首页 > 最新文献

2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)最新文献

英文 中文
Using multiple processors in a single reconfigurable fabric for high-assurance applications 在一个可重构结构中使用多个处理器,实现高保证应用
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513120
B. Newgard, Colby Hoffman
Consistency and Traceability are the highest priority of the system architect in the world of high-assurance processing. Developing such a system requires the use of high assurance software and hardware working in a cohesive, well defined manner. To achieve and sustain high-assurance, the system must have the ability to continuously check and verify the proper hardware and software operation and execution.
一致性和可追溯性是系统架构师在高保证处理领域的最高优先级。开发这样一个系统需要使用高保证的软件和硬件,以一种内聚的、定义良好的方式工作。为了实现和维持高保证,系统必须具有持续检查和验证适当的硬件和软件操作和执行的能力。
{"title":"Using multiple processors in a single reconfigurable fabric for high-assurance applications","authors":"B. Newgard, Colby Hoffman","doi":"10.1109/HST.2010.5513120","DOIUrl":"https://doi.org/10.1109/HST.2010.5513120","url":null,"abstract":"Consistency and Traceability are the highest priority of the system architect in the world of high-assurance processing. Developing such a system requires the use of high assurance software and hardware working in a cohesive, well defined manner. To achieve and sustain high-assurance, the system must have the ability to continuously check and verify the proper hardware and software operation and execution.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"116 1","pages":"25-29"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82244162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
SLICED: Slide-based concurrent error detection technique for symmetric block ciphers 切片:用于对称分组密码的基于幻灯片的并发错误检测技术
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513109
Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, R. Karri
Fault attacks, wherein faults are deliberately injected into cryptographic devices, can compromise their security. Moreover, in the emerging nanometer regime of VLSI, accidental faults will occur at very high rates. While straightforward hardware redundancy based concurrent error detection (CED) can detect transient and permanent faults, it entails 100% area overhead. On the other hand, time redundancy based CED can only detect transient faults with minimum area overhead but entails 100% time overhead. In this paper we present a general time redundancy based CED technique called SLICED for pipelined implementations of symmetric block cipher. SLICED SLIdes one encryption over another and compares their results for CED as a basis for protection against accidental faults and deliberate fault attacks.
错误攻击,其中错误被故意注入到加密设备,可能危及其安全性。此外,在超大规模集成电路的新兴纳米领域,意外故障将以非常高的速率发生。虽然直接的基于硬件冗余的并发错误检测(CED)可以检测瞬时和永久故障,但它需要100%的面积开销。另一方面,基于时间冗余的CED只能以最小的面积开销检测暂态故障,但需要100%的时间开销。在本文中,我们提出了一种基于通用时间冗余的CED技术,称为切片,用于对称分组密码的流水线实现。切片将一种加密与另一种加密进行比较,并将其结果作为防止意外故障和故意故障攻击的基础。
{"title":"SLICED: Slide-based concurrent error detection technique for symmetric block ciphers","authors":"Jeyavijayan Rajendran, Hetal Borad, Shyam Mantravadi, R. Karri","doi":"10.1109/HST.2010.5513109","DOIUrl":"https://doi.org/10.1109/HST.2010.5513109","url":null,"abstract":"Fault attacks, wherein faults are deliberately injected into cryptographic devices, can compromise their security. Moreover, in the emerging nanometer regime of VLSI, accidental faults will occur at very high rates. While straightforward hardware redundancy based concurrent error detection (CED) can detect transient and permanent faults, it entails 100% area overhead. On the other hand, time redundancy based CED can only detect transient faults with minimum area overhead but entails 100% time overhead. In this paper we present a general time redundancy based CED technique called SLICED for pipelined implementations of symmetric block cipher. SLICED SLIdes one encryption over another and compares their results for CED as a basis for protection against accidental faults and deliberate fault attacks.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"43 1","pages":"70-75"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91115520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Multiplexing methods for power watermarking 功率水印的复用方法
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513118
Daniel Ziener, Florian Baueregger, J. Teich
In this paper, we present several enhancements to power watermarking that allow to simultaneously transmit and verify multiple signatures. Power watermarking of netlist IP cores for FPGA architectures is used for detecting IP fraud where the signature (watermark) is transmitted over the power supply pins of the FPGA. Many (watermarked) IP cores can be combined in an FPGA design, which raises the question of how multiple signatures can be detected using the same set of pins. As a solution, we propose multiplexing techniques for power side channel communication, so that all watermarked cores inside the FPGA can be identified to establish a proof of authorship. We analyze different multiplexing methods in order to adapt them to power watermarking and provide experimental results with several cores concurrently transmitting signatures.
在本文中,我们提出了几个增强的功率水印,允许同时传输和验证多个签名。FPGA架构的网表IP核的功率水印用于检测IP欺诈,其中签名(水印)通过FPGA的电源引脚传输。许多(带水印的)IP核可以在FPGA设计中组合,这就提出了如何使用同一组引脚检测多个签名的问题。作为解决方案,我们提出了功率侧信道通信的多路复用技术,以便可以识别FPGA内所有带水印的内核以建立作者证明。分析了不同的复用方法,使其适应于功率水印,并给出了多核并发传输签名的实验结果。
{"title":"Multiplexing methods for power watermarking","authors":"Daniel Ziener, Florian Baueregger, J. Teich","doi":"10.1109/HST.2010.5513118","DOIUrl":"https://doi.org/10.1109/HST.2010.5513118","url":null,"abstract":"In this paper, we present several enhancements to power watermarking that allow to simultaneously transmit and verify multiple signatures. Power watermarking of netlist IP cores for FPGA architectures is used for detecting IP fraud where the signature (watermark) is transmitted over the power supply pins of the FPGA. Many (watermarked) IP cores can be combined in an FPGA design, which raises the question of how multiple signatures can be detected using the same set of pins. As a solution, we propose multiplexing techniques for power side channel communication, so that all watermarked cores inside the FPGA can be identified to establish a proof of authorship. We analyze different multiplexing methods in order to adapt them to power watermarking and provide experimental results with several cores concurrently transmitting signatures.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"76 1","pages":"36-41"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74018895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Sensor physical unclonable functions 传感器物理不可克隆功能
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513103
Kurt Rosenfeld, Efstratios Gavas, R. Karri
We propose a novel variety of sensor that extends the functionality of conventional physical unclonable functions to provide authentication, unclonability, and verification of a sensed value. This new class of device addresses the vulnerability in typical sensing systems whereby an attacker can spoof measurements by interfering with the analog signals that pass from the sensor element to the embedded microprocessor. The concept can be applied to any type of analog sensor.
我们提出了一种新型传感器,它扩展了传统物理不可克隆功能的功能,以提供对感测值的身份验证、不可克隆性和验证。这种新型设备解决了典型传感系统中的漏洞,攻击者可以通过干扰从传感器元件传递到嵌入式微处理器的模拟信号来欺骗测量。该概念可应用于任何类型的模拟传感器。
{"title":"Sensor physical unclonable functions","authors":"Kurt Rosenfeld, Efstratios Gavas, R. Karri","doi":"10.1109/HST.2010.5513103","DOIUrl":"https://doi.org/10.1109/HST.2010.5513103","url":null,"abstract":"We propose a novel variety of sensor that extends the functionality of conventional physical unclonable functions to provide authentication, unclonability, and verification of a sensed value. This new class of device addresses the vulnerability in typical sensing systems whereby an attacker can spoof measurements by interfering with the analog signals that pass from the sensor element to the embedded microprocessor. The concept can be applied to any type of analog sensor.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"30 1","pages":"112-117"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78266523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments 防篡改JTAG TAP设计可实现对JTAG寄存器和P1687片上仪表的DRM
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513119
C. J. Clark
This paper describes an anti-tamper JTAG Tap design which uses SHA256 secure hash and a true random number generator (TRNG) to create a low gate overhead challenge/response based access system for IC test and on-chip internals. The system may be used to enable 1149.1 TAP instructions or may control access to an IEEE P1687 on-chip instrument. The TAP owner (manufacturer of the IC) may then use DRM (Digital Rights Management) based JTAG software to manage which end users have access to the TAP or TAP accessible areas of the IC.
本文描述了一种防篡改的JTAG Tap设计,该设计使用SHA256安全哈希和真随机数生成器(TRNG)来创建一个低门开销的基于挑战/响应的访问系统,用于IC测试和片上内部。该系统可用于使能1149.1 TAP指令或可控制对IEEE P1687片上仪器的访问。TAP所有者(IC的制造商)可以使用基于JTAG的DRM(数字版权管理)软件来管理哪些最终用户可以访问TAP或IC的TAP可访问区域。
{"title":"Anti-tamper JTAG TAP design enables DRM to JTAG registers and P1687 on-chip instruments","authors":"C. J. Clark","doi":"10.1109/HST.2010.5513119","DOIUrl":"https://doi.org/10.1109/HST.2010.5513119","url":null,"abstract":"This paper describes an anti-tamper JTAG Tap design which uses SHA256 secure hash and a true random number generator (TRNG) to create a low gate overhead challenge/response based access system for IC test and on-chip internals. The system may be used to enable 1149.1 TAP instructions or may control access to an IEEE P1687 on-chip instrument. The TAP owner (manufacturer of the IC) may then use DRM (Digital Rights Management) based JTAG software to manage which end users have access to the TAP or TAP accessible areas of the IC.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"10 1","pages":"19-24"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78696260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
ExCCel: Exploration of complementary cells for efficient DPA attack resistivity excel:探索互补单元的有效DPA攻击电阻率
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513113
Kazuyuki Tanimura, N. Dutt
Differential Power Analysis (DPA) side-channel attacks pose serious threats for embedded system security. WDDL was proposed as a countermeasure that can be incorporated into a conventional ASIC design flow using standard cells. However, our spice simulations show that DPA attacks on WDDL still leak secret keys to adversaries despite the doubled area and energy overheads due to the use of complementary cells. This paper proposes ExCCel, a simulated annealing based method that automatically generates and explores combinations of complementary cells for reducing the power-consumption dependency and overheads using standard cells. Our experimental results on the AES S-Box circuit with our explored complementary cells requires 6.1%and 2.1%additional area and energy while WDDL requires 100.3% and 93.4%, respectively. Moreover, ExCCeL achieves higher DPA attack resistivity compared to WDDL in many cases.
差分功率分析(DPA)侧信道攻击对嵌入式系统的安全构成严重威胁。WDDL被提出作为一种对策,可以结合到使用标准单元的传统ASIC设计流程中。然而,我们的spice模拟表明,尽管由于使用互补单元而增加了两倍的面积和能量开销,但对WDDL的DPA攻击仍然会向对手泄露秘钥。本文提出了excel,一种基于模拟退火的方法,自动生成和探索互补单元的组合,以减少使用标准单元的功耗依赖和开销。我们在AES S-Box电路上的实验结果表明,我们所探索的互补电池分别需要6.1%和2.1%的额外面积和能量,而WDDL分别需要100.3%和93.4%。此外,在许多情况下,与WDDL相比,excel实现了更高的DPA攻击电阻率。
{"title":"ExCCel: Exploration of complementary cells for efficient DPA attack resistivity","authors":"Kazuyuki Tanimura, N. Dutt","doi":"10.1109/HST.2010.5513113","DOIUrl":"https://doi.org/10.1109/HST.2010.5513113","url":null,"abstract":"Differential Power Analysis (DPA) side-channel attacks pose serious threats for embedded system security. WDDL was proposed as a countermeasure that can be incorporated into a conventional ASIC design flow using standard cells. However, our spice simulations show that DPA attacks on WDDL still leak secret keys to adversaries despite the doubled area and energy overheads due to the use of complementary cells. This paper proposes ExCCel, a simulated annealing based method that automatically generates and explores combinations of complementary cells for reducing the power-consumption dependency and overheads using standard cells. Our experimental results on the AES S-Box circuit with our explored complementary cells requires 6.1%and 2.1%additional area and energy while WDDL requires 100.3% and 93.4%, respectively. Moreover, ExCCeL achieves higher DPA attack resistivity compared to WDDL in many cases.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"31 1","pages":"52-55"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76893073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
LISA: Maximizing RO PUF's secret extraction 莉莎:最大限度地挖掘RO PUF的秘密
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513105
C. Yin, G. Qu
The silicon physical unclonable functions (PUF) measure uncontrollable variations of the integrated circuit (IC) fabrication process to facilitate IC authentication. One of the most reliable silicon PUF structures is the ring oscillator (RO) PUF; however, the lack of efficient secret extraction schemes diminishes its practicality. In this work, we propose a longest increasing subsequence-based grouping algorithm (LISA) to enhance the hardware utilization. To analyze the performance of LISA, we introduce a hybrid architecture and formulate its cost and delay metrics; by solving the introduced hybrid coefficient, RO PUF designers can quickly determine the optimal hardware configuration. Finally, our claims are validated by a proof-of-the-concept FPGA-based implementation.
硅物理不可克隆函数(PUF)测量集成电路(IC)制造过程中的不可控变化,以方便集成电路认证。最可靠的硅PUF结构之一是环形振荡器(RO) PUF;然而,缺乏有效的秘密提取方案降低了其实用性。在这项工作中,我们提出了一种基于最长递增子序列的分组算法(LISA)来提高硬件利用率。为了分析LISA的性能,我们引入了一种混合架构,并制定了其成本和延迟指标;通过求解引入的混合系数,RO PUF设计人员可以快速确定最佳硬件配置。最后,通过基于fpga的概念验证实现验证了我们的主张。
{"title":"LISA: Maximizing RO PUF's secret extraction","authors":"C. Yin, G. Qu","doi":"10.1109/HST.2010.5513105","DOIUrl":"https://doi.org/10.1109/HST.2010.5513105","url":null,"abstract":"The silicon physical unclonable functions (PUF) measure uncontrollable variations of the integrated circuit (IC) fabrication process to facilitate IC authentication. One of the most reliable silicon PUF structures is the ring oscillator (RO) PUF; however, the lack of efficient secret extraction schemes diminishes its practicality. In this work, we propose a longest increasing subsequence-based grouping algorithm (LISA) to enhance the hardware utilization. To analyze the performance of LISA, we introduce a hybrid architecture and formulate its cost and delay metrics; by solving the introduced hybrid coefficient, RO PUF designers can quickly determine the optimal hardware configuration. Finally, our claims are validated by a proof-of-the-concept FPGA-based implementation.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"23 1","pages":"100-105"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82533228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 127
FPGA implementations of the Hummingbird cryptographic algorithm 蜂鸟密码算法的FPGA实现
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513116
Xinxin Fan, G. Gong, Ken Lauffenburger, Troy N. Hicks
Hummingbird is a new ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we describe efficient hardware implementations of a stand-alone Hummingbird component in field-programmable gate array (FPGA) devices. We implement an encryption only core and an encryption/decryption core on the low-cost Xilinx FPGA series Spartan-3 and compare our results with other reported lightweight block cipher implementations on the same series. Our experimental results highlight that in the context of low-cost FPGA implementation Hummingbird has favorable efficiency and low area requirements.
Hummingbird是一种针对资源受限设备(如RFID标签、智能卡和无线传感器节点)的新型超轻量加密算法。在本文中,我们描述了在现场可编程门阵列(FPGA)器件中独立蜂鸟组件的有效硬件实现。我们在低成本Xilinx FPGA系列Spartan-3上实现了一个加密核心和一个加密/解密核心,并将我们的结果与同一系列上其他已报道的轻量级分组密码实现进行了比较。我们的实验结果表明,在低成本FPGA实现的背景下,蜂鸟具有良好的效率和低面积要求。
{"title":"FPGA implementations of the Hummingbird cryptographic algorithm","authors":"Xinxin Fan, G. Gong, Ken Lauffenburger, Troy N. Hicks","doi":"10.1109/HST.2010.5513116","DOIUrl":"https://doi.org/10.1109/HST.2010.5513116","url":null,"abstract":"Hummingbird is a new ultra-lightweight cryptographic algorithm targeted for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we describe efficient hardware implementations of a stand-alone Hummingbird component in field-programmable gate array (FPGA) devices. We implement an encryption only core and an encryption/decryption core on the low-cost Xilinx FPGA series Spartan-3 and compare our results with other reported lightweight block cipher implementations on the same series. Our experimental results highlight that in the context of low-cost FPGA implementation Hummingbird has favorable efficiency and low area requirements.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"66 1","pages":"48-51"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80786515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Entropy-based power attack 基于熵的能量攻击
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513124
Houssem Maghrebi, S. Guilley, J. Danger, Florent Flament
Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, the MIA fails when applied on a DES cryptoprocessor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.
最近的研究表明,互信息是一种通用的边信道区分器,因为它可以检测泄漏观测和秘密假设之间的任何统计依赖性。在本研究中,互信息分析(MIA)在一个嘈杂的现实世界设计中进行了测试。它确实是一种破坏未受保护的实现的强大方法。然而,当将MIA应用于ROM中具有掩码替代盒(Sboxes)的DES加密处理器时,MIA会失败。尽管如此,这种掩码实现仍然对高阶差分功率分析(HO-DPA)敏感。例如,基于方差分析的攻击清楚地显示了一阶屏蔽对策的漏洞。我们提出了一种新的信息论HO攻击方法,称为基于熵的功率分析(EPA)。这种新的攻击对高信息量的分区给予了极大的重视,同时更好地区分了关键假设。对提议的攻击进行彻底的经验评估,证实了与MIA相比,这种新方法具有压倒性的优势。
{"title":"Entropy-based power attack","authors":"Houssem Maghrebi, S. Guilley, J. Danger, Florent Flament","doi":"10.1109/HST.2010.5513124","DOIUrl":"https://doi.org/10.1109/HST.2010.5513124","url":null,"abstract":"Recent works have shown that the mutual information is a generic side-channel distinguisher, since it detects any kind of statistical dependency between leakage observations and hypotheses on the secret. In this study the mutual information analysis (MIA) is tested in a noisy real world design. It indeed appears to be a powerful approach to break unprotected implementations. However, the MIA fails when applied on a DES cryptoprocessor with masked substitution boxes (Sboxes) in ROM. Nevertheless, this masking implementation remains sensitive to Higher-Order Differential Power Analysis (HO-DPA). For instance, an attack based on a variance analysis clearly shows the vulnerabilities of a first order masking countermeasure. We propose a novel approach to information-theoretic HO attacks, called the Entropy-based Power Analysis (EPA). This new attack gives a greatest importance to highly informative partitions and in the meantime better distinguishes between the key hypotheses. A thorough empirical evaluation of the proposed attack confirms the overwhelming advantage of this new approach when compared with MIA.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"791 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76123211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Attack resistant sense amplifier based PUFs (SA-PUF) with deterministic and controllable reliability of PUF responses 基于抗攻击感测放大器的PUF (SA-PUF)具有PUF响应的确定性和可控可靠性
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513106
M. Bhargava, Cagla Cakir, K. Mai
Physically Unclonable Functions (PUFs) implement die specific random functions that offer a promising mechanism in various security applications. Stability or reliability of a PUF response is a key concern, especially when the IC containing the PUF is subjected to severe environmental variations. In cryptographic applications, errors in response bits need to be completely corrected and this is often done using costly error correction codes (ECC). In identification and authentication applications however, a complete correction of response bits is not necessary and hence costly ECC schemes can be avoided. On the flip side, a response with faulty bits cannot be post-conditioned by one-way functions, resulting in an increased vulnerability to modeling attacks. We propose a sense amplifier based PUF (SA-PUF) structure that generates random bits with increased reliability, resulting in significantly fewer errors in response bits. This eliminates the need of complex and costly ECC circuitry in cryptographic applications. Further, with the reduced cost of ECC implementation, the use of one-way functions to post-condition the outputs becomes more viable even in identification and authentication applications, thereby increasing their resilience to modeling based attacks. Finally, SA-PUF elements are inherently more resilient to environmental changes as compared to most of the earlier proposed silicon based PUF structures. Simulation data in 65nm bulk CMOS industrial process show that SA-based PUFs have 2.5x-3.5x lower errors compared to other PUF implementations when subjected to similar environmental variations.
物理不可克隆函数(puf)实现了特定于芯片的随机函数,在各种安全应用中提供了一种很有前途的机制。PUF响应的稳定性或可靠性是一个关键问题,特别是当包含PUF的IC受到严重环境变化的影响时。在密码学应用中,响应位中的错误需要完全纠正,这通常使用昂贵的纠错码(ECC)来完成。然而,在识别和认证应用中,响应位的完全校正是不必要的,因此可以避免昂贵的ECC方案。另一方面,具有错误位的响应不能通过单向函数进行后条件反射,从而增加了建模攻击的脆弱性。我们提出了一种基于感测放大器的PUF (SA-PUF)结构,该结构产生的随机比特具有更高的可靠性,从而大大减少了响应比特的错误。这消除了加密应用中复杂和昂贵的ECC电路的需要。此外,随着ECC实现成本的降低,即使在识别和身份验证应用程序中,使用单向函数对输出进行后处理也变得更加可行,从而增加了它们对基于建模的攻击的弹性。最后,与大多数早期提出的硅基PUF结构相比,SA-PUF元件天生对环境变化更有弹性。在65nm块体CMOS工业工艺中的仿真数据表明,与其他PUF实现相比,在类似的环境变化下,基于sa的PUF的误差降低了2.5 -3.5倍。
{"title":"Attack resistant sense amplifier based PUFs (SA-PUF) with deterministic and controllable reliability of PUF responses","authors":"M. Bhargava, Cagla Cakir, K. Mai","doi":"10.1109/HST.2010.5513106","DOIUrl":"https://doi.org/10.1109/HST.2010.5513106","url":null,"abstract":"Physically Unclonable Functions (PUFs) implement die specific random functions that offer a promising mechanism in various security applications. Stability or reliability of a PUF response is a key concern, especially when the IC containing the PUF is subjected to severe environmental variations. In cryptographic applications, errors in response bits need to be completely corrected and this is often done using costly error correction codes (ECC). In identification and authentication applications however, a complete correction of response bits is not necessary and hence costly ECC schemes can be avoided. On the flip side, a response with faulty bits cannot be post-conditioned by one-way functions, resulting in an increased vulnerability to modeling attacks. We propose a sense amplifier based PUF (SA-PUF) structure that generates random bits with increased reliability, resulting in significantly fewer errors in response bits. This eliminates the need of complex and costly ECC circuitry in cryptographic applications. Further, with the reduced cost of ECC implementation, the use of one-way functions to post-condition the outputs becomes more viable even in identification and authentication applications, thereby increasing their resilience to modeling based attacks. Finally, SA-PUF elements are inherently more resilient to environmental changes as compared to most of the earlier proposed silicon based PUF structures. Simulation data in 65nm bulk CMOS industrial process show that SA-based PUFs have 2.5x-3.5x lower errors compared to other PUF implementations when subjected to similar environmental variations.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"32 1","pages":"106-111"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80062942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
期刊
2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1