首页 > 最新文献

2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)最新文献

英文 中文
A comparison of power-analysis-resistant digital circuits 抗功率分析数字电路的比较
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513112
E. Menendez, K. Mai
Power analysis attacks are a common and effective method of defeating cryptographic systems. Many power-analysis-resistant digital circuit techniques have been previously proposed, leaving the circuit designer a myriad of choices without a simple way to compare and contrast the strengths and weaknesses of each technique. In this paper, we compare four promising power-analysis-resistant digital logic styles against a standard CMOS baseline. By comparing these techniques side by side in a consistent manner we present a clearer picture of the advantages and drawbacks of each. Results are presented for logic gate area, energy consumption, and power-analysis resistance. We also present a novel test structure suitable for measuring power-analysis resistance of individual logic gates in actual silicon.
功率分析攻击是破解密码系统的一种常见而有效的方法。许多抗功率分析的数字电路技术已经被提出,这给电路设计者留下了无数的选择,没有一个简单的方法来比较和对比每种技术的优缺点。在本文中,我们比较了四种有前途的抗功耗分析数字逻辑风格与标准CMOS基线。通过以一致的方式并排比较这些技术,我们更清楚地展示了每种技术的优点和缺点。给出了逻辑门面积、能耗和功率分析电阻的计算结果。我们还提出了一种新的测试结构,适用于测量实际硅中单个逻辑门的功率分析电阻。
{"title":"A comparison of power-analysis-resistant digital circuits","authors":"E. Menendez, K. Mai","doi":"10.1109/HST.2010.5513112","DOIUrl":"https://doi.org/10.1109/HST.2010.5513112","url":null,"abstract":"Power analysis attacks are a common and effective method of defeating cryptographic systems. Many power-analysis-resistant digital circuit techniques have been previously proposed, leaving the circuit designer a myriad of choices without a simple way to compare and contrast the strengths and weaknesses of each technique. In this paper, we compare four promising power-analysis-resistant digital logic styles against a standard CMOS baseline. By comparing these techniques side by side in a consistent manner we present a clearer picture of the advantages and drawbacks of each. Results are presented for logic gate area, energy consumption, and power-analysis resistance. We also present a novel test structure suitable for measuring power-analysis resistance of individual logic gates in actual silicon.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"54 1","pages":"64-69"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78674734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Side-channel attack resistant ROM-based AES S-Box 基于rom的抗侧信道攻击AES S-Box
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513101
Craig Teegarden, M. Bhargava, K. Mai
In the AES algorithm, the Substitution Box (S-Box) often dominates the area and delay of implementations. The S-Box performs a byte-wise substitution on the data based on an established code book, and most AES algorithm implementations use a large complex logic block consisting mainly of XORs to implement the S-Box. Direct implementation of the S-Box with a look-up table (LUT) has been eschewed due to difficulty in pipelining the structure, hence restricting the throughput. However, we present a custom ROM-based S-Box implementation that can achieve comparable throughput to logic-based implementations, yet is smaller in both area and power. Additionally, the symmetrical nature of the ROM is well suited towards achieving data-independent power dissipation, which is key in defending against power analysis side-channel attacks. We present both power-analysis hardened and unhardened ROM-based S-Box designs which significantly outperform logic-based designs in area, power, performance, and power-analysis resistance.
在AES算法中,替换盒(S-Box)往往占据着实现的面积和延迟。S-Box基于已建立的代码本对数据执行逐字节替换,并且大多数AES算法实现使用主要由xor组成的大型复杂逻辑块来实现S-Box。使用查找表(LUT)直接实现S-Box已被避免,因为难以将结构流水线化,因此限制了吞吐量。然而,我们提出了一个定制的基于rom的S-Box实现,它可以实现与基于逻辑的实现相当的吞吐量,但在面积和功耗方面都更小。此外,ROM的对称特性非常适合实现与数据无关的功耗,这是防御功率分析侧信道攻击的关键。我们提出了强化和未强化的基于rom的S-Box设计,它们在面积、功耗、性能和功耗分析阻力方面都明显优于基于逻辑的设计。
{"title":"Side-channel attack resistant ROM-based AES S-Box","authors":"Craig Teegarden, M. Bhargava, K. Mai","doi":"10.1109/HST.2010.5513101","DOIUrl":"https://doi.org/10.1109/HST.2010.5513101","url":null,"abstract":"In the AES algorithm, the Substitution Box (S-Box) often dominates the area and delay of implementations. The S-Box performs a byte-wise substitution on the data based on an established code book, and most AES algorithm implementations use a large complex logic block consisting mainly of XORs to implement the S-Box. Direct implementation of the S-Box with a look-up table (LUT) has been eschewed due to difficulty in pipelining the structure, hence restricting the throughput. However, we present a custom ROM-based S-Box implementation that can achieve comparable throughput to logic-based implementations, yet is smaller in both area and power. Additionally, the symmetrical nature of the ROM is well suited towards achieving data-independent power dissipation, which is key in defending against power analysis side-channel attacks. We present both power-analysis hardened and unhardened ROM-based S-Box designs which significantly outperform logic-based designs in area, power, performance, and power-analysis resistance.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"55 1","pages":"124-129"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74586914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Low voltage fault attacks to AES 低压故障攻击AES
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513121
Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi
This paper presents a new fault based attack on the Advanced Encryption Standard (AES) with any key length, together with its practical validation through the use of low voltage induced faults. The CPU running the attacked algorithm is the ARM926EJ-S: a 32-bit processor widely deployed in computer peripherals, telecommunication appliances and low power portable devices. We prove the practical feasibility of this attack through inducing faults in the computation of the AES algorithm running on a full fledged Linux 2.6 operating system targeted to two implementations of the ARM926EJ-S on commercial development boards.
提出了一种针对任意密钥长度的高级加密标准(AES)的基于故障的攻击方法,并通过低压感应故障对其进行了实际验证。运行受攻击算法的CPU是ARM926EJ-S:一种32位处理器,广泛部署在计算机外围设备、电信设备和低功耗便携式设备中。针对商用开发板上arm926ejj - s的两种实现,我们通过在成熟的Linux 2.6操作系统上运行AES算法的计算中诱导错误来证明这种攻击的实际可行性。
{"title":"Low voltage fault attacks to AES","authors":"Alessandro Barenghi, G. Bertoni, L. Breveglieri, M. Pellicioli, Gerardo Pelosi","doi":"10.1109/HST.2010.5513121","DOIUrl":"https://doi.org/10.1109/HST.2010.5513121","url":null,"abstract":"This paper presents a new fault based attack on the Advanced Encryption Standard (AES) with any key length, together with its practical validation through the use of low voltage induced faults. The CPU running the attacked algorithm is the ARM926EJ-S: a 32-bit processor widely deployed in computer peripherals, telecommunication appliances and low power portable devices. We prove the practical feasibility of this attack through inducing faults in the computation of the AES algorithm running on a full fledged Linux 2.6 operating system targeted to two implementations of the ARM926EJ-S on commercial development boards.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"143 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77570684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Entropy extraction in metastability-based TRNG 基于亚稳的TRNG中的熵提取
Pub Date : 2010-06-13 DOI: 10.1109/HST.2010.5513099
Vikram B. Suresh, W. Burleson
True Random Number Generators (TRNG) implemented in deep sub micron (DSM) technologies become biased in bit generation due to process variations and fluctuations in operating conditions. A variety of mechanisms ranging from analog and digital circuit techniques to algorithmic post-processing can be employed to remove bias. In this work we compare the effectiveness of digital post-processing using the XOR function and Von Neumann Corrector with circuit calibration technique for a meta-stability based reference TRNG design. The energy consumption per bit is used as the metric for comparison of the different techniques. The results indicate that the calibration technique is effective for 12% larger process variation than the XOR function and extracts entropy comparable to the Von Neumann Corrector at 56% lesser energy/bit. The analysis thereby demonstrates that circuit calibration provides an efficient tradeoff between entropy and energy/bit for removing bias in lightweight TRNG.
由于工艺变化和操作条件的波动,在深亚微米(DSM)技术中实现的真随机数发生器(TRNG)在比特生成方面存在偏差。从模拟和数字电路技术到算法后处理的各种机制都可以用来消除偏置。在这项工作中,我们比较了使用异或函数和冯·诺伊曼校正器与电路校准技术的数字后处理的有效性,用于基于亚稳定的参考TRNG设计。每比特的能量消耗被用作比较不同技术的度量。结果表明,与异或函数相比,该校准技术在过程变化大12%的情况下是有效的,并且以比冯·诺伊曼校正器低56%的能量/比特提取与之相当的熵。因此,分析表明,电路校准为消除轻量级TRNG中的偏置提供了熵和能量/比特之间的有效权衡。
{"title":"Entropy extraction in metastability-based TRNG","authors":"Vikram B. Suresh, W. Burleson","doi":"10.1109/HST.2010.5513099","DOIUrl":"https://doi.org/10.1109/HST.2010.5513099","url":null,"abstract":"True Random Number Generators (TRNG) implemented in deep sub micron (DSM) technologies become biased in bit generation due to process variations and fluctuations in operating conditions. A variety of mechanisms ranging from analog and digital circuit techniques to algorithmic post-processing can be employed to remove bias. In this work we compare the effectiveness of digital post-processing using the XOR function and Von Neumann Corrector with circuit calibration technique for a meta-stability based reference TRNG design. The energy consumption per bit is used as the metric for comparison of the different techniques. The results indicate that the calibration technique is effective for 12% larger process variation than the XOR function and extracts entropy comparable to the Von Neumann Corrector at 56% lesser energy/bit. The analysis thereby demonstrates that circuit calibration provides an efficient tradeoff between entropy and energy/bit for removing bias in lightweight TRNG.","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"15 1","pages":"135-140"},"PeriodicalIF":0.0,"publicationDate":"2010-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86014307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Title pages 标题页
Pub Date : 2010-01-01 DOI: 10.13109/9783666101458.front
M. Kneževi
Hardware security relies on the difficulty of reverse engineering to protect critical information. While virtually anything can be reverse engineered given enough time and money, the question usually is: “is it worth it?” The intellectual property industry uses reverse engineering to drive innovation, to protect patented inventions, and to enforce copyright and trade secret rights. Intellectual property transactions, licensing, and litigation, relies on technical information to drive the patent assertion and monetization process. Others use reverse engineering for more nefarious purposes. The cost and potential benefit of a reverse engineering approach must be considered before embarking on a complex project. The continuous scaling of the complexity and level of integration of semiconductor devices and systems presents major challenges to the analysis of the technological principles of a system. Hardware encryption and software embedded in integrated circuits, together with hardware and software obfuscation techniques add additional layers of difficulty to the analysis. Today, very sophisticated techniques are used to analyze the function, structure and operation of integrated circuits and systems. This presentation gives examples of state-of-the-art reverse engineering techniques for hardware and software system analysis, transistor level-to-schematic circuit extraction, and semiconductor fabrication process analysis. The presentation concludes with a discussion of some of the best practices in system design that can be used to create substantial barriers to the success of a reverse engineering attack. Biography Dr. Adams joined TAEUS International Corporation in 1993. He has over thirty years experience in managing the definition, development, and transfer of new products and technologies. Dr. Adams has held senior engineering and management positions with Sandia National Laboratories, INMOS, Monolithic Memories, United Technologies, and TAEUS, and has served as an expert witness in copyright, trade secret, and patent infringement cases. His expertise includes strategic planning and program management, patent evaluation and analysis, forensic engineering, process integration, device physics, microelectronic reliability and failure analysis, electronic materials, semiconductor memories and microprocessors, software, management of quality, and radiation effects in microelectronics. Dr. Adams holds three patents in integrated circuit technology. He is listed in Who’s Who in Technology Today, 1984–1995 and has received the TOBIE Award for most significant R&D
硬件安全依赖于逆向工程的难度来保护关键信息。虽然只要有足够的时间和金钱,几乎任何东西都可以逆向工程,但问题通常是:“值得吗?”知识产权行业使用逆向工程来推动创新,保护专利发明,并执行版权和商业秘密权利。知识产权交易、许可和诉讼依赖于技术信息来推动专利主张和货币化过程。其他人则将逆向工程用于更邪恶的目的。在开始一个复杂的项目之前,必须考虑逆向工程方法的成本和潜在收益。半导体器件和系统的复杂性和集成水平的不断扩大对系统技术原理的分析提出了重大挑战。集成电路中嵌入的硬件加密和软件,以及硬件和软件混淆技术为分析增加了额外的难度。今天,非常复杂的技术被用来分析集成电路和系统的功能、结构和操作。本报告给出了最先进的逆向工程技术的例子,用于硬件和软件系统分析,晶体管电平到原理图电路提取,以及半导体制造过程分析。报告最后讨论了系统设计中的一些最佳实践,这些实践可用于为成功的反向工程攻击创建实质性的障碍。亚当斯博士于1993年加入TAEUS International Corporation。他在管理新产品和技术的定义、开发和转让方面拥有30多年的经验。他曾在Sandia National Laboratories、INMOS、Monolithic Memories、United Technologies和TAEUS担任高级工程和管理职位,并曾在版权、商业秘密和专利侵权案件中担任专家证人。他的专长包括战略规划和项目管理、专利评估和分析、法医工程、过程集成、设备物理、微电子可靠性和故障分析、电子材料、半导体存储器和微处理器、软件、质量管理和微电子辐射效应。他持有三项集成电路技术专利。他被列入1984-1995年《今日科技名人录》,并因最重要的研发而获得TOBIE奖
{"title":"Title pages","authors":"M. Kneževi","doi":"10.13109/9783666101458.front","DOIUrl":"https://doi.org/10.13109/9783666101458.front","url":null,"abstract":"Hardware security relies on the difficulty of reverse engineering to protect critical information. While virtually anything can be reverse engineered given enough time and money, the question usually is: “is it worth it?” The intellectual property industry uses reverse engineering to drive innovation, to protect patented inventions, and to enforce copyright and trade secret rights. Intellectual property transactions, licensing, and litigation, relies on technical information to drive the patent assertion and monetization process. Others use reverse engineering for more nefarious purposes. The cost and potential benefit of a reverse engineering approach must be considered before embarking on a complex project. The continuous scaling of the complexity and level of integration of semiconductor devices and systems presents major challenges to the analysis of the technological principles of a system. Hardware encryption and software embedded in integrated circuits, together with hardware and software obfuscation techniques add additional layers of difficulty to the analysis. Today, very sophisticated techniques are used to analyze the function, structure and operation of integrated circuits and systems. This presentation gives examples of state-of-the-art reverse engineering techniques for hardware and software system analysis, transistor level-to-schematic circuit extraction, and semiconductor fabrication process analysis. The presentation concludes with a discussion of some of the best practices in system design that can be used to create substantial barriers to the success of a reverse engineering attack. Biography Dr. Adams joined TAEUS International Corporation in 1993. He has over thirty years experience in managing the definition, development, and transfer of new products and technologies. Dr. Adams has held senior engineering and management positions with Sandia National Laboratories, INMOS, Monolithic Memories, United Technologies, and TAEUS, and has served as an expert witness in copyright, trade secret, and patent infringement cases. His expertise includes strategic planning and program management, patent evaluation and analysis, forensic engineering, process integration, device physics, microelectronic reliability and failure analysis, electronic materials, semiconductor memories and microprocessors, software, management of quality, and radiation effects in microelectronics. Dr. Adams holds three patents in integrated circuit technology. He is listed in Who’s Who in Technology Today, 1984–1995 and has received the TOBIE Award for most significant R&D","PeriodicalId":6367,"journal":{"name":"2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)","volume":"59 1","pages":"i-xii"},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91139057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1