{"title":"一种针对数字微流控装置的根源攻击新方法","authors":"Pushpita Roy, A. Banerjee","doi":"10.1109/AsianHOST.2016.7835550","DOIUrl":null,"url":null,"abstract":"Recent research on security aspects of digital microfluidic biochips (DMFBs) has revealed several alarming backdoors in the established DMFB design flow that can lead to unacceptable compromises in assay results, often leading to catastrophic consequences. This has led to a growing concern about vulnerability issues of DMFBs and assay manipulation attacks that are used for clinical diagnostics in healthcare. In this paper, we propose a novel scheme for localization and root-causing of assay manipulation attacks. Our approach takes as input a golden implementation of an assay and the attacker modified one, and uses symbolic reasoning on the actuation sequences of the golden assay and the compromised one to derive possible operations that may have been compromised in the modified assay. Additionally, our method can utilize intermediate checkpoint observations to derive more precise attack locations. Experimental results show the efficacy of our proposal.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"A new approach for root-causing attacks on digital microfluidic devices\",\"authors\":\"Pushpita Roy, A. Banerjee\",\"doi\":\"10.1109/AsianHOST.2016.7835550\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent research on security aspects of digital microfluidic biochips (DMFBs) has revealed several alarming backdoors in the established DMFB design flow that can lead to unacceptable compromises in assay results, often leading to catastrophic consequences. This has led to a growing concern about vulnerability issues of DMFBs and assay manipulation attacks that are used for clinical diagnostics in healthcare. In this paper, we propose a novel scheme for localization and root-causing of assay manipulation attacks. Our approach takes as input a golden implementation of an assay and the attacker modified one, and uses symbolic reasoning on the actuation sequences of the golden assay and the compromised one to derive possible operations that may have been compromised in the modified assay. Additionally, our method can utilize intermediate checkpoint observations to derive more precise attack locations. Experimental results show the efficacy of our proposal.\",\"PeriodicalId\":394462,\"journal\":{\"name\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AsianHOST.2016.7835550\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST.2016.7835550","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A new approach for root-causing attacks on digital microfluidic devices
Recent research on security aspects of digital microfluidic biochips (DMFBs) has revealed several alarming backdoors in the established DMFB design flow that can lead to unacceptable compromises in assay results, often leading to catastrophic consequences. This has led to a growing concern about vulnerability issues of DMFBs and assay manipulation attacks that are used for clinical diagnostics in healthcare. In this paper, we propose a novel scheme for localization and root-causing of assay manipulation attacks. Our approach takes as input a golden implementation of an assay and the attacker modified one, and uses symbolic reasoning on the actuation sequences of the golden assay and the compromised one to derive possible operations that may have been compromised in the modified assay. Additionally, our method can utilize intermediate checkpoint observations to derive more precise attack locations. Experimental results show the efficacy of our proposal.