WESS '13最新文献

筛选
英文 中文
Hardware trojan design and detection: a practical evaluation 硬件木马的设计与检测:实用评价
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527318
Sebastian Kutzner, A. Poschmann, Marc Stöttinger
{"title":"Hardware trojan design and detection: a practical evaluation","authors":"Sebastian Kutzner, A. Poschmann, Marc Stöttinger","doi":"10.1145/2527317.2527318","DOIUrl":"https://doi.org/10.1145/2527317.2527318","url":null,"abstract":"Hardware Trojan design and detection have been extensively studied during the last years. In this work we investigate non-invasive detection methods utilizing so-called side-channel analysis. In the past, almost all proposed detection techniques have been evaluated based on simulations only and thus, the question remains how well they perform in practice. Therefore, we perform a practical evaluation of two previously published Trojan detection methods based on principal component analysis. We evaluate those methods on various designs of a complete functional lightweight hardware Trojan embedded in a PRESENT block cipher circuit. More precisely, we investigate how well the simulations match our practical results and reveal some shortcomings. Subsequently, we introduce a new detection method exploiting statistical properties of the probability distribution functions built from side-channel measurements and show that it is more robust to measurement noise than previously presented methods.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123585278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Digital fingerprints for low-cost platforms using MEMS sensors 使用MEMS传感器的低成本平台的数字指纹
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527319
Aydin Aysu, N. F. Ghalaty, Zane R. Franklin, M. Yali, P. Schaumont
{"title":"Digital fingerprints for low-cost platforms using MEMS sensors","authors":"Aydin Aysu, N. F. Ghalaty, Zane R. Franklin, M. Yali, P. Schaumont","doi":"10.1145/2527317.2527319","DOIUrl":"https://doi.org/10.1145/2527317.2527319","url":null,"abstract":"With the Internet of Things on the horizon, correct authentication of Things within a population will become one of the major concerns for security. Physical authentication, which is implementing digital fingerprints by utilizing device-unique manufacturing variations, has great potential for achieving this purpose. MEMS sensors that are used in the Internet of Things have not been explored as a source of variation. In this paper, we target a commonly used MEMS sensor, an accelerometer, and utilize its process variations to generate digital fingerprints. This is achieved by measuring the accelerometer's response to an applied electrostatic impulse and its inherent offset values. Our results revealed that MEMS sensors could be used as a source for digital fingerprints for run-time authentication applications.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130835709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs 用于fpga和asic的轻量级流密码器WG-8的设计空间探索
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527325
Gangqiang Yang, Xinxin Fan, M. Aagaard, G. Gong
{"title":"Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs","authors":"Gangqiang Yang, Xinxin Fan, M. Aagaard, G. Gong","doi":"10.1145/2527317.2527325","DOIUrl":"https://doi.org/10.1145/2527317.2527325","url":null,"abstract":"WG-8 is a lightweight instance of the Welch-Gong (WG) stream cipher family, targeting for resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. Recent work has demonstrated the advantages of tower field constructions for finite field arithmetic in the AES and WG-16 ciphers. In this paper we explore three different tower field constructions for WG-8. The first tower field is tailored to FPGA cells. The second tower field uses a Type-I optimal normal basis. The third tower field exploits algebraic properties of the WG permutation and trace functions. All of the methods use a parallel LFSR to provide data rates from one to eleven bits per clock cycle. Among the three tower fields, the Type-I ONB construction offers the best trade-off in area, speed, and power consumption. However, a plain monolithic look-up table implementation with 256 entries is smaller and faster than the tower field constructions. Our analysis of the tower field options and comparisons to each other and to the monolithic look-up table will provide lessons for future work in exploring novel tower field constructions for WG and other ciphers.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129302394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
A low-entropy first-degree secure provable masking scheme for resource-constrained devices 资源受限设备的低熵一级安全可证明掩蔽方案
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527324
S. Bhasin, J. Danger, S. Guilley, Zakaria Najm
{"title":"A low-entropy first-degree secure provable masking scheme for resource-constrained devices","authors":"S. Bhasin, J. Danger, S. Guilley, Zakaria Najm","doi":"10.1145/2527317.2527324","DOIUrl":"https://doi.org/10.1145/2527317.2527324","url":null,"abstract":"The trend in the protection against side-channel analysis is to be more secure with little consideration for the cost. However in small devices like RFID, traditional security solutions might be impractical due to limited availability of resources. Thus designers are often forced to use imperfect but low-cost security solutions. When implementing masking countermeasures on a low-resource device, designers are not only limited in memory or power but also lacks a high-throughput source of randomness. In this paper, we stick to a formal security notion (1st-degree security), but seek a low-cost countermeasure against side-channel attacks. The proposed countermeasure is based on masking but needs only one bit of random to resist first-degree attacks like correlation power analysis. Furthermore the implementation also resists side-channel collision attacks once the entropy of random is increased to 16 bits. We show that security can be obtained at extremely low overhead and with as few as a couple of random bytes. This is supported by an application on PRESENT which is provably masked at first-degree for performance overhead of only 1%. Side-channel laboratory evaluations are also provided to support our claim.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Strong PUFs and their (physical) unpredictability: a case study with power PUFs 强puf及其(物理)不可预测性:power puf的案例研究
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527322
Michal Parusinski, S. Shariati, D. Kamel, François-Xavier Standaert
{"title":"Strong PUFs and their (physical) unpredictability: a case study with power PUFs","authors":"Michal Parusinski, S. Shariati, D. Kamel, François-Xavier Standaert","doi":"10.1145/2527317.2527322","DOIUrl":"https://doi.org/10.1145/2527317.2527322","url":null,"abstract":"Physically Unclonable Functions are more and more important in the design of secure hardware, as they can ensure properties that conventional cryptography can not. In this paper we clarify the relations between strong PUFs and their unpredictability. For this purpose we first introduce an alternative definition for physical unpredictability, where the adversary can probe the physical responses of the Physical Function. We then illustrate physical unpredictability with a new instance of a PUF, based on the variability of the power consumption of a 65-nanometer chip. For this new PUF, we also evaluate the relation between robustness, unclonability and physical unpredictability. Our new definitions highlights the importance for designers to take into account if physical probing is possible or not (since the power of modeling attacks highly depends on this assumption). It also suggests that physical unpredictability is a generally useful tool for evaluating the unclonability of PUFs (since it can generate warning signals regarding the independence assumption that is frequently exploited for this purpose).","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatized high-level evaluation of security properties for RTL hardware designs RTL硬件设计安全属性的自动化高级评估
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527323
Andrea Höller, C. Preschern, C. Steger, Christian Kreiner, Armin Krieg, H. Bock, J. Haid
{"title":"Automatized high-level evaluation of security properties for RTL hardware designs","authors":"Andrea Höller, C. Preschern, C. Steger, Christian Kreiner, Armin Krieg, H. Bock, J. Haid","doi":"10.1145/2527317.2527323","DOIUrl":"https://doi.org/10.1145/2527317.2527323","url":null,"abstract":"The ever increasing integration of embedded systems into our every lives created a strong demand for trustable software and hardware implementations. To provide such trust between manufacturer and customer of integrated systems, regulatory rules like the Common Criteria have been defined. While this international standard clearly prescribes the usage of formal methods at high assurance level, formal verification at code-level is not widespread in practice.\u0000 This work introduces a novel approach to verify the correct functionality of security critical hardware implementations under fault conditions. Generality is enabled by high-level evaluation using state machines extracted in an automatized way.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131101782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives 嵌入式系统中的安全RPC:一些GlobalPlatform实现替代方案的评估
WESS '13 Pub Date : 2013-09-29 DOI: 10.1145/2527317.2527321
A. Vahidi, Christopher Jämthagen
{"title":"Secure RPC in embedded systems: evaluation of some GlobalPlatform implementation alternatives","authors":"A. Vahidi, Christopher Jämthagen","doi":"10.1145/2527317.2527321","DOIUrl":"https://doi.org/10.1145/2527317.2527321","url":null,"abstract":"In secure computing systems, isolation between different components is normally the basis for security. However, absolute isolation is seldom desired nor practical. Often for the system to function, a secure communication channel between otherwise isolated components is also needed. In this work, we will consider implementation of the secure Remote Procedure Call (RPC) mechanism defined by the GlobalPlatform specification on top of some different isolation mechanisms. Furthermore, implementation details, performance and security will be discussed.","PeriodicalId":261615,"journal":{"name":"WESS '13","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114968007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信