possible assignments to the indirect jumps under the contract precondition.
管理程序是在共享资源上提供隔离分区的低级执行平台,允许在不使用专用硬件设备的情况下设计安全的系统。这种解决方案的一个关键要求是对软件可信计算库的形式化验证,最好是在二进制级别上。我们完成了对ARMv7微型管理程序的详细验证,证明了其在机器码级别上的正确性。我们提出了我们的验证策略,该策略混合了定理证明器HOL4的使用,最弱前提条件的计算以及SMT求解器的使用,以在很大程度上自动化验证过程。自动化依赖于HOL4与CMU开发的二进制分析平台BAP的集成。为了使BAP后端能够计算最弱前提条件和控制流图,实现了一个基于hol4的工具,将ARMv7汇编程序转换为BAP中间语言。由于通过计算最弱前提条件来验证契约依赖于解决间接跳跃,因此我们实现了一个集成SMT求解器和BAP的过程,以发现契约前提条件下对间接跳跃的所有可能赋值。
{"title":"Machine code verification of a tiny ARM hypervisor","authors":"M. Dam, R. Guanciale, Hamed Nemati","doi":"10.1145/2517300.2517302","DOIUrl":"https://doi.org/10.1145/2517300.2517302","url":null,"abstract":"Hypervisors are low level execution platforms that provide isolated partitions on shared resources, allowing to design secure systems without using dedicated hardware devices. A key requirement of this kind of solution is the formal verification of the software trusted computing base, preferably at the binary level. We accomplish a detailed verification of an ARMv7 tiny hypervisor, proving its correctness at the machine code level. We present our verification strategy, which mixes the usage of the theorem prover HOL4, the computation of weakest preconditions, and the use of SMT solvers to largely automate the verification process. The automation relies on an integration of HOL4 with BAP, the Binary Analysis Platform developed at CMU. To enable the adoption of the BAP back-ends to compute weakest preconditions and control flow graphs, a HOL4-based tool was implemented that transforms ARMv7 assembly programs to the BAP Intermediate Language. Since verifying contracts by computing the weakest precondition depends on resolving indirect jumps, we implemented a procedure that integrates SMT solvers and BAP to discover all the possible assignments to the indirect jumps under the contract precondition.","PeriodicalId":350304,"journal":{"name":"Workshop on Trustworthy Embedded Devices","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131511727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
Workshop on Trustworthy Embedded Devices
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1