首页 > 最新文献

2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)最新文献

英文 中文
Model building attacks on Physically Unclonable Functions using genetic programming 利用遗传编程对物理不可克隆函数的模型构建攻击
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581563
I. Saha, Ratan Rahul Jeldi, R. Chakraborty
Design, implementation and characterization of Physically Unclonable Functions (PUFs) in silicon have drawn considerable research interest in recent years. However, side-by-side, there are concerns that these PUF circuits, although physically unclonable, might be vulnerable to computational model-building attacks that compromise their security. In this work, we have used ideas from evolutionary computation, specifically genetic programming, to build accurate and compact mathematical models to approximate the response of FPGA-based ring oscillator PUFs (RO-PUFs). Hence, we have demonstrated the feasibility of a computationally simple scheme to model FPGA-based PUFs, and we believe this work will pave the way for similar attempts to attack more sophisticated PUF implementations.
物理不可克隆功能(puf)的设计、实现和表征近年来引起了广泛的研究兴趣。然而,这些PUF电路虽然在物理上是不可克隆的,但也可能容易受到计算模型构建攻击的影响,从而危及其安全性。在这项工作中,我们使用了进化计算的思想,特别是遗传规划,来建立精确和紧凑的数学模型来近似基于fpga的环形振荡器puf (ro - puf)的响应。因此,我们已经证明了一种计算简单的方案来模拟基于fpga的PUF的可行性,我们相信这项工作将为攻击更复杂的PUF实现的类似尝试铺平道路。
{"title":"Model building attacks on Physically Unclonable Functions using genetic programming","authors":"I. Saha, Ratan Rahul Jeldi, R. Chakraborty","doi":"10.1109/HST.2013.6581563","DOIUrl":"https://doi.org/10.1109/HST.2013.6581563","url":null,"abstract":"Design, implementation and characterization of Physically Unclonable Functions (PUFs) in silicon have drawn considerable research interest in recent years. However, side-by-side, there are concerns that these PUF circuits, although physically unclonable, might be vulnerable to computational model-building attacks that compromise their security. In this work, we have used ideas from evolutionary computation, specifically genetic programming, to build accurate and compact mathematical models to approximate the response of FPGA-based ring oscillator PUFs (RO-PUFs). Hence, we have demonstrated the feasibility of a computationally simple scheme to model FPGA-based PUFs, and we believe this work will pave the way for similar attempts to attack more sophisticated PUF implementations.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"15 1","pages":"41-44"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75220293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing 周期准确的信息保证基于证明的信号灵敏度跟踪
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581573
Yier Jin, Bo Yang, Y. Makris
We propose a new information assurance model which can dynamically track the information flow in circuit designs and hence protect sensitive data from malicious leakage. Relying on the Coq proof assistant platform, the new model maps register transfer level (RTL) codes written in hardware description languages (HDLs) into structural Coq representatives by assigning all input, output, and internal signal sensitivity levels. The signal sensitivity levels can be dynamically adjusted after each clock cycle based on proposed signal sensitivity transition rules. The development of data secrecy properties and theorem generation functions makes the translation process from security properties to Coq theorems independent of target circuits and, for the first time, makes it possible to construct a property library, facilitating (semi) automation of the proof. The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-of-the-art AES encryption design prohibiting the leakage of sensitive information caused by hardware Trojans inserted in RTL codes.
提出了一种新的信息保障模型,该模型可以动态跟踪电路设计中的信息流,从而保护敏感数据不被恶意泄露。依靠Coq证明辅助平台,新模型通过分配所有输入、输出和内部信号灵敏度级别,将用硬件描述语言(hdl)编写的寄存器传输级别(RTL)代码映射到结构Coq代表中。根据提出的信号灵敏度转移规则,可以在每个时钟周期后动态调整信号灵敏度级别。数据保密属性和定理生成函数的发展使得从安全属性到Coq定理的转换过程独立于目标电路,并首次使构造属性库成为可能,促进了证明的(半)自动化。所提出的周期精确信息保证方案已成功地在各种复杂的加密电路上进行了演示,从小型DES加密核心到最先进的AES加密设计,以防止因插入RTL代码的硬件木马而导致的敏感信息泄露。
{"title":"Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing","authors":"Yier Jin, Bo Yang, Y. Makris","doi":"10.1109/HST.2013.6581573","DOIUrl":"https://doi.org/10.1109/HST.2013.6581573","url":null,"abstract":"We propose a new information assurance model which can dynamically track the information flow in circuit designs and hence protect sensitive data from malicious leakage. Relying on the Coq proof assistant platform, the new model maps register transfer level (RTL) codes written in hardware description languages (HDLs) into structural Coq representatives by assigning all input, output, and internal signal sensitivity levels. The signal sensitivity levels can be dynamically adjusted after each clock cycle based on proposed signal sensitivity transition rules. The development of data secrecy properties and theorem generation functions makes the translation process from security properties to Coq theorems independent of target circuits and, for the first time, makes it possible to construct a property library, facilitating (semi) automation of the proof. The proposed cycle accurate information assurance scheme is successfully demonstrated on cryptographic circuits with various complexities from a small-scale DES encryption core to a state-of-the-art AES encryption design prohibiting the leakage of sensitive information caused by hardware Trojans inserted in RTL codes.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"127 1","pages":"99-106"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73201849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Side-Channel Analysis of MAC-Keccak MAC-Keccak的边信道分析
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581577
Mostafa M. I. Taha, P. Schaumont
NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) - 1), where (n ∈ [2 : ∞]) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MAC-Keccak implemented on a 32-bit Microblaze processor.
NIST最近完成了SHA-3竞赛,选择Keccak作为加密散列的新标准。在本文中,我们提出了一个全面的Keccak侧信道分析,当它与一个秘密密钥一起使用来生成消息认证码(MAC) (MAC-Keccak)时。我们的分析涵盖了算法的所有变化。我们证明了MAC-Keccak的侧信道电阻取决于所使用的密钥长度,并推导出最佳密钥长度为((n * rate) - 1),其中(n∈[2:∞])和速率为Keccak输入块大小。最后,本文通过在32位Microblaze处理器上实现的针对MAC-Keccak的实际攻击来证明我们的侧信道分析的可行性。
{"title":"Side-Channel Analysis of MAC-Keccak","authors":"Mostafa M. I. Taha, P. Schaumont","doi":"10.1109/HST.2013.6581577","DOIUrl":"https://doi.org/10.1109/HST.2013.6581577","url":null,"abstract":"NIST recently completed the SHA-3 competition with the selection of Keccak as the new standard for crypto-graphic hashing. In this paper, we present a comprehensive Side-Channel Analysis of Keccak, when it is used with a secret key to generate a Message Authentication Code (MAC) (MAC-Keccak). Our analysis covers all the variations of the algorithm. We show that the side-channel resistance of the MAC-Keccak depends on the key-length used, and we derive the optimum key-length as ((n * rate) - 1), where (n ∈ [2 : ∞]) and rate is the Keccak input block size. Finally, the paper demonstrates the feasibility of our side-channel analysis with a practical attack against MAC-Keccak implemented on a 32-bit Microblaze processor.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"92 9 1","pages":"125-130"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77283730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
On implementing trusted boot for embedded systems 嵌入式系统可信引导的实现
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581569
Obaid Khalid, C. Rolfes, A. Ibing
This paper presents an implementation of trusted boot for embedded systems. While in PCs the trusted computing hardware functionality is spread over CPU, memory controller hub (MCH), IO controller hub (ICH) and Trusted Platform Module (TPM), for embedded systems it is desirable to integrate the whole functionality in one system on chip. Our implementation is a two-processor design with LEON3 open source soft cores (SPARC V8 instruction set), coupled over an AHB interface. One of the processors acts as application processor, the other one as `secure' coprocessor. The application processor is synthesized with a boot ROM as static root of trust for measurement. The `secure' coprocessor runs TPM frmware and enables the application processor to boot and run different software while sealing corresponding keys and other secrets to the respective software identity (computed as hash value). We evaluate the design in a Virtex5 FPGA with respect to different measures like resource consumption, code sizes and start times. The `trusted boot' functionality is realised with a boot time increase of around 25% for a Linux system.
本文提出了一种嵌入式系统可信启动的实现方法。在pc中,可信计算硬件功能分布在CPU、内存控制器集线器(MCH)、IO控制器集线器(ICH)和可信平台模块(TPM)上,而对于嵌入式系统,希望将整个功能集成在一个芯片上的系统中。我们的实现是一个带有LEON3开源软核(SPARC V8指令集)的双处理器设计,通过AHB接口耦合。其中一个处理器充当应用处理器,另一个作为“安全”协处理器。应用处理器是用一个引导ROM作为测量的静态信任根来合成的。“安全”协处理器运行TPM固件,并使应用处理器能够启动和运行不同的软件,同时将相应的密钥和其他秘密密封到各自的软件身份(以散列值计算)。我们根据资源消耗、代码大小和启动时间等不同指标在Virtex5 FPGA中评估设计。对于Linux系统,“可信启动”功能的实现使启动时间增加了大约25%。
{"title":"On implementing trusted boot for embedded systems","authors":"Obaid Khalid, C. Rolfes, A. Ibing","doi":"10.1109/HST.2013.6581569","DOIUrl":"https://doi.org/10.1109/HST.2013.6581569","url":null,"abstract":"This paper presents an implementation of trusted boot for embedded systems. While in PCs the trusted computing hardware functionality is spread over CPU, memory controller hub (MCH), IO controller hub (ICH) and Trusted Platform Module (TPM), for embedded systems it is desirable to integrate the whole functionality in one system on chip. Our implementation is a two-processor design with LEON3 open source soft cores (SPARC V8 instruction set), coupled over an AHB interface. One of the processors acts as application processor, the other one as `secure' coprocessor. The application processor is synthesized with a boot ROM as static root of trust for measurement. The `secure' coprocessor runs TPM frmware and enables the application processor to boot and run different software while sealing corresponding keys and other secrets to the respective software identity (computed as hash value). We evaluate the design in a Virtex5 FPGA with respect to different measures like resource consumption, code sizes and start times. The `trusted boot' functionality is realised with a boot time increase of around 25% for a Linux system.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"1970 1","pages":"75-80"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91358569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF 用于硬件嵌入式路径延迟PUF的容错位生成技术
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581581
Jim Aarestad, J. Plusquellic, D. Acharyya
Cryptographic and authentication applications in application-specific integrated circuits (ASICs) and FPGAs, as well as codes for the activation of on-chip features, require the use of embedded secret information. The generation of secret bitstrings using physical unclonable functions, or PUFs, provides several distinct advantages over conventional methods, including the elimination of costly non-volatile memory, and the potential to increase the number of random bits available to applications. In this paper, we propose a Hardware-Embedded Delay PUF (HELP) that is designed to leverage path delay variations that occur in the core logic macros of a chip to create random bitstrings. The bitstrings produced by a set of 30 FPGA boards are evaluated with regard to several statistical quality metrics including uniqueness, randomness, and stability. The stability characteristics of the bitstrings are evaluated by subjecting the FPGAs to commercial-level temperature and supply voltage variations. In particular, we evaluate the reproducibility of the bitstrings generated at 0°C, 25°C, and 70°C, and at nominal and ±10% of the supply voltage. An error avoidance scheme is proposed that provides significant improvement against bit-flip errors in the bitstrings.
专用集成电路(asic)和fpga中的加密和认证应用,以及用于激活片上功能的代码,都需要使用嵌入式秘密信息。与传统方法相比,使用物理不可克隆函数(puf)生成秘密位串提供了几个明显的优势,包括消除昂贵的非易失性存储器,以及增加应用程序可用的随机位的数量。在本文中,我们提出了一个硬件嵌入式延迟PUF (HELP),旨在利用芯片核心逻辑宏中发生的路径延迟变化来创建随机位串。由一组30个FPGA板产生的位串根据几个统计质量指标进行评估,包括唯一性,随机性和稳定性。通过将fpga置于商用水平的温度和电源电压变化中来评估位串的稳定性特性。特别是,我们评估了在0°C, 25°C和70°C以及标称和±10%电源电压下产生的位串的再现性。提出了一种错误避免方案,对位串中的位翻转错误提供了显著的改进。
{"title":"Error-tolerant bit generation techniques for use with a hardware-embedded path delay PUF","authors":"Jim Aarestad, J. Plusquellic, D. Acharyya","doi":"10.1109/HST.2013.6581581","DOIUrl":"https://doi.org/10.1109/HST.2013.6581581","url":null,"abstract":"Cryptographic and authentication applications in application-specific integrated circuits (ASICs) and FPGAs, as well as codes for the activation of on-chip features, require the use of embedded secret information. The generation of secret bitstrings using physical unclonable functions, or PUFs, provides several distinct advantages over conventional methods, including the elimination of costly non-volatile memory, and the potential to increase the number of random bits available to applications. In this paper, we propose a Hardware-Embedded Delay PUF (HELP) that is designed to leverage path delay variations that occur in the core logic macros of a chip to create random bitstrings. The bitstrings produced by a set of 30 FPGA boards are evaluated with regard to several statistical quality metrics including uniqueness, randomness, and stability. The stability characteristics of the bitstrings are evaluated by subjecting the FPGAs to commercial-level temperature and supply voltage variations. In particular, we evaluate the reproducibility of the bitstrings generated at 0°C, 25°C, and 70°C, and at nominal and ±10% of the supply voltage. An error avoidance scheme is proposed that provides significant improvement against bit-flip errors in the bitstrings.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"6 1","pages":"151-158"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76042968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
BISA: Built-in self-authentication for preventing hardware Trojan insertion BISA:内置自我认证,防止硬件木马插入
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581564
K. Xiao, M. Tehranipoor
Hardware Trojans have become a significant threat to government agencies and enterprises that require security and trustworthiness in systems with critical applications. Detecting hardware Trojans is very challenging because of the diversity of Trojans and unpredictable process variations during fabrication. In this paper, we propose a novel technique, called built-in self-authentication (BISA), that can fill unused spaces in a circuit layout by functional filler cells instead of non-functional filler cells. All functional filler cells will be tested by BISA itself and a digital signature would be generated. Any modification on BISA will result in a different signature. Thus, BISA can be used to prevent Trojan insertion or make Trojan insertion extremely difficult. BISA can be applied to any single-module or bottom-up hierarchical design, and we evaluate it on different circuits to demonstrate the effective of this technique.
硬件木马已经成为政府机构和企业的重大威胁,这些机构和企业需要在具有关键应用程序的系统中提供安全性和可信度。检测硬件木马是非常具有挑战性的,因为木马的多样性和不可预测的工艺变化在制造过程中。在本文中,我们提出了一种新的技术,称为内置自我认证(BISA),它可以用功能填充单元代替非功能填充单元来填充电路布局中未使用的空间。所有功能填充单元都将由BISA本身进行测试,并生成数字签名。对BISA的任何修改都将导致不同的签名。因此,BISA可用于防止木马插入或使木马插入极其困难。BISA可以应用于任何单模块或自下而上的分层设计,我们在不同的电路上进行了评估,以证明该技术的有效性。
{"title":"BISA: Built-in self-authentication for preventing hardware Trojan insertion","authors":"K. Xiao, M. Tehranipoor","doi":"10.1109/HST.2013.6581564","DOIUrl":"https://doi.org/10.1109/HST.2013.6581564","url":null,"abstract":"Hardware Trojans have become a significant threat to government agencies and enterprises that require security and trustworthiness in systems with critical applications. Detecting hardware Trojans is very challenging because of the diversity of Trojans and unpredictable process variations during fabrication. In this paper, we propose a novel technique, called built-in self-authentication (BISA), that can fill unused spaces in a circuit layout by functional filler cells instead of non-functional filler cells. All functional filler cells will be tested by BISA itself and a digital signature would be generated. Any modification on BISA will result in a different signature. Thus, BISA can be used to prevent Trojan insertion or make Trojan insertion extremely difficult. BISA can be applied to any single-module or bottom-up hierarchical design, and we evaluate it on different circuits to demonstrate the effective of this technique.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"28 1","pages":"45-50"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79254195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 111
Enhancing fault sensitivity analysis through templates 通过模板增强故障敏感性分析
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581560
F. Melzani, A. Palomba
This paper gives an assessment of the threats posed by Fault Sensitivity Analysis attacks. We propose an overall discussion of the possibilities in attacking a hardware implementation of AES. The limitations of the current methodology are presented, together with new approaches that allow for more effective attacks. Utilizing gate level simulations, a comparison is performed of the performances of different variations of the attack methodology on different AES implementations. We also introduce the application of template attacks to the Fault Sensitivity Analysis. Results indicate that the use of templates helps to overcome some of the limitations of the original attack.
本文给出了故障灵敏度分析攻击的威胁评估。我们建议对攻击AES硬件实现的可能性进行全面讨论。提出了当前方法的局限性,以及允许更有效攻击的新方法。利用门级仿真,对不同AES实现下不同攻击方法的性能进行了比较。介绍了模板攻击在故障灵敏度分析中的应用。结果表明,模板的使用有助于克服原始攻击的一些局限性。
{"title":"Enhancing fault sensitivity analysis through templates","authors":"F. Melzani, A. Palomba","doi":"10.1109/HST.2013.6581560","DOIUrl":"https://doi.org/10.1109/HST.2013.6581560","url":null,"abstract":"This paper gives an assessment of the threats posed by Fault Sensitivity Analysis attacks. We propose an overall discussion of the possibilities in attacking a hardware implementation of AES. The limitations of the current methodology are presented, together with new approaches that allow for more effective attacks. Utilizing gate level simulations, a comparison is performed of the performances of different variations of the attack methodology on different AES implementations. We also introduce the application of template attacks to the Fault Sensitivity Analysis. Results indicate that the use of templates helps to overcome some of the limitations of the original attack.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"40 1","pages":"25-28"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89505544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloning Physically Unclonable Functions 克隆物理上不可克隆的功能
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581556
Clemens Helfmeier, C. Boit, Dmitry Nedospasov, Jean-Pierre Seifert
As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are among the most popular types of PUFs, since they require no additional circuitry and can be implemented with on-die memories such as caches and data memory that are readily available on both ASICs and FPGAs. This work demonstrates that SRAM PUFs are not well suited as PUFs, as they do not meet several requirements that constitute an ideal PUF. The compact nature of SRAM, standard interconnects and resiliency to environmental effects make SRAM PUFs particularly easy to clone. We consider several ways in which SRAM PUFs can be characterized and demonstrate a Focused Ion Beam circuit edit with which we were able to produce a physical clone of our Proof-of-Concept SRAM PUF implementation. As a result of the circuit edit, when challenged, the physical clone produced an identical physical response to the original device. To the best of our knowledge, this is the first work in which a physical clone of a Physically Unclonable Function was produced.
随着系统安全需求的不断发展,物理不可克隆功能(puf)是集成电路(ic)上安全存储的一个很有前途的解决方案。SRAM puf是最受欢迎的puf类型之一,因为它们不需要额外的电路,并且可以使用芯片上的存储器(如缓存和数据存储器)来实现,这些存储器在asic和fpga上都很容易获得。这项工作表明SRAM PUF不适合作为PUF,因为它们不满足构成理想PUF的几个要求。SRAM的紧凑性质,标准互连和对环境影响的弹性使SRAM puf特别容易克隆。我们考虑了几种可以表征SRAM PUF的方法,并演示了一个聚焦离子束电路编辑器,通过该编辑器,我们能够生成我们的概念验证SRAM PUF实现的物理克隆。作为电路编辑的结果,当受到挑战时,物理克隆产生与原始设备相同的物理响应。据我们所知,这是第一次对物理上不可克隆的功能进行物理克隆的工作。
{"title":"Cloning Physically Unclonable Functions","authors":"Clemens Helfmeier, C. Boit, Dmitry Nedospasov, Jean-Pierre Seifert","doi":"10.1109/HST.2013.6581556","DOIUrl":"https://doi.org/10.1109/HST.2013.6581556","url":null,"abstract":"As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are among the most popular types of PUFs, since they require no additional circuitry and can be implemented with on-die memories such as caches and data memory that are readily available on both ASICs and FPGAs. This work demonstrates that SRAM PUFs are not well suited as PUFs, as they do not meet several requirements that constitute an ideal PUF. The compact nature of SRAM, standard interconnects and resiliency to environmental effects make SRAM PUFs particularly easy to clone. We consider several ways in which SRAM PUFs can be characterized and demonstrate a Focused Ion Beam circuit edit with which we were able to produce a physical clone of our Proof-of-Concept SRAM PUF implementation. As a result of the circuit edit, when challenged, the physical clone produced an identical physical response to the original device. To the best of our knowledge, this is the first work in which a physical clone of a Physically Unclonable Function was produced.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"6 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79216011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 261
Hardware implementations of the WG-5 cipher for passive RFID tags 无源RFID标签的WG-5密码的硬件实现
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581561
M. Aagaard, G. Gong, Rajesh K. Mota
This paper presents two versions of a Welch-Gong cipher designed for use in passive RFID tags. The low-cost and low-power requirements for passive RFID tags impose stringent design constraints for the chips used in the tags. The WG5-80(x) cipher operates over the finite field F25, and has an 80-bit secret key and 80-bit initialization vector. WG5-80(x11) is the same as WG5-80(x), but includes a decimation function of x11, which increases the linear complexity at the cost of losing the 1-order resiliency property that is inherent in the WG-transform. Both ciphers can be implemented using parallel LFSRs to provide throughputs ranging from one to twenty-five bits per clock cycle. On a 130 nm fabrication process with a clockspeed of 100 kHz and a throughput of 100 kbps, WG5-80(x) has an area of 1229 GE (gate equivalents) and a power consumption of 0.78 μW. The linear complexity of the cipher is 217. The corresponding numbers for WG5-80(x11) are 1235GE, 0.79 μW, and 222. This paper presents results for a 130 nm and a 180 nm process, and data rates of 100 kbps and 200 kbps. The combined area and power results for the WG5 ciphers are approximately 5% better than previous results for low-data-rate ciphers. In addition, WG-ciphers offer mathematically guaranteed randomness and cryptographic properties not provided by other ciphers.
本文提出了用于无源RFID标签的两个版本的Welch-Gong密码。无源RFID标签的低成本和低功耗要求对标签中使用的芯片施加了严格的设计约束。WG5-80(x)密码在有限域F25上运行,并具有80位密钥和80位初始化向量。WG5-80(x11)与WG5-80(x)相同,但包含了x11的抽取函数,它以失去wg变换中固有的1阶弹性属性为代价增加了线性复杂性。这两种密码都可以使用并行lfsr来实现,以提供每个时钟周期1到25位的吞吐量。在时钟速度为100 kHz、吞吐量为100 kbps的130 nm制造工艺下,WG5-80(x)的面积为1229 GE(栅极当量),功耗为0.78 μW。该密码的线性复杂度为217。WG5-80(x11)对应的编号为1235GE、0.79 μW和222。本文介绍了在130 nm和180 nm工艺下的结果,数据速率分别为100 kbps和200 kbps。WG5密码的综合面积和功率结果比以前的低数据速率密码的结果大约好5%。此外,wg密码提供数学上保证的随机性和其他密码不提供的加密特性。
{"title":"Hardware implementations of the WG-5 cipher for passive RFID tags","authors":"M. Aagaard, G. Gong, Rajesh K. Mota","doi":"10.1109/HST.2013.6581561","DOIUrl":"https://doi.org/10.1109/HST.2013.6581561","url":null,"abstract":"This paper presents two versions of a Welch-Gong cipher designed for use in passive RFID tags. The low-cost and low-power requirements for passive RFID tags impose stringent design constraints for the chips used in the tags. The WG5-80(x) cipher operates over the finite field F25, and has an 80-bit secret key and 80-bit initialization vector. WG5-80(x11) is the same as WG5-80(x), but includes a decimation function of x11, which increases the linear complexity at the cost of losing the 1-order resiliency property that is inherent in the WG-transform. Both ciphers can be implemented using parallel LFSRs to provide throughputs ranging from one to twenty-five bits per clock cycle. On a 130 nm fabrication process with a clockspeed of 100 kHz and a throughput of 100 kbps, WG5-80(x) has an area of 1229 GE (gate equivalents) and a power consumption of 0.78 μW. The linear complexity of the cipher is 217. The corresponding numbers for WG5-80(x11) are 1235GE, 0.79 μW, and 222. This paper presents results for a 130 nm and a 180 nm process, and data rates of 100 kbps and 200 kbps. The combined area and power results for the WG5 ciphers are approximately 5% better than previous results for low-data-rate ciphers. In addition, WG-ciphers offer mathematically guaranteed randomness and cryptographic properties not provided by other ciphers.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"1 1","pages":"29-34"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86583694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results 具有软物理哈希函数的FPGA设计的知识产权保护:第一个实验结果
Pub Date : 2013-06-02 DOI: 10.1109/HST.2013.6581557
Stéphanie Kerckhof, François Durvaux, François-Xavier Standaert, Benoît Gérard
The use of Soft Physical Hash (SPH) functions has been recently introduced as a flexible and efficient way to detect Intellectual Property (IP) cores in microelectronic systems. Previous works have mainly investigated software IP to validate this approach. In this paper, we extend it towards the practically important case of FPGA designs. Based on experiments, we put forward that SPH functions-based detection is a promising and low-cost solution for preventing anti-counterfeiting, as it does not require any a-priori modification of the design flow. In particular, we illustrate its performances with stand-alone FPGA designs, re-synthetized FPGA designs, and in the context of parasitic IPs running in parallel.
软物理散列(SPH)函数的使用最近被引入作为一种灵活有效的方法来检测微电子系统中的知识产权(IP)内核。以前的工作主要是研究软件IP来验证这种方法。在本文中,我们将其扩展到FPGA设计的实际重要案例。基于实验,我们提出了基于SPH函数的检测是一种有前途的低成本防伪解决方案,因为它不需要对设计流程进行任何先验修改。特别地,我们通过独立FPGA设计,重新合成FPGA设计以及并行运行的寄生ip环境来说明其性能。
{"title":"Intellectual property protection for FPGA designs with soft physical hash functions: First experimental results","authors":"Stéphanie Kerckhof, François Durvaux, François-Xavier Standaert, Benoît Gérard","doi":"10.1109/HST.2013.6581557","DOIUrl":"https://doi.org/10.1109/HST.2013.6581557","url":null,"abstract":"The use of Soft Physical Hash (SPH) functions has been recently introduced as a flexible and efficient way to detect Intellectual Property (IP) cores in microelectronic systems. Previous works have mainly investigated software IP to validate this approach. In this paper, we extend it towards the practically important case of FPGA designs. Based on experiments, we put forward that SPH functions-based detection is a promising and low-cost solution for preventing anti-counterfeiting, as it does not require any a-priori modification of the design flow. In particular, we illustrate its performances with stand-alone FPGA designs, re-synthetized FPGA designs, and in the context of parasitic IPs running in parallel.","PeriodicalId":6337,"journal":{"name":"2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"54 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2013-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75893304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1