首页> 外文学位 >Intentional and unintentional side-channels in embedded systems.
【24h】

Intentional and unintentional side-channels in embedded systems.

机译:嵌入式系统中的有意和无意边通道。

获取原文
获取原文并翻译 | 示例

摘要

Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementations that can be exploited by an attacker to reveal secret information. In this thesis, we take a different approach towards side-channels. Instead of exploiting already existing side-channels, they are inserted intentionally into designs. These intentional side-channels have the nice property of being hidden in the noise. Only their implementer can make use of them. This makes them a very interesting building block for different applications, especially since they can also be implemented very efficiently. In this thesis, techniques to build intentional side-channels for embedded software designs, RTL level hardware designs, as well as layout level hardware implementations are presented. The usefulness of these techniques is demonstrated by building efficient side-channel based software and hardware watermarks for intellectual property protection. These side-channel based watermarks can also be extended to be used as a tool to detect counterfeit ICs, another problem the embedded system industry is facing. However, intentional side-channels also have malicious applications. In this thesis, an extremely stealthy approach to build hardware Trojans is introduced. By only modifying the IC below the transistor level, meaningful hardware Trojans can be built without adding a single transistor. Such hardware Trojans are especially hard to detect with currently proposed Trojan detection mechanisms and highlight not only the fact that new Trojan detection mechanisms are needed, but also how stealthy intentional side-channels can be. Besides intentional side-channels, this thesis also examines unintentional side-channels in delay based Physically Unclonable Functions (PUFs). PUFs have emerged as an alternative to traditional cryptography and are believed to be especially well suited for counterfeit protection. They are also often believed to be more resistant to side-channel attacks than traditional cryptography. However, by combining side-channel analysis with machine learning, we demonstrate that delay based PUFs can be attacked, using both active as well as passive side-channels. The results not only raise strong doubt about the side-channel resistance and usefulness of delay based PUFs, but also show how powerful combining side-channel analysis techniques with machine learning can be in practice.
机译:旁通道攻击已成为计算机安全中非常重要且经过充分研究的领域。传统上,副渠道是实施过程中不需要的副产品,攻击者可以利用它们来泄露机密信息。在本文中,我们对侧通道采用了不同的方法。代替利用现有的旁通道,将它们有意地插入设计中。这些故意的旁通道具有隐藏在噪声中的良好特性。只有他们的实施者才能使用它们。这使它们成为针对不同应用程序非常有趣的构建基块,特别是因为它们也可以非常有效地实现。本文提出了为嵌入式软件设计,RTL级硬件设计以及布局级硬件实现构建有意的边通道的技术。通过建立有效的基于旁信道的软件和硬件水印来保护知识产权,可以证明这些技术的实用性。这些基于边信道的水印也可以扩展为用作检测伪造IC的工具,这是嵌入式系统行业所面临的另一个问题。但是,故意的旁道也有恶意应用程序。本文介绍了一种极其隐蔽的构建硬件木马的方法。通过仅在晶体管级以下修改IC,就可以构建有意义的硬件木马,而无需添加单个晶体管。使用当前提出的特洛伊木马检测机制尤其难以检测到此类硬件特洛伊木马,不仅突出了需要新的特洛伊木马检测机制的事实,而且突显了潜在的有意的旁道。除了有意的旁信道,本文还研究了基于延迟的物理不可克隆功能(PUF)中的无意的旁信道。 PUF已经成为传统加密技术的替代品,并且被认为特别适合于伪造保护。人们通常也认为它们比传统的加密技术更能抵抗旁道攻击。但是,通过将边信道分析与机器学习相结合,我们证明了使用主动和被动边信道均可攻击基于延迟的PUF。结果不仅引起人们对基于延迟的PUF的边信道阻力和有用性的强烈怀疑,而且还表明将边信道分析技术与机器学习相结合的强大功能在实践中是多么强大。

著录项

  • 作者

    Becker, Georg Tobias.;

  • 作者单位

    University of Massachusetts Amherst.;

  • 授予单位 University of Massachusetts Amherst.;
  • 学科 Engineering Computer.;Engineering Electronics and Electrical.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 148 p.
  • 总页数 148
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号