首页 > 最新文献

2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
Inverse gating for low energy encryption 低能加密的逆门控
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383909
S. Banik, A. Bogdanov, F. Regazzoni, Takanori Isobe, Harunaga Hiwatari, T. Akishita
In this paper we explore the technique of “inverse gating” which is a significant improvement over the “round gating” technique introduced in HOST 2016. Round gating worked by generating timing signals to separate glitch propagation from one circuit element to the next. Inverse gating generates the same timing signals required to segregate transient round signals, in a manner that incurs less delay and hence lesser switching activity in the circuits. We also show that energy-wise, inverse gated circuits outperform round gated circuits by a margin of around 30 %. In the second part of the paper, we further explore the efficiency of the energy reduction by tuning some of the design parameters. The most natural candidate for this was the delay of the buffer used for creating the timing signals. We found that the optimal energy consumption for any round and inverse gated unrolled block cipher occurs at a particular range of this delay value. We try to explain the optimality of this particular choice of design parameter with the help of the implementation of the AES-128 block cipher.
在本文中,我们探索了“逆门控”技术,这是对HOST 2016中引入的“圆门控”技术的重大改进。圆门控的工作原理是产生定时信号,将故障从一个电路元件传播到下一个电路元件。反向门控产生与隔离瞬态圆信号所需的相同定时信号,以一种导致较少延迟的方式,从而减少电路中的开关活动。我们还表明,在能量方面,反向门控电路的性能比圆门控电路高出约30%。在论文的第二部分,我们进一步探讨了通过调整一些设计参数的节能效率。最自然的候选是用于创建定时信号的缓冲区的延迟。我们发现任何圆形和反向门控展开分组密码的最佳能量消耗发生在该延迟值的特定范围内。我们试图借助AES-128分组密码的实现来解释这种特定设计参数选择的最优性。
{"title":"Inverse gating for low energy encryption","authors":"S. Banik, A. Bogdanov, F. Regazzoni, Takanori Isobe, Harunaga Hiwatari, T. Akishita","doi":"10.1109/HST.2018.8383909","DOIUrl":"https://doi.org/10.1109/HST.2018.8383909","url":null,"abstract":"In this paper we explore the technique of “inverse gating” which is a significant improvement over the “round gating” technique introduced in HOST 2016. Round gating worked by generating timing signals to separate glitch propagation from one circuit element to the next. Inverse gating generates the same timing signals required to segregate transient round signals, in a manner that incurs less delay and hence lesser switching activity in the circuits. We also show that energy-wise, inverse gated circuits outperform round gated circuits by a margin of around 30 %. In the second part of the paper, we further explore the efficiency of the energy reduction by tuning some of the design parameters. The most natural candidate for this was the delay of the buffer used for creating the timing signals. We found that the optimal energy consumption for any round and inverse gated unrolled block cipher occurs at a particular range of this delay value. We try to explain the optimality of this particular choice of design parameter with the help of the implementation of the AES-128 block cipher.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"173-176"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83144845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Chaos computing for mitigating side channel attack 缓解侧信道攻击的混沌计算
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383903
M. Majumder, Md. Sakib Hasan, Mesbah Uddin, G. Rose
Chaos computing is an unconventional paradigm for computing where chaotic oscillators are used for computation. As chaotic oscillators dynamically produce a large number of unique patterns over time, a single oscillator can be configured to produce different logic gates. Even the same logic functionality can be implemented using the same chaos gate but with different configurations. Chaotic implementations of logic thus provides opportunities for building instances of computing system with similar hardware but different configurations of operation, thus being capable of mitigating side channel based reverse engineering attack. In this paper, we explore the opportunities of mitigating side channel power attack vulnerabilities of conventional digital computing systems using chaos based logic. We perform an instruction classification attack using side channel power profiles on arithmetic logic units (ALU), considered for different proportions of conventional logic gates and chaotic logic gates. Quantitative analysis based on a classification algorithm shows that an ALU implemented with even a small proportion of chaotic gates can be classified with significantly lower accuracy compared to conventional alternatives.
混沌计算是一种非常规的计算范式,使用混沌振荡器进行计算。由于混沌振荡器随时间动态地产生大量独特的模式,单个振荡器可以配置为产生不同的逻辑门。即使是相同的逻辑功能,也可以使用相同的混沌门,但配置不同。因此,逻辑的混沌实现为构建具有相似硬件但不同操作配置的计算系统实例提供了机会,从而能够减轻基于侧信道的逆向工程攻击。在本文中,我们探讨了利用基于混沌的逻辑来减轻传统数字计算系统的侧信道功率攻击漏洞的机会。考虑到传统逻辑门和混沌逻辑门的不同比例,我们利用算术逻辑单元(ALU)的侧信道功率分布进行指令分类攻击。基于分类算法的定量分析表明,即使采用少量混沌门实现的ALU,其分类精度也明显低于常规方法。
{"title":"Chaos computing for mitigating side channel attack","authors":"M. Majumder, Md. Sakib Hasan, Mesbah Uddin, G. Rose","doi":"10.1109/HST.2018.8383903","DOIUrl":"https://doi.org/10.1109/HST.2018.8383903","url":null,"abstract":"Chaos computing is an unconventional paradigm for computing where chaotic oscillators are used for computation. As chaotic oscillators dynamically produce a large number of unique patterns over time, a single oscillator can be configured to produce different logic gates. Even the same logic functionality can be implemented using the same chaos gate but with different configurations. Chaotic implementations of logic thus provides opportunities for building instances of computing system with similar hardware but different configurations of operation, thus being capable of mitigating side channel based reverse engineering attack. In this paper, we explore the opportunities of mitigating side channel power attack vulnerabilities of conventional digital computing systems using chaos based logic. We perform an instruction classification attack using side channel power profiles on arithmetic logic units (ALU), considered for different proportions of conventional logic gates and chaotic logic gates. Quantitative analysis based on a classification algorithm shows that an ALU implemented with even a small proportion of chaotic gates can be classified with significantly lower accuracy compared to conventional alternatives.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"96 1","pages":"143-146"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80623044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Lowering the barrier to online malware detection through low frequency sampling of HPCs 通过hpc的低频采样降低在线恶意软件检测的障碍
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383910
P. Cronin, Chengmo Yang
As mobile phones become more ubiquitous in our daily lives, many malware creators have shifted their focus to these mobile platforms. While a plethora of work exists to try and detect malware as it is uploaded to app stores and when it is downloaded to user devices, malware still slips through. A lesser body of work has suggested that Hardware Performance Counters (HPCs) can provide an insight into detecting malware as it runs. While these works have been successful, they typically require thread-level sampling rates every tens of thousands of instructions and hundreds of KB/s to MB/s of bus bandwidth, resulting in high power overhead in battery constrained mobile devices. Unlike previous works, this paper proposes a coarser grained approach, requiring system-wide sampling rates in the hundreds of Hz and less than 10 KB/s of bandwidth, all while achieving similar accuracy to previous works and identification of zero-day attacks. The proposed method focuses purely on background detection, that is, detection of malware when its parent application is inactive. This technique relies upon a multi-layer neural network to extract the higher order dependencies between different HPCs as processes are executed on multiple cores. Experiments are conducted on a Motorola G4 platform, and classifiers are trained with multiple families of malware and a multitude of clean system states.
随着手机在我们的日常生活中变得越来越普遍,许多恶意软件的创建者已经将他们的注意力转移到这些移动平台上。尽管在恶意软件上传到应用商店和下载到用户设备上时,我们已经做了大量的工作来检测恶意软件,但恶意软件仍然会漏网之鱼。较少的研究表明,硬件性能计数器(hpc)可以提供在恶意软件运行时检测恶意软件的洞察力。虽然这些工作已经取得了成功,但它们通常需要每数万条指令的线程级采样率和数百KB/s到MB/s的总线带宽,从而导致电池受限的移动设备的高功率开销。与以前的工作不同,本文提出了一种更粗粒度的方法,要求系统范围的采样率在数百Hz和小于10 KB/s的带宽,同时实现与以前的工作相似的准确性和零日攻击的识别。所提出的方法纯粹侧重于后台检测,即在其父应用程序不活动时检测恶意软件。该技术依赖于多层神经网络来提取不同hpc之间的高阶依赖关系,因为进程在多个核心上执行。实验是在摩托罗拉G4平台上进行的,分类器是用多个恶意软件家族和大量干净的系统状态进行训练的。
{"title":"Lowering the barrier to online malware detection through low frequency sampling of HPCs","authors":"P. Cronin, Chengmo Yang","doi":"10.1109/HST.2018.8383910","DOIUrl":"https://doi.org/10.1109/HST.2018.8383910","url":null,"abstract":"As mobile phones become more ubiquitous in our daily lives, many malware creators have shifted their focus to these mobile platforms. While a plethora of work exists to try and detect malware as it is uploaded to app stores and when it is downloaded to user devices, malware still slips through. A lesser body of work has suggested that Hardware Performance Counters (HPCs) can provide an insight into detecting malware as it runs. While these works have been successful, they typically require thread-level sampling rates every tens of thousands of instructions and hundreds of KB/s to MB/s of bus bandwidth, resulting in high power overhead in battery constrained mobile devices. Unlike previous works, this paper proposes a coarser grained approach, requiring system-wide sampling rates in the hundreds of Hz and less than 10 KB/s of bandwidth, all while achieving similar accuracy to previous works and identification of zero-day attacks. The proposed method focuses purely on background detection, that is, detection of malware when its parent application is inactive. This technique relies upon a multi-layer neural network to extract the higher order dependencies between different HPCs as processes are executed on multiple cores. Experiments are conducted on a Motorola G4 platform, and classifiers are trained with multiple families of malware and a multitude of clean system states.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"6 1","pages":"177-180"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76435275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hardware virtualization for protection against power analysis attack 硬件虚拟化,防止电源分析攻击
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383908
Kai Yang, Jungmin Park, M. Tehranipoor, S. Bhunia
Field programmable gate arrays (FPGAs) are being increasingly used in diverse Internet of Things (IoT) application space. Poor programmability of FPGAs compared to their processor counterparts remains an important challenge amidst their wide-spread usage. On the other hand, security of FPGA-based systems against physical attacks, in particular, side-channel attacks (SCAs) has emerged as a critical concern. Hardware virtualization, where instead of directly mapping a design to FPGA, it is mapped on top of a generic architecture, called overlay, has been shown to address the programmability challenge, leading to significantly higher productivity and several orders of magnitude reductions in compile time as well as bitstream size. However, unlike software or network virtualization, FPGA virtualization has not been studied with respect to its security benefits. In this paper, for the first time to our knowledge, we propose to utilize the properties of virtualization to address the FPGA security issues against a dominant mode of SCA, namely, power analysis attack. We note that while virtualization shows many intrinsic security benefits, we can efficiently implement masking approaches in novel ways onto this architecture to achieve high level of protection. Extensive security analysis is done to show large side-channel resistance improvement for a set of evaluation metrics.
现场可编程门阵列(fpga)越来越多地应用于各种物联网(IoT)应用领域。fpga与处理器相比,较差的可编程性在其广泛使用中仍然是一个重要的挑战。另一方面,基于fpga的系统抵御物理攻击的安全性,特别是侧信道攻击(sca)已经成为一个关键问题。硬件虚拟化,而不是直接将设计映射到FPGA,它被映射到一个通用架构的顶部,称为覆盖,已经被证明可以解决可编程性的挑战,导致显着更高的生产力和几个数量级的减少编译时间和比特流大小。然而,与软件或网络虚拟化不同,FPGA虚拟化在安全性方面还没有得到研究。在本文中,据我们所知,我们首次提出利用虚拟化的特性来解决FPGA安全问题,以对抗SCA的主要模式,即功率分析攻击。我们注意到,虽然虚拟化显示了许多内在的安全优势,但我们可以在此体系结构上以新颖的方式有效地实现屏蔽方法,以实现高级别保护。进行了广泛的安全性分析,以显示一组评估指标的大侧信道阻力改进。
{"title":"Hardware virtualization for protection against power analysis attack","authors":"Kai Yang, Jungmin Park, M. Tehranipoor, S. Bhunia","doi":"10.1109/HST.2018.8383908","DOIUrl":"https://doi.org/10.1109/HST.2018.8383908","url":null,"abstract":"Field programmable gate arrays (FPGAs) are being increasingly used in diverse Internet of Things (IoT) application space. Poor programmability of FPGAs compared to their processor counterparts remains an important challenge amidst their wide-spread usage. On the other hand, security of FPGA-based systems against physical attacks, in particular, side-channel attacks (SCAs) has emerged as a critical concern. Hardware virtualization, where instead of directly mapping a design to FPGA, it is mapped on top of a generic architecture, called overlay, has been shown to address the programmability challenge, leading to significantly higher productivity and several orders of magnitude reductions in compile time as well as bitstream size. However, unlike software or network virtualization, FPGA virtualization has not been studied with respect to its security benefits. In this paper, for the first time to our knowledge, we propose to utilize the properties of virtualization to address the FPGA security issues against a dominant mode of SCA, namely, power analysis attack. We note that while virtualization shows many intrinsic security benefits, we can efficiently implement masking approaches in novel ways onto this architecture to achieve high level of protection. Extensive security analysis is done to show large side-channel resistance improvement for a set of evaluation metrics.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"167-172"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83193213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A flexible leakage trace collection setup for arbitrary cryptographic IP cores 一个灵活的泄漏跟踪收集设置为任意加密IP核
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383902
Athanassios Moschos, A. Fournaris, O. Koufopavlou
Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisition control mechanisms. To match these problems, in this paper, a flexible and scalable architecture for leakage trace collection is proposed, providing a fast, reconfigurable and flexible control mechanism that can be easily scaled to a wide variety of Devices Under Test (DUT). The proposed system migrates test vector generation, control and transmission, from off-board Personal Computer (PC) to an on-board embedded-system hardware control mechanism. The proposed solution provides a toolset that can be used to structure various leakage assessment scenarios, regardless of the DUT's implemented cryptographic algorithm. The proposed approach enables single, multiple encryption per control loop round and DUT clock frequency adjustment to achieve accurate and fast leakage trace collection even for low-mid range oscilloscopes.
泄漏评估和侧通道攻击(SCA)泄漏跟踪获取工具和平台需要相当多的时间来收集数百万条跟踪,并且依赖于自定义,难以更改或处理获取控制机制。为了解决这些问题,本文提出了一种灵活且可扩展的泄漏迹收集架构,提供了一种快速,可重构和灵活的控制机制,可以轻松扩展到各种被测设备(DUT)。该系统将测试向量的生成、控制和传输从机载个人计算机(PC)迁移到机载嵌入式系统硬件控制机制。提出的解决方案提供了一个工具集,可用于构建各种泄漏评估场景,而不管DUT实现的加密算法如何。所提出的方法可以实现每个控制环轮的单次、多次加密和DUT时钟频率调整,即使对于中低范围示波器也可以实现准确和快速的泄漏迹收集。
{"title":"A flexible leakage trace collection setup for arbitrary cryptographic IP cores","authors":"Athanassios Moschos, A. Fournaris, O. Koufopavlou","doi":"10.1109/HST.2018.8383902","DOIUrl":"https://doi.org/10.1109/HST.2018.8383902","url":null,"abstract":"Leakage Assessment and Side Channel Attacks (SCA) leakage trace acquisition tools and platforms require a considerable amount of time to collect millions of traces and rely on custom, hard to change or handle acquisition control mechanisms. To match these problems, in this paper, a flexible and scalable architecture for leakage trace collection is proposed, providing a fast, reconfigurable and flexible control mechanism that can be easily scaled to a wide variety of Devices Under Test (DUT). The proposed system migrates test vector generation, control and transmission, from off-board Personal Computer (PC) to an on-board embedded-system hardware control mechanism. The proposed solution provides a toolset that can be used to structure various leakage assessment scenarios, regardless of the DUT's implemented cryptographic algorithm. The proposed approach enables single, multiple encryption per control loop round and DUT clock frequency adjustment to achieve accurate and fast leakage trace collection even for low-mid range oscilloscopes.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"39 1","pages":"138-142"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88455142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology 神经网络的隐形感染——一种低成本的敏捷神经木马攻击方法
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383920
Tao Liu, Wujie Wen, Yier Jin
Deep Neural Network (DNN) has recently become the “de facto” technique to drive the artificial intelligence (AI) industry. However, there also emerges many security issues as the DNN based intelligent systems are being increasingly prevalent. Existing DNN security studies, such as adversarial attacks and poisoning attacks, are usually narrowly conducted at the software algorithm level, with the misclassification as their primary goal. The more realistic system-level attacks introduced by the emerging intelligent service supply chain, e.g. the third-party cloud based machine learning as a service (MLaaS) along with the portable DNN computing engine, have never been discussed. In this work, we propose a low-cost modular methodology-Stealth Infection on Neural Network, namely “SIN2”, to demonstrate the novel and practical intelligent supply chain triggered neural Trojan attacks. Our “SIN2” well leverages the attacking opportunities built upon the static neural network model and the underlying dynamic runtime system of neural computing framework through a bunch of neural Trojaning techniques. We implement a variety of neural Trojan attacks in Linux sandbox by following proposed “SIN2”. Experimental results show that our modular design can rapidly produce and trigger various Trojan attacks that can easily evade the existing defenses.
深度神经网络(DNN)最近已经成为推动人工智能(AI)行业的“事实上的”技术。然而,随着基于深度神经网络的智能系统的日益普及,也出现了许多安全问题。现有的DNN安全研究,如对抗性攻击、投毒攻击等,通常都是狭隘地在软件算法层面进行,错误分类是其主要目标。新兴智能服务供应链引入的更现实的系统级攻击,例如基于第三方云的机器学习即服务(MLaaS)以及便携式DNN计算引擎,从未被讨论过。在这项工作中,我们提出了一种低成本的模块化方法-神经网络隐身感染,即“SIN2”,以展示新颖实用的智能供应链触发神经木马攻击。我们的“SIN2”很好地利用了基于静态神经网络模型和底层神经计算框架动态运行系统的攻击机会,通过一堆神经木马技术。我们按照提出的“SIN2”在Linux沙箱中实现了各种神经木马攻击。实验结果表明,我们的模块化设计可以快速生成并触发各种特洛伊木马攻击,这些攻击可以很容易地逃避现有的防御。
{"title":"SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology","authors":"Tao Liu, Wujie Wen, Yier Jin","doi":"10.1109/HST.2018.8383920","DOIUrl":"https://doi.org/10.1109/HST.2018.8383920","url":null,"abstract":"Deep Neural Network (DNN) has recently become the “de facto” technique to drive the artificial intelligence (AI) industry. However, there also emerges many security issues as the DNN based intelligent systems are being increasingly prevalent. Existing DNN security studies, such as adversarial attacks and poisoning attacks, are usually narrowly conducted at the software algorithm level, with the misclassification as their primary goal. The more realistic system-level attacks introduced by the emerging intelligent service supply chain, e.g. the third-party cloud based machine learning as a service (MLaaS) along with the portable DNN computing engine, have never been discussed. In this work, we propose a low-cost modular methodology-Stealth Infection on Neural Network, namely “SIN2”, to demonstrate the novel and practical intelligent supply chain triggered neural Trojan attacks. Our “SIN2” well leverages the attacking opportunities built upon the static neural network model and the underlying dynamic runtime system of neural computing framework through a bunch of neural Trojaning techniques. We implement a variety of neural Trojan attacks in Linux sandbox by following proposed “SIN2”. Experimental results show that our modular design can rapidly produce and trigger various Trojan attacks that can easily evade the existing defenses.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"53 1","pages":"227-230"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77881713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Robust, low-cost, and accurate detection of recycled ICs using digital signatures 使用数字签名对回收ic进行稳健、低成本和准确的检测
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383917
M. Alam, Sreeja Chowdhury, M. Tehranipoor, Ujjwal Guin
The continuous growth of recycled integrated circuits (ICs) poses a serious threat to our critical infrastructures due to their inferior quality and has become one of the major concerns to the government and the industry. Detection of these ICs is challenging especially when they have been used for a short period of time, as the process variations (especially in lower technology nodes) could outpace the degradation caused by aging. In this paper, we propose a robust, accurate, and low-cost solution for efficient detection of recycled ICs, even if they have been used for a very short period of time. The proposed solution utilizes a ring oscillator (RO), and a nonvolatile memory. It stores the RO frequency, conditions (e.g., supply voltage, temperature, and duration) for the frequency measurement, and a digital signature. The simulation and silicon results demonstrate that we can effectively detect recycled ICs used as low as one day.
由于回收集成电路的质量低劣,其数量的持续增长对我国的关键基础设施构成了严重威胁,已成为政府和业界关注的主要问题之一。这些集成电路的检测具有挑战性,特别是当它们使用的时间很短时,因为工艺变化(特别是在较低的技术节点)可能超过老化引起的退化。在本文中,我们提出了一种强大,准确,低成本的解决方案,用于有效检测回收ic,即使它们已经使用了很短的时间。提出的解决方案利用环形振荡器(RO)和非易失性存储器。它存储RO频率,条件(例如,电源电压,温度和持续时间)用于频率测量,和数字签名。仿真和硅的结果表明,我们可以有效地检测到低至一天的回收ic。
{"title":"Robust, low-cost, and accurate detection of recycled ICs using digital signatures","authors":"M. Alam, Sreeja Chowdhury, M. Tehranipoor, Ujjwal Guin","doi":"10.1109/HST.2018.8383917","DOIUrl":"https://doi.org/10.1109/HST.2018.8383917","url":null,"abstract":"The continuous growth of recycled integrated circuits (ICs) poses a serious threat to our critical infrastructures due to their inferior quality and has become one of the major concerns to the government and the industry. Detection of these ICs is challenging especially when they have been used for a short period of time, as the process variations (especially in lower technology nodes) could outpace the degradation caused by aging. In this paper, we propose a robust, accurate, and low-cost solution for efficient detection of recycled ICs, even if they have been used for a very short period of time. The proposed solution utilizes a ring oscillator (RO), and a nonvolatile memory. It stores the RO frequency, conditions (e.g., supply voltage, temperature, and duration) for the frequency measurement, and a digital signature. The simulation and silicon results demonstrate that we can effectively detect recycled ICs used as low as one day.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"40 1","pages":"209-214"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89583980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
FPGA-oriented moving target defense against security threats from malicious FPGA tools 面向FPGA的移动目标防御来自恶意FPGA工具的安全威胁
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383907
Zhiming Zhang, Qiaoyan Yu, L. Njilla, C. Kamhoua
The imbalance relationship between FPGA hardware/software providers and FPGA users challenges the assurance of secure design on FPGAs. Existing efforts on FPGA security primarily focus on reverse engineering the downloaded FPGA configuration, retrieving the authentication code or crypto key stored on the embedded memory in FPGAs, and countermeasures for the security threats above. In this work, we investigate new security threats from malicious FPGA tools, and identify stealthy attacks that could occur during FPGA deployment. To address those attacks, we exploit the principles of moving target defense (MTD) and propose a FPGA-oriented MTD (FOMTD) method. Our method is composed of three defense lines, which are formed by an improved user constraint file, random selection of design replicas, and runtime submodule assembling, respectively. The FPGA emulation results show that the proposed FOMTD method reduces the hardware Trojan hit rate by 60% over the baseline, at the cost of 10.76% more power consumption.
FPGA硬件/软件供应商与FPGA用户之间的不平衡关系对FPGA安全设计的保证提出了挑战。现有的FPGA安全研究主要集中在对下载的FPGA配置进行逆向工程,检索存储在FPGA嵌入式存储器中的认证码或加密密钥,以及针对上述安全威胁的对策。在这项工作中,我们研究了来自恶意FPGA工具的新安全威胁,并识别了FPGA部署期间可能发生的隐形攻击。为了解决这些攻击,我们利用移动目标防御(MTD)的原理,提出了一种面向fpga的移动目标防御(FOMTD)方法。我们的方法由三条防线组成,分别由改进的用户约束文件、随机选择设计副本和运行时子模块组装组成。FPGA仿真结果表明,该方法将硬件木马的命中率比基线降低了60%,功耗提高了10.76%。
{"title":"FPGA-oriented moving target defense against security threats from malicious FPGA tools","authors":"Zhiming Zhang, Qiaoyan Yu, L. Njilla, C. Kamhoua","doi":"10.1109/HST.2018.8383907","DOIUrl":"https://doi.org/10.1109/HST.2018.8383907","url":null,"abstract":"The imbalance relationship between FPGA hardware/software providers and FPGA users challenges the assurance of secure design on FPGAs. Existing efforts on FPGA security primarily focus on reverse engineering the downloaded FPGA configuration, retrieving the authentication code or crypto key stored on the embedded memory in FPGAs, and countermeasures for the security threats above. In this work, we investigate new security threats from malicious FPGA tools, and identify stealthy attacks that could occur during FPGA deployment. To address those attacks, we exploit the principles of moving target defense (MTD) and propose a FPGA-oriented MTD (FOMTD) method. Our method is composed of three defense lines, which are formed by an improved user constraint file, random selection of design replicas, and runtime submodule assembling, respectively. The FPGA emulation results show that the proposed FOMTD method reduces the hardware Trojan hit rate by 60% over the baseline, at the cost of 10.76% more power consumption.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"40 1","pages":"163-166"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85003436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
R2D2: Runtime reassurance and detection of A2 Trojan R2D2:运行时保证和检测A2木马
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383914
Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu
With the globalization of semiconductor industry, hardware security issues have been gaining increasing attention. Among all hardware security threats, the insertion of hardware Trojans is one of the main concerns. Meanwhile, many current Trojan detection solutions follow the assumption that the hardware Trojan itself should be composed of digital logic. This assumption is invalidated by recently proposed analog Trojans which are extremely small and can detect rare events. This paper proposes a runtime hardware Trojan detection method which is geared towards detecting such advanced Trojans. The principle of this method is to guard a set of concerned signals, and initiate a hardware interrupt request when abnormal toggling events occur in these guarded signals. To prove the effectiveness of this method, we design a processor based on ARMv7-A&R ISA, and insert an analog Trojan into the processor. We fabricated the design in the SMIC 130 nm process and demonstrate the effectiveness of the proposed methodology.
随着半导体产业的全球化,硬件安全问题越来越受到人们的关注。在所有硬件安全威胁中,硬件木马的插入是主要问题之一。同时,目前许多木马检测方案都假设硬件木马本身应该由数字逻辑组成。这一假设被最近提出的模拟木马所推翻,这些木马非常小,可以探测到罕见的事件。本文提出了一种针对此类高级木马的运行时硬件木马检测方法。该方法的原理是保护一组相关信号,当这些被保护的信号中发生异常切换事件时,发起硬件中断请求。为了证明该方法的有效性,我们设计了一个基于ARMv7-A&R ISA的处理器,并在处理器中插入模拟木马。我们在中芯国际130纳米工艺中制造了设计,并证明了所提出方法的有效性。
{"title":"R2D2: Runtime reassurance and detection of A2 Trojan","authors":"Yumin Hou, Hu He, Kaveh Shamsi, Yier Jin, Dong Wu, Huaqiang Wu","doi":"10.1109/HST.2018.8383914","DOIUrl":"https://doi.org/10.1109/HST.2018.8383914","url":null,"abstract":"With the globalization of semiconductor industry, hardware security issues have been gaining increasing attention. Among all hardware security threats, the insertion of hardware Trojans is one of the main concerns. Meanwhile, many current Trojan detection solutions follow the assumption that the hardware Trojan itself should be composed of digital logic. This assumption is invalidated by recently proposed analog Trojans which are extremely small and can detect rare events. This paper proposes a runtime hardware Trojan detection method which is geared towards detecting such advanced Trojans. The principle of this method is to guard a set of concerned signals, and initiate a hardware interrupt request when abnormal toggling events occur in these guarded signals. To prove the effectiveness of this method, we design a processor based on ARMv7-A&R ISA, and insert an analog Trojan into the processor. We fabricated the design in the SMIC 130 nm process and demonstrate the effectiveness of the proposed methodology.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"49 1","pages":"195-200"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80325640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A compact energy-efficient pseudo-static camouflaged logic family 一个紧凑节能的伪静态伪装逻辑族
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383896
P. Mohan, N. E. C. Akkaya, B. Erbagci, K. Mai
Protecting hardware IP from reverse engineering threats is becoming increasingly challenging with advances in reverse engineering techniques. Different camouflaged logic families based on multi-Vt transistors have been recently proposed to combat reverse engineering threats. While multi-Vt based camouflaged logic gates offer cells that have an identical layout with multiple functionalities, they typically incur significant overheads in power, area, and delay. Moreover, amplifying the threshold voltage difference to logic levels while maintaining the noise margins needs careful analysis of PVT variations and mismatch. In this paper, a Pseudo-Static Camouflaged (PS-CAMO) logic family is proposed to improve the energy overheads of camouflaged logic gates while maintaining the reliability and yields of static CMOS logic gates. Post-layout simulations of a high-performance fully camouflaged S-box in a 65nm industrial CMOS process shows a 42% reduction in energy and a 26% reduction in area compared to a previously proposed Threshold Voltage Defined (TVD) camouflaged logic family.
随着逆向工程技术的进步,保护硬件IP免受逆向工程威胁变得越来越具有挑战性。最近提出了基于多vt晶体管的不同伪装逻辑族来对抗逆向工程威胁。虽然基于多电压的伪装逻辑门提供具有多种功能的相同布局的单元,但它们通常会在功率,面积和延迟方面产生显着的开销。此外,在保持噪声裕度的同时,将阈值电压差放大到逻辑电平需要仔细分析PVT变化和失配。本文提出了一种伪静态伪装(PS-CAMO)逻辑族,以提高伪装逻辑门的能量开销,同时保持静态CMOS逻辑门的可靠性和成品率。在65nm工业CMOS工艺中对高性能全伪装s盒进行布局后仿真表明,与先前提出的阈值电压定义(TVD)伪装逻辑家族相比,能量降低42%,面积减少26%。
{"title":"A compact energy-efficient pseudo-static camouflaged logic family","authors":"P. Mohan, N. E. C. Akkaya, B. Erbagci, K. Mai","doi":"10.1109/HST.2018.8383896","DOIUrl":"https://doi.org/10.1109/HST.2018.8383896","url":null,"abstract":"Protecting hardware IP from reverse engineering threats is becoming increasingly challenging with advances in reverse engineering techniques. Different camouflaged logic families based on multi-Vt transistors have been recently proposed to combat reverse engineering threats. While multi-Vt based camouflaged logic gates offer cells that have an identical layout with multiple functionalities, they typically incur significant overheads in power, area, and delay. Moreover, amplifying the threshold voltage difference to logic levels while maintaining the noise margins needs careful analysis of PVT variations and mismatch. In this paper, a Pseudo-Static Camouflaged (PS-CAMO) logic family is proposed to improve the energy overheads of camouflaged logic gates while maintaining the reliability and yields of static CMOS logic gates. Post-layout simulations of a high-performance fully camouflaged S-box in a 65nm industrial CMOS process shows a 42% reduction in energy and a 26% reduction in area compared to a previously proposed Threshold Voltage Defined (TVD) camouflaged logic family.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"1 1","pages":"96-102"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82207726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1