首页 > 最新文献

2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)最新文献

英文 中文
TZSlicer: Security-aware dynamic program slicing for hardware isolation TZSlicer:用于硬件隔离的安全感知动态程序切片
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383886
Mengmei Ye, Jonathan M. Sherman, W. Srisa-an, Sheng Wei
To address security issues related to information leakage, microprocessor designers and manufacturers such as ARM and Intel have introduced hardware isolation-based technologies to support secure software execution. However, utilizing such technologies often requires significant efforts to design new applications or refactor existing applications to adhere to the usage protocols. Developers also need to clearly distinguish code sections that can manipulate sensitive data and relocate them to the secure execution environment. These processes can be laborious and error-prone, since over-protection can result in poor application performance and high resource usage, and under-protection may cause exploitable security vulnerabilities. In this paper, we introduce TZSlicer, a framework to automatically identify code that must be protected based on a sensitive variable list provided by developers. TZSlicer automatically identifies code sections that can process sensitive data, extracts those sections from the original program, and creates harness in the original and extracted code sections so that they can interface with each other. We develop a prototype of TZSlicer to support slicing of C programs at function, code block, and code line levels. Also, we identify optimization opportunities to improve the context switching overhead of TZSlicer via applying loop unrolling and variable renaming. We evaluate TZSlicer using seven real-world programs, and the evaluation results indicate that TZSlicer is effective in protecting sensitive data without incurring significant runtime and resource usage overheads.
为了解决与信息泄露相关的安全问题,微处理器设计人员和制造商(如ARM和Intel)引入了基于硬件隔离的技术来支持安全的软件执行。然而,利用这些技术通常需要付出巨大的努力来设计新的应用程序或重构现有的应用程序,以遵守使用协议。开发人员还需要清楚地区分可以操作敏感数据的代码段,并将它们重新定位到安全的执行环境中。这些过程可能很费力,而且容易出错,因为过度保护可能导致应用程序性能差和资源使用率高,而保护不足可能导致可利用的安全漏洞。在本文中,我们介绍了TZSlicer,这是一个框架,可以根据开发人员提供的敏感变量列表自动识别必须保护的代码。TZSlicer自动识别可以处理敏感数据的代码段,从原始程序中提取这些部分,并在原始和提取的代码段中创建控制,以便它们可以相互连接。我们开发了一个TZSlicer的原型,以支持在函数、代码块和代码行级别对C程序进行切片。此外,我们还确定了通过应用循环展开和变量重命名来改进TZSlicer上下文切换开销的优化机会。我们使用七个实际程序对TZSlicer进行了评估,评估结果表明TZSlicer在保护敏感数据方面是有效的,而不会产生显着的运行时和资源使用开销。
{"title":"TZSlicer: Security-aware dynamic program slicing for hardware isolation","authors":"Mengmei Ye, Jonathan M. Sherman, W. Srisa-an, Sheng Wei","doi":"10.1109/HST.2018.8383886","DOIUrl":"https://doi.org/10.1109/HST.2018.8383886","url":null,"abstract":"To address security issues related to information leakage, microprocessor designers and manufacturers such as ARM and Intel have introduced hardware isolation-based technologies to support secure software execution. However, utilizing such technologies often requires significant efforts to design new applications or refactor existing applications to adhere to the usage protocols. Developers also need to clearly distinguish code sections that can manipulate sensitive data and relocate them to the secure execution environment. These processes can be laborious and error-prone, since over-protection can result in poor application performance and high resource usage, and under-protection may cause exploitable security vulnerabilities. In this paper, we introduce TZSlicer, a framework to automatically identify code that must be protected based on a sensitive variable list provided by developers. TZSlicer automatically identifies code sections that can process sensitive data, extracts those sections from the original program, and creates harness in the original and extracted code sections so that they can interface with each other. We develop a prototype of TZSlicer to support slicing of C programs at function, code block, and code line levels. Also, we identify optimization opportunities to improve the context switching overhead of TZSlicer via applying loop unrolling and variable renaming. We evaluate TZSlicer using seven real-world programs, and the evaluation results indicate that TZSlicer is effective in protecting sensitive data without incurring significant runtime and resource usage overheads.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"28 1","pages":"17-24"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89371456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Direct read of idle block RAM from FPGAs utilizing photon emission microscopy 利用光子发射显微镜从fpga直接读取空闲块RAM
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383889
Jacob Couch, Nicole Whewell, A. Monica, S. Papadakis
In many reverse engineering efforts, side channels have been utilized to extract both design information and data from integrated circuits. In this paper, a technique is demonstrated to recover data by directly reading idle SRAM cells within an FPGA, without engaging the read circuitry. This is accomplished using photon emission microscopy to capture the photons that are emitted as leakage currents flow from the source to the drain of NMOS transistors within the SRAM cell. Depending on whether a 0 or 1 state is stored in a particular cell, the location of the emitting transistor is different. The read circuity in many integrated circuits cannot be easily activated in a repeatable pattern, thus forming need to access the contents of idle SRAM cells. This was evaluated and refined on a 220 nm process node FPGA. We discuss the physics of photon emission in these devices and the consequences for successful imaging of SRAM contents. Through initial investigations and calculations, we predict that extraction of data from idle SRAM can be conducted on more modern parts. Through an extension of this technique, data such as encryption keys, state information, and restricted variables that would not be accessible through traditional bitstream and firmware reverse engineering efforts can be extracted from the integrated circuit. This information can then be utilized to ensure the integrity of a system, or as a threat to the integrity of the system.
在许多逆向工程中,侧通道被用来从集成电路中提取设计信息和数据。在本文中,演示了一种技术,通过直接读取FPGA内的空闲SRAM单元来恢复数据,而无需使用读取电路。这是通过使用光子发射显微镜来捕获泄漏电流从SRAM单元内的NMOS晶体管的源极流向漏极时发射的光子来实现的。根据在特定单元中存储的是0还是1状态,发射晶体管的位置是不同的。许多集成电路中的读电路不能轻易地以可重复的模式激活,从而形成需要访问空闲SRAM单元的内容。在220纳米工艺节点FPGA上对其进行了评估和改进。我们讨论了这些器件中光子发射的物理性质以及对SRAM内容成功成像的影响。通过初步的调查和计算,我们预测从空闲SRAM中提取数据可以在更现代的零件上进行。通过对该技术的扩展,可以从集成电路中提取加密密钥、状态信息和限制变量等数据,这些数据是传统的比特流和固件逆向工程无法访问的。然后可以利用这些信息来确保系统的完整性,或者作为对系统完整性的威胁。
{"title":"Direct read of idle block RAM from FPGAs utilizing photon emission microscopy","authors":"Jacob Couch, Nicole Whewell, A. Monica, S. Papadakis","doi":"10.1109/HST.2018.8383889","DOIUrl":"https://doi.org/10.1109/HST.2018.8383889","url":null,"abstract":"In many reverse engineering efforts, side channels have been utilized to extract both design information and data from integrated circuits. In this paper, a technique is demonstrated to recover data by directly reading idle SRAM cells within an FPGA, without engaging the read circuitry. This is accomplished using photon emission microscopy to capture the photons that are emitted as leakage currents flow from the source to the drain of NMOS transistors within the SRAM cell. Depending on whether a 0 or 1 state is stored in a particular cell, the location of the emitting transistor is different. The read circuity in many integrated circuits cannot be easily activated in a repeatable pattern, thus forming need to access the contents of idle SRAM cells. This was evaluated and refined on a 220 nm process node FPGA. We discuss the physics of photon emission in these devices and the consequences for successful imaging of SRAM contents. Through initial investigations and calculations, we predict that extraction of data from idle SRAM can be conducted on more modern parts. Through an extension of this technique, data such as encryption keys, state information, and restricted variables that would not be accessible through traditional bitstream and firmware reverse engineering efforts can be extracted from the integrated circuit. This information can then be utilized to ensure the integrity of a system, or as a threat to the integrity of the system.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"19 1","pages":"41-48"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90319060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure chip odometers using intentional controlled aging 安全芯片里程表使用故意控制老化
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383898
N. E. C. Akkaya, B. Erbagci, K. Mai
Electronics counterfeiting is a significant and growing problem for electronics manufacturers, system integrators, and end customers. The widespread prevalence of counterfeit electronics in the manufacturing supply chain raises significant security concerns in both the defense and civilian sectors. The threat ranges from relatively simple IC remarking, in order to sell parts at a higher price or to recycle parts from discarded equipment, to wholesale reverse-engineering/copying of designs and manufacturing of cloned ICs and systems. To combat IC counterfeiting, we propose secure chip odometers to provide ICs with both a secure gauge of use/age and an authentication of provenance to enable simple, secure, robust differentiation between genuine and counterfeit parts. The secure chip odometers have chained binary aging elements (BAE) to measure use and age of the chip. In our proposed design, BAEs that use hot carrier injection (HCI) to measure age/use are designed and taped-out in a 65 nm bulk CMOS process. For characterization purposes, the taped-out chips have an array of 500 modular BAEs and a self-aging system with 16 modular BAEs. The modularity of the design provides 693 possible combinations for different stress current and current density values. The test chip dimensions are 1.2mm by 1.7mm with 78 pads, and each modular BAE has an area of 52.5μm2. They can be stressed with currents ranging from 40μA to 1.3mA at the 2.5V nominal stress voltage.
电子产品假冒是电子产品制造商、系统集成商和最终客户面临的一个日益严重的问题。假冒电子产品在制造业供应链中的普遍存在,引起了国防和民用部门的重大安全问题。威胁范围从相对简单的IC评论,以便以更高的价格出售零件或从废弃设备中回收零件,到批发逆向工程/复制设计和制造克隆IC和系统。为了打击IC伪造,我们提出了安全芯片里程表,为IC提供安全的使用/使用年限和来源认证,以实现简单,安全,可靠的正品和假冒部件区分。安全的芯片里程表有链接的二进制老化元件(BAE)来测量芯片的使用和年龄。在我们提出的设计中,使用热载流子注入(HCI)来测量年龄/使用的BAEs被设计并在65纳米体CMOS工艺中成型。为了进行表征,带出芯片具有500个模块化BAEs阵列和一个具有16个模块化BAEs的自老化系统。模块化的设计为不同的应力电流和电流密度值提供了693种可能的组合。测试芯片尺寸为1.2mm × 1.7mm,共78个衬垫,每个模块化BAE的面积为52.5μm2。它们可以在2.5V标称应力电压下承受40μA至1.3mA的电流。
{"title":"Secure chip odometers using intentional controlled aging","authors":"N. E. C. Akkaya, B. Erbagci, K. Mai","doi":"10.1109/HST.2018.8383898","DOIUrl":"https://doi.org/10.1109/HST.2018.8383898","url":null,"abstract":"Electronics counterfeiting is a significant and growing problem for electronics manufacturers, system integrators, and end customers. The widespread prevalence of counterfeit electronics in the manufacturing supply chain raises significant security concerns in both the defense and civilian sectors. The threat ranges from relatively simple IC remarking, in order to sell parts at a higher price or to recycle parts from discarded equipment, to wholesale reverse-engineering/copying of designs and manufacturing of cloned ICs and systems. To combat IC counterfeiting, we propose secure chip odometers to provide ICs with both a secure gauge of use/age and an authentication of provenance to enable simple, secure, robust differentiation between genuine and counterfeit parts. The secure chip odometers have chained binary aging elements (BAE) to measure use and age of the chip. In our proposed design, BAEs that use hot carrier injection (HCI) to measure age/use are designed and taped-out in a 65 nm bulk CMOS process. For characterization purposes, the taped-out chips have an array of 500 modular BAEs and a self-aging system with 16 modular BAEs. The modularity of the design provides 693 possible combinations for different stress current and current density values. The test chip dimensions are 1.2mm by 1.7mm with 78 pads, and each modular BAE has an area of 52.5μm2. They can be stressed with currents ranging from 40μA to 1.3mA at the 2.5V nominal stress voltage.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"34 1","pages":"111-117"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81446097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning RF-PUF:通过使用原位机器学习对无线节点进行认证来增强物联网安全性
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383916
Baibhab Chatterjee, D. Das, Shreyas Sen
Physical unclonable functions (PUF) in silicon exploit die-to-die manufacturing variations during fabrication for uniquely identifying each die. Since it is practically a hard problem to recreate exact silicon features across dies, a PUF-based authentication system is robust, secure and cost-effective, as long as bias removal and error correction are taken into account. In this work, we utilize the effects of inherent process variation on analog and radio-frequency (RF) properties of multiple wireless transmitters (Tx) in a sensor network, and detect the features at the receiver (Rx) using a deep neural network based framework. The proposed mechanism/ framework, called RF-PUF, harnesses already-existing RF communication hardware and does not require any additional PUF-generation circuitry in the Tx for practical implementation. Simulation results indicate that the RF-PUF framework can distinguish up to 10000 transmitters (with standard foundry defined variations for a 65 nm process, leading to non-idealities such as LO offset and I-Q imbalance) under varying channel conditions, with a probability of false detection < 10−3.
硅中的物理不可克隆功能(PUF)在制造过程中利用模具到模具的制造变化来唯一地识别每个模具。由于在芯片上重建精确的硅特征实际上是一个难题,因此只要考虑到消除偏置和纠错,基于puf的认证系统就具有鲁棒性,安全性和成本效益。在这项工作中,我们利用固有过程变化对传感器网络中多个无线发射器(Tx)的模拟和射频(RF)特性的影响,并使用基于深度神经网络的框架检测接收器(Rx)的特征。所提出的机制/框架,称为RF- puf,利用已经存在的RF通信硬件,并且不需要在Tx中额外的puf生成电路进行实际实施。仿真结果表明,RF-PUF框架可以在不同信道条件下区分多达10000个发射机(对于65nm工艺,标准铸造厂定义的变化会导致LO偏移和I-Q不平衡等非理想情况),误检概率< 10−3。
{"title":"RF-PUF: IoT security enhancement through authentication of wireless nodes using in-situ machine learning","authors":"Baibhab Chatterjee, D. Das, Shreyas Sen","doi":"10.1109/HST.2018.8383916","DOIUrl":"https://doi.org/10.1109/HST.2018.8383916","url":null,"abstract":"Physical unclonable functions (PUF) in silicon exploit die-to-die manufacturing variations during fabrication for uniquely identifying each die. Since it is practically a hard problem to recreate exact silicon features across dies, a PUF-based authentication system is robust, secure and cost-effective, as long as bias removal and error correction are taken into account. In this work, we utilize the effects of inherent process variation on analog and radio-frequency (RF) properties of multiple wireless transmitters (Tx) in a sensor network, and detect the features at the receiver (Rx) using a deep neural network based framework. The proposed mechanism/ framework, called RF-PUF, harnesses already-existing RF communication hardware and does not require any additional PUF-generation circuitry in the Tx for practical implementation. Simulation results indicate that the RF-PUF framework can distinguish up to 10000 transmitters (with standard foundry defined variations for a 65 nm process, leading to non-idealities such as LO offset and I-Q imbalance) under varying channel conditions, with a probability of false detection < 10−3.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"66 1","pages":"205-208"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83248243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Value prediction for security (VPsec): Countering fault attacks in modern microprocessors 安全性的值预测(VPsec):对抗现代微处理器中的故障攻击
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383922
Rami Sheikh, Rosario Cammarota, Wenjia Ruan
This work proposes VPsec, a novel hardware-only scheme that leverages value prediction in an embodiment and system design to mitigate fault attacks in general purpose microprocessors. The design of VPsec augments value prediction schemes in modern microprocessors with fault detection logic and reaction logic, to mitigate fault attacks to both the datapath and the value predictor itself. VPsec requires minimal hardware changes (negligible area impact) with respect to a baseline processor supporting value prediction, it has no software overheads {no increase in memory footprint), and, under common attack scenarios, it retains most of the performance benefits of value prediction. Our evaluation of VPsec demonstrates its efficacy in countering fault attacks and retaining performance in modern microprocessors.
这项工作提出了VPsec,一种新颖的纯硬件方案,利用实施例中的值预测和系统设计来减轻通用微处理器中的故障攻击。VPsec的设计增加了现代微处理器中故障检测逻辑和反应逻辑的值预测方案,以减轻对数据路径和值预测器本身的故障攻击。相对于支持值预测的基准处理器,VPsec需要最小的硬件更改(可忽略的区域影响),它没有软件开销(内存占用不会增加),并且,在常见的攻击场景下,它保留了值预测的大部分性能优势。我们对VPsec的评估证明了它在对抗故障攻击和保持现代微处理器性能方面的有效性。
{"title":"Value prediction for security (VPsec): Countering fault attacks in modern microprocessors","authors":"Rami Sheikh, Rosario Cammarota, Wenjia Ruan","doi":"10.1109/HST.2018.8383922","DOIUrl":"https://doi.org/10.1109/HST.2018.8383922","url":null,"abstract":"This work proposes VPsec, a novel hardware-only scheme that leverages value prediction in an embodiment and system design to mitigate fault attacks in general purpose microprocessors. The design of VPsec augments value prediction schemes in modern microprocessors with fault detection logic and reaction logic, to mitigate fault attacks to both the datapath and the value predictor itself. VPsec requires minimal hardware changes (negligible area impact) with respect to a baseline processor supporting value prediction, it has no software overheads {no increase in memory footprint), and, under common attack scenarios, it retains most of the performance benefits of value prediction. Our evaluation of VPsec demonstrates its efficacy in countering fault attacks and retaining performance in modern microprocessors.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"21 1","pages":"235-238"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73103519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Delay model and machine learning exploration of a hardware-embedded delay PUF 硬件嵌入式延迟PUF的延迟模型和机器学习探索
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383905
Wenjie Che, M. Martínez‐Ramón, F. Saqib, J. Plusquellic
A special class of Physically Unclonable Functions (PUF) called strong PUFs are characterized as having an exponentially large challenge-response pair (CRP) space. However, model-building attacks with machine learning algorithms have shown that the CRP space of most strong PUFs can be predicted using a relatively small subset of training samples. In this paper, we investigate the delay model of the Hardware-Embedded deLay PUF (HELP) and apply machine learning algorithms to determine its resilience to model-building attacks. The delay model for HELP possesses significant differences when compared with other delay-based PUFs such as the Arbiter PUF, particularly with respect to the composition of the paths which are tested to generate response bits. We show that the complexity of the delay model in combination with a set of delay post processing operations carried out within the HELP algorithm significantly reduce the effectiveness of model-building attacks.
一类特殊的物理不可克隆函数(PUF)被称为强PUF,其特征是具有指数级大的挑战-响应对(CRP)空间。然而,使用机器学习算法的模型构建攻击表明,可以使用相对较小的训练样本子集来预测大多数强puf的CRP空间。在本文中,我们研究了硬件嵌入式延迟PUF (HELP)的延迟模型,并应用机器学习算法来确定其对模型构建攻击的弹性。与其他基于延迟的PUF(如Arbiter PUF)相比,HELP的延迟模型具有显著差异,特别是在测试生成响应位的路径组成方面。我们表明,延迟模型的复杂性与HELP算法中执行的一组延迟后处理操作相结合,显着降低了模型构建攻击的有效性。
{"title":"Delay model and machine learning exploration of a hardware-embedded delay PUF","authors":"Wenjie Che, M. Martínez‐Ramón, F. Saqib, J. Plusquellic","doi":"10.1109/HST.2018.8383905","DOIUrl":"https://doi.org/10.1109/HST.2018.8383905","url":null,"abstract":"A special class of Physically Unclonable Functions (PUF) called strong PUFs are characterized as having an exponentially large challenge-response pair (CRP) space. However, model-building attacks with machine learning algorithms have shown that the CRP space of most strong PUFs can be predicted using a relatively small subset of training samples. In this paper, we investigate the delay model of the Hardware-Embedded deLay PUF (HELP) and apply machine learning algorithms to determine its resilience to model-building attacks. The delay model for HELP possesses significant differences when compared with other delay-based PUFs such as the Arbiter PUF, particularly with respect to the composition of the paths which are tested to generate response bits. We show that the complexity of the delay model in combination with a set of delay post processing operations carried out within the HELP algorithm significantly reduce the effectiveness of model-building attacks.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"33 1","pages":"153-158"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78352294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms 一种有效的基于sat的短周期密码算法
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383892
E. Dubrova, M. Teslenko
The absence of short cycles is a desirable property for cryptographic algorithms that are iterated. Furthermore, as demonstrated by the cryptanalysis of A5, short cycles can be exploited to reduce the complexity of an attack. We present an algorithm which uses a SAT-based bounded model checking for finding all short cycles of a given length. The existing Boolean Decision Diagram (BDD) based algorithms for finding cycles have limited capacity due to the excessive memory requirements of BDDs. The simulation-based algorithms can be applied to larger problem instances, however, they cannot guarantee the detection of all cycles of a given length. The same holds for general-purpose SAT-based model checkers. The presented algorithm can handle cryptographic algorithms with very large state spaces, including important ciphers such as Trivium and Grain-128. We found that these ciphers contain short cycles whose existence, to our best knowledge, was previously unknown. This potentially opens new possibilities for cryptanalysis.
对于迭代的密码算法来说,缺少短周期是一个理想的特性。此外,正如A5的密码分析所证明的那样,可以利用短周期来降低攻击的复杂性。我们提出了一种算法,该算法使用基于sat的有界模型检查来查找给定长度的所有短周期。现有的基于布尔决策图(BDD)的循环查找算法由于BDD对内存的需求过大而容量有限。基于仿真的算法可以应用于更大的问题实例,但不能保证检测给定长度的所有循环。这同样适用于通用的基于sat的模型检查器。该算法可以处理具有非常大状态空间的加密算法,包括Trivium和Grain-128等重要密码。我们发现这些密码包含短周期,据我们所知,它们的存在以前是未知的。这为密码分析开辟了新的可能性。
{"title":"An efficient SAT-based algorithm for finding short cycles in cryptographic algorithms","authors":"E. Dubrova, M. Teslenko","doi":"10.1109/HST.2018.8383892","DOIUrl":"https://doi.org/10.1109/HST.2018.8383892","url":null,"abstract":"The absence of short cycles is a desirable property for cryptographic algorithms that are iterated. Furthermore, as demonstrated by the cryptanalysis of A5, short cycles can be exploited to reduce the complexity of an attack. We present an algorithm which uses a SAT-based bounded model checking for finding all short cycles of a given length. The existing Boolean Decision Diagram (BDD) based algorithms for finding cycles have limited capacity due to the excessive memory requirements of BDDs. The simulation-based algorithms can be applied to larger problem instances, however, they cannot guarantee the detection of all cycles of a given length. The same holds for general-purpose SAT-based model checkers. The presented algorithm can handle cryptographic algorithms with very large state spaces, including important ciphers such as Trivium and Grain-128. We found that these ciphers contain short cycles whose existence, to our best knowledge, was previously unknown. This potentially opens new possibilities for cryptanalysis.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"105 1","pages":"65-72"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80821639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection B-TREPID:带PUF和完整性检测的无电池防篡改信封
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383890
Vincent Immler, J. Obermaier, Martin König, Matthias Hiller, G. Sigl
Protecting embedded devices against physical attacks is a challenging task since the attacker has control of the device in a hostile environment. To address this issue, current countermeasures typically use a battery-backed tamper-respondent envelope that encloses the entire device to create a trusted compartment. However, the battery affects the system's robustness and weight, and also leads to difficulties with the security mechanism while shipping the device. In contrast, we present a batteryless tamper-resistant envelope, which contains a fine mesh of electrodes, and its complementary security concept. An evaluation unit checks the integrity of the sensor mesh by detecting short and open circuits. Additionally, it measures the capacitances of the mesh. Once its preliminary integrity is confirmed, a cryptographic key is derived from the capacitive measurements that represent a PUF, to decrypt and authenticate the firmware of the enclosed host system. We demonstrate the feasibility of our concept, provide details on the layout and electrical properties of the batteryless envelope, and explain the underlying security architecture. Practical results from a set of manufactured envelopes facilitate future research.
保护嵌入式设备免受物理攻击是一项具有挑战性的任务,因为攻击者可以在敌对环境中控制设备。为了解决这个问题,目前的对策通常使用电池支持的篡改应答信封,该信封将整个设备封闭起来,以创建一个可信的隔间。然而,电池会影响系统的坚固性和重量,并且在运输设备时也会导致安全机制的困难。相比之下,我们提出了一种无电池防篡改信封,它包含一个精细的电极网,以及它的补充安全概念。评估单元通过检测短路和开路来检查传感器网格的完整性。此外,它还测量网格的电容。一旦其初步完整性得到确认,就会从表示PUF的电容性测量中获得加密密钥,以解密和验证封闭主机系统的固件。我们展示了我们的概念的可行性,提供了关于无电池外壳的布局和电气特性的详细信息,并解释了底层的安全架构。从一套制造信封的实际结果有助于未来的研究。
{"title":"B-TREPID: Batteryless tamper-resistant envelope with a PUF and integrity detection","authors":"Vincent Immler, J. Obermaier, Martin König, Matthias Hiller, G. Sigl","doi":"10.1109/HST.2018.8383890","DOIUrl":"https://doi.org/10.1109/HST.2018.8383890","url":null,"abstract":"Protecting embedded devices against physical attacks is a challenging task since the attacker has control of the device in a hostile environment. To address this issue, current countermeasures typically use a battery-backed tamper-respondent envelope that encloses the entire device to create a trusted compartment. However, the battery affects the system's robustness and weight, and also leads to difficulties with the security mechanism while shipping the device. In contrast, we present a batteryless tamper-resistant envelope, which contains a fine mesh of electrodes, and its complementary security concept. An evaluation unit checks the integrity of the sensor mesh by detecting short and open circuits. Additionally, it measures the capacitances of the mesh. Once its preliminary integrity is confirmed, a cryptographic key is derived from the capacitive measurements that represent a PUF, to decrypt and authenticate the firmware of the enclosed host system. We demonstrate the feasibility of our concept, provide details on the layout and electrical properties of the batteryless envelope, and explain the underlying security architecture. Practical results from a set of manufactured envelopes facilitate future research.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"22 1","pages":"49-56"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87334424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices 症候群:用于医疗物联网和嵌入式设备异常检测的光谱分析
Pub Date : 2018-04-01 DOI: 10.1109/HST.2018.8383884
Nader Sehatbakhsh, Monjur Alam, A. Nazari, A. Zajić, Milos Prvulović
Recent advances in embedded and IoT (internet-of-things) technologies are rapidly transforming health-care solutions and we are headed to a future of smaller, smarter, wearable and connected medical devices. IoT and advanced health sensors provide more convenience to patients and physicians. Where physicians can now wirelessly and automatically monitor patient's state. While these medical embedded devices provide a lot of new opportunities to improve the health care system, they also introduce a new set of security risks since they are connected to networks. More importantly, these devices are extremely hardware- and power-constrained, which in turn makes securing these devices more complex. Implementing complex malware detectors or anti-virus on these devices is either very costly or infeasible due to these limitations on power and resources. In this paper, we propose a new framework called SYNDROME for “externally” monitoring medical embedded devices. Our malware detector uses electromagnetic (EM) signals involuntary generated by the device as it executes a (medical) application in the absence of malware, and analyzes them to build a reference model. It then monitors the EM signals generated by the device during execution and reports an error if there is a statistically significant deviation from the reference model. To evaluate Syndrome, we use open-source software to implement a real-world medical device, called a Syringe Pump, on a variety of well-known embedded/IoT devices including Arduino Uno, FPGA Nios II soft-core, and two Linux IoT mini-computers: OlimexA13 and TS-7250. We also implement a control-flow hijack attack on SyringePump and use Syndrome to detect and stop the attack. Our experimental results show that using Syndrome, we can detect the attack for all the four devices with excellent accuracy (i.e. 0% false positive and 100% true positive) within few milliseconds after the attack starts.
嵌入式和物联网(IoT)技术的最新进展正在迅速改变医疗保健解决方案,我们正在走向一个更小、更智能、可穿戴和互联医疗设备的未来。物联网和先进的健康传感器为患者和医生提供了更多便利。医生现在可以无线自动监控病人的状态。虽然这些医疗嵌入式设备为改善医疗保健系统提供了许多新的机会,但由于它们连接到网络,它们也引入了一系列新的安全风险。更重要的是,这些设备在硬件和功率方面受到极大的限制,这反过来又使保护这些设备变得更加复杂。由于功率和资源的限制,在这些设备上实现复杂的恶意软件检测器或反病毒程序要么非常昂贵,要么不可行。在本文中,我们提出了一个新的框架称为综合征“外部”监测医疗嵌入式设备。我们的恶意软件检测器使用设备在没有恶意软件的情况下执行(医疗)应用程序时非自愿产生的电磁(EM)信号,并对其进行分析以构建参考模型。然后,它监测设备在执行过程中产生的电磁信号,如果与参考模型存在统计上的显著偏差,则报告错误。为了评估Syndrome,我们使用开源软件在各种知名的嵌入式/物联网设备(包括Arduino Uno, FPGA Nios II软核和两台Linux物联网微型计算机:OlimexA13和TS-7250)上实现了一个名为注射器泵的真实医疗设备。我们还实现了对SyringePump的控制流劫持攻击,并使用综合征来检测和阻止攻击。我们的实验结果表明,使用综合征,我们可以在攻击开始后几毫秒内以极好的准确率(即0%假阳性和100%真阳性)检测到所有四个设备的攻击。
{"title":"Syndrome: Spectral analysis for anomaly detection on medical IoT and embedded devices","authors":"Nader Sehatbakhsh, Monjur Alam, A. Nazari, A. Zajić, Milos Prvulović","doi":"10.1109/HST.2018.8383884","DOIUrl":"https://doi.org/10.1109/HST.2018.8383884","url":null,"abstract":"Recent advances in embedded and IoT (internet-of-things) technologies are rapidly transforming health-care solutions and we are headed to a future of smaller, smarter, wearable and connected medical devices. IoT and advanced health sensors provide more convenience to patients and physicians. Where physicians can now wirelessly and automatically monitor patient's state. While these medical embedded devices provide a lot of new opportunities to improve the health care system, they also introduce a new set of security risks since they are connected to networks. More importantly, these devices are extremely hardware- and power-constrained, which in turn makes securing these devices more complex. Implementing complex malware detectors or anti-virus on these devices is either very costly or infeasible due to these limitations on power and resources. In this paper, we propose a new framework called SYNDROME for “externally” monitoring medical embedded devices. Our malware detector uses electromagnetic (EM) signals involuntary generated by the device as it executes a (medical) application in the absence of malware, and analyzes them to build a reference model. It then monitors the EM signals generated by the device during execution and reports an error if there is a statistically significant deviation from the reference model. To evaluate Syndrome, we use open-source software to implement a real-world medical device, called a Syringe Pump, on a variety of well-known embedded/IoT devices including Arduino Uno, FPGA Nios II soft-core, and two Linux IoT mini-computers: OlimexA13 and TS-7250. We also implement a control-flow hijack attack on SyringePump and use Syndrome to detect and stop the attack. Our experimental results show that using Syndrome, we can detect the attack for all the four devices with excellent accuracy (i.e. 0% false positive and 100% true positive) within few milliseconds after the attack starts.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"25 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83372218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
SAT-based reverse engineering of gate-level schematics using fault injection and probing 基于sat的门级原理图逆向工程的故障注入和探测
Pub Date : 2018-02-24 DOI: 10.1109/HST.2018.8383918
S. Keshavarz, Falk Schellenberg, Bastian Richter, C. Paar, Daniel E. Holcomb
Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connections between them. A number of works on SAT-based attacks have shown that it is often possible to reverse engineer a circuit function by combining a camouflaged circuit model and the ability to have oracle access to the obfuscated combinational circuit. Especially in small circuits it is easy to reverse engineer the circuit function in this way, but SAT-based reverse engineering techniques provide no guarantees of recovering a circuit that is gate-by-gate equivalent to the original design. In this work we show that an attacker who doesn't know gate functions or connections of an aggressively camouflaged circuit cannot learn the correct gate-level schematic even if able to control inputs and probe all combinational nodes of the circuit. We then present a stronger attack that extends SAT-based reverse engineering with fault analysis to allow an attacker to recover the correct gate-level schematic. We analyze our reverse engineering approach on an S-Box circuit.
门伪装是一种众所周知的安全增强技术,它试图通过隐藏门的功能或它们之间的连接来阻止逆向工程。许多基于sat的攻击表明,通过结合伪装电路模型和对混淆组合电路的oracle访问能力,通常可以对电路功能进行反向工程。特别是在小型电路中,用这种方法很容易对电路功能进行反向工程,但是基于sat的反向工程技术不能保证恢复与原始设计等效的逐个门的电路。在这项工作中,我们表明,不知道门函数或积极伪装电路连接的攻击者即使能够控制输入并探测电路的所有组合节点,也无法学习正确的门级原理图。然后,我们提出了一种更强大的攻击,它扩展了基于sat的逆向工程和故障分析,允许攻击者恢复正确的门级原理图。我们在S-Box电路上分析了我们的逆向工程方法。
{"title":"SAT-based reverse engineering of gate-level schematics using fault injection and probing","authors":"S. Keshavarz, Falk Schellenberg, Bastian Richter, C. Paar, Daniel E. Holcomb","doi":"10.1109/HST.2018.8383918","DOIUrl":"https://doi.org/10.1109/HST.2018.8383918","url":null,"abstract":"Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connections between them. A number of works on SAT-based attacks have shown that it is often possible to reverse engineer a circuit function by combining a camouflaged circuit model and the ability to have oracle access to the obfuscated combinational circuit. Especially in small circuits it is easy to reverse engineer the circuit function in this way, but SAT-based reverse engineering techniques provide no guarantees of recovering a circuit that is gate-by-gate equivalent to the original design. In this work we show that an attacker who doesn't know gate functions or connections of an aggressively camouflaged circuit cannot learn the correct gate-level schematic even if able to control inputs and probe all combinational nodes of the circuit. We then present a stronger attack that extends SAT-based reverse engineering with fault analysis to allow an attacker to recover the correct gate-level schematic. We analyze our reverse engineering approach on an S-Box circuit.","PeriodicalId":6574,"journal":{"name":"2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"27 1","pages":"215-220"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83171847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1