2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)最新文献

筛选
英文 中文
How secure is split manufacturing in preventing hardware trojan? 分裂制造在防止硬件木马方面有多安全?
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) Pub Date : 2016-12-01 DOI: 10.1145/3378163
Z. Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin
{"title":"How secure is split manufacturing in preventing hardware trojan?","authors":"Z. Chen, Pingqiang Zhou, Tsung-Yi Ho, Yier Jin","doi":"10.1145/3378163","DOIUrl":"https://doi.org/10.1145/3378163","url":null,"abstract":"With the trend of outsourcing fabrication, split manufacturing is regarded as a promising way to both provide the high-end nodes in untrusted external foundries and protect the design from potential attackers. However, in this work, we show that split manufacturing is not inherently secure. A hardware trojan attacker can still discover necessary information with a simulated annealing based attack approach at the placement level. We further propose a defense approach by moving the insecure gates away from their easily-attacked candidate locations. Experimental results on benchmark circuits show the effectiveness of our proposed methods.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring system 一种新的基于事件驱动动态视觉传感器的物理不可克隆函数用于无功监控系统中的摄像机认证
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) Pub Date : 2016-12-01 DOI: 10.1109/AsianHOST.2016.7835551
Yue Zheng, Yuan Cao, Chip-Hong Chang
{"title":"A new event-driven Dynamic Vision Sensor based Physical Unclonable Function for camera authentication in reactive monitoring system","authors":"Yue Zheng, Yuan Cao, Chip-Hong Chang","doi":"10.1109/AsianHOST.2016.7835551","DOIUrl":"https://doi.org/10.1109/AsianHOST.2016.7835551","url":null,"abstract":"Surveillance footage has become an integral part of law enforcement as video cameras become ubiquitous, affordable and more reliable. Dynamic vision sensor (DVS) emerges as a new sensing technology that outsmarts existing static CMOS image sensors in vision-enabled traffic monitoring, assisted living and high-speed target tracking for its low latency, high temporal resolution and wide dynamic range under uncontrolled illumination. Instead of recording a steady stream of snapshots taken at a fixed rate, DVS responds only to temporal contrast and records only sparse asynchronous address-events with precise timing information. However, the accountability of the footage captured is incomplete if the cue is triggered by an unidentified device. One effective way to eliminate the anonymity is to build a random oracle out of the DVS sensor and use its authenticity as a root of trust to protect the integrity of the footage. In this paper, we present the first ever event-based physical unclonable function (PUF) for DVS camera identification and secret key generation in reactive monitoring system. A non-intrusive PUF response readout scheme is proposed by exploiting the two unique reset switches, one continuous-timed and one self-timed, of DVS pixel to enable simultaneous generation of PUF response with non-disruptive output of asynchronous address-events. Only three transistors are added to each pixel to isolate the PUF response readout and to prevent the spontaneously detected DVS events from interfering with the PUF operation, which is also triggered by the reflectance change in the scene. Our simulation results based on 1.8V 180nm CMOS technology show that the raw response generated by the proposed event-driven DVS-based PUF has near ideal uniqueness of 49.96%, and worst-case reliability of 96.3% and 99.2% for variations of temperature from −35∼115°C and supply voltage from 1.6∼2.0V, respectively. Its randomness has also been attested by the NIST tests.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126602960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Echeloned IJTAG data protection 梯级IJTAG数据保护
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) Pub Date : 2016-12-01 DOI: 10.1109/AsianHOST.2016.7835558
Senwen Kan, Jennifer Dworak, J. Dunham
{"title":"Echeloned IJTAG data protection","authors":"Senwen Kan, Jennifer Dworak, J. Dunham","doi":"10.1109/AsianHOST.2016.7835558","DOIUrl":"https://doi.org/10.1109/AsianHOST.2016.7835558","url":null,"abstract":"This paper presents a novel IJTAG-based data protection method that utilizes stream ciphers and IJTAG topology. The method protects IJTAG data with encryption. It further imposes access restriction on user control sequencing. In particular, it complements IJTAG encryption-based data access with IJTAG topology, and it augments IJTAG-based authorization checks to defend against unauthorized and unintended access. It also allows the device owner to implement use case isolation for better compartmentalization of the supply chain.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122549886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs RO Sum、Arbiter、前馈Arbiter和S-ArbRO PUFs最小熵的上界
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) Pub Date : 1900-01-01 DOI: 10.1109/AsianHOST.2016.7835572
Jeroen Delvaux, Dawu Gu, I. Verbauwhede
{"title":"Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs","authors":"Jeroen Delvaux, Dawu Gu, I. Verbauwhede","doi":"10.1109/AsianHOST.2016.7835572","DOIUrl":"https://doi.org/10.1109/AsianHOST.2016.7835572","url":null,"abstract":"The focus and novelty of this work is the derivation of tight upper bounds on the min-entropy of several physically unclonable funcions (PUFs), i.e., Ring Oscillator Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs. This constrains their usability for the fuzzy extraction of a secret key, as an alternative to storing keys in non-volatile memory. For example, it is shown that an ideal Arbiter PUF with 64 stages cannot provide more than 197 bits of min-entropy. At Financial Cryptography 2012, Van Herrewege et al. assume that 1785 bits of min-entropy can be extracted, which renders their 128-bit key generator instantly insecure. We also derive upper bounds that comply with non-ideal PUFs, attributed to, e.g., manufacturing in silicon. As a side contribution hereby, we refute the claim that S-ArbRO PUFs are highly resistant against machine learning.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信