2019 IEEE 4th International Verification and Security Workshop (IVSW)最新文献

筛选
英文 中文
On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks 用于网络物理系统安全评估的低成本故障注入框架:时钟故障攻击
2019 IEEE 4th International Verification and Security Workshop (IVSW) Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854391
Z. Kazemi, Athanasios Papadimitriou, I. Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, D. Hély, V. Beroulle
{"title":"On a Low Cost Fault Injection Framework for Security Assessment of Cyber-Physical Systems: Clock Glitch Attacks","authors":"Z. Kazemi, Athanasios Papadimitriou, I. Souvatzoglou, Ehsan Aerabi, Mosabbah Mushir Ahmed, D. Hély, V. Beroulle","doi":"10.1109/IVSW.2019.8854391","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854391","url":null,"abstract":"Fault injection methods as a type of physical attack have gained significant importance in the security of MCU-based Internet-of-Things (IoTs) systems and they continue to become more and more important as the value of assets continues to increase. These attacks can pose severe security risks to the entire IoT system and their effects can quickly lead to security breaches. However, embedded software developers most often do not have the necessary expertise concerning existing vulnerabilities against such attacks. This makes it necessary to have a practical evaluation platform for measuring the degree of security, in a rapid and accurate way. These platforms are important not only from the performance and capability point of view, but also they need to be cost-effective, which is a critical factor to consider during their design. We present in this work a generic low cost and open platform, called HackMyMCU framework. While this platform offers both side channel and fault injection capabilities, this paper focuses on its clock glitch attacks. A first review of existing clock-based fault injectors is initially performed. Then we present two different clock glitchers and we use them to evaluate a modern MCU. The suggested methods consider the necessary parameters for the development of cost-effective and easy to use evaluation platforms which utilize easily accessible equipment. The findings show that a common and low-cost evaluation platform can be implemented with the goal to validate appropriate countermeasures against such attacks.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Nonlinear Product Codes for Reliability and Security 可靠性和安全性的非线性产品代码
2019 IEEE 4th International Verification and Security Workshop (IVSW) Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854455
Batya Karp, O. Amrani, O. Keren
{"title":"Nonlinear Product Codes for Reliability and Security","authors":"Batya Karp, O. Amrani, O. Keren","doi":"10.1109/IVSW.2019.8854455","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854455","url":null,"abstract":"Multi-dimensional codes using a coset based code as one of the base codes have been suggested to increase the code distance and at the same time simplify the encoding and decoding of long codes. We show that while these codes provide sufficient reliability, they can not provide security. We then present two-dimensional product codes using robust codes as the base codes which provide both reliability and security.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117121574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Keynotes 主题演讲
2019 IEEE 4th International Verification and Security Workshop (IVSW) Pub Date : 2019-07-01 DOI: 10.1109/IVSW.2019.8854417
D. Fellner
{"title":"Keynotes","authors":"D. Fellner","doi":"10.1109/IVSW.2019.8854417","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854417","url":null,"abstract":"Over the last fifteen years, hardware security and trust has evolved into a major new area of research at the intersection of semiconductor manufacturing, VLSI design and test, computer-aided design, architecture and system security. During the same period, machine learning has experience a major revival in interest and has flourished from a nearly forgotten area to the talk of the town. In this presentation, we will first briefly review various machine learning-based solutions which have been developed to address a number of concerns in hardware security and trust, including hardware Trojan detection, counterfeit IC identification, provenance attestation, hardware-based malware detection, side-channel attacks, PUF modeling, etc. Then, we will examine the key attributes of these problems which make them amenable to machine learning-based solutions and we will discuss the potential and the fundamental limitations of such approaches. Lastly, we will ponder the role of and necessity for advanced contemporary machine learning methods in the context of hardware security and we will conclude with suggestions for avoiding common pitfalls when employing such methods.","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
About IVSW 关于IVSW
2019 IEEE 4th International Verification and Security Workshop (IVSW) Pub Date : 2018-07-01 DOI: 10.1109/IVSW.2019.8854435
{"title":"About IVSW","authors":"","doi":"10.1109/IVSW.2019.8854435","DOIUrl":"https://doi.org/10.1109/IVSW.2019.8854435","url":null,"abstract":"About IVSW","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122225928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2019 IEEE 4th International Verification and Security Workshop (IVSW 2019) 2019 IEEE第四届国际验证与安全研讨会(IVSW 2019)
2019 IEEE 4th International Verification and Security Workshop (IVSW) Pub Date : 1900-01-01 DOI: 10.1109/ivsw.2019.8854382
{"title":"2019 IEEE 4th International Verification and Security Workshop (IVSW 2019)","authors":"","doi":"10.1109/ivsw.2019.8854382","DOIUrl":"https://doi.org/10.1109/ivsw.2019.8854382","url":null,"abstract":"2019 IEEE 4<sup>th</sup> International Verification and Security Workshop (IVSW 2019)","PeriodicalId":213848,"journal":{"name":"2019 IEEE 4th International Verification and Security Workshop (IVSW)","volume":"34 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123144862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信