Intentional and Unintentional Side-channels in Embedded Systems

Intentional and Unintentional Side-channels in Embedded Systems
Author :
Publisher :
Total Pages : 132
Release :
ISBN-10 : OCLC:881468523
ISBN-13 :
Rating : 4/5 (23 Downloads)

Book Synopsis Intentional and Unintentional Side-channels in Embedded Systems by : Georg Tobias Becker

Download or read book Intentional and Unintentional Side-channels in Embedded Systems written by Georg Tobias Becker and published by . This book was released on 2014 with total page 132 pages. Available in PDF, EPUB and Kindle. Book excerpt: Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementations that can be exploited by an attacker to reveal secret information. In this thesis, we take a different approach towards side-channels. Instead of exploiting already existing side-channels, they are inserted intentionally into designs. These intentional side-channels have the nice property of being hidden in the noise. Only their implementer can make use of them. This makes them a very interesting building block for different applications, especially since they can also be implemented very efficiently. In this thesis, techniques to build intentional side-channels for embedded software designs, RTL level hardware designs, as well as layout level hardware implementations are presented. The usefulness of these techniques is demonstrated by building efficient side-channel based software and hardware watermarks for intellectual property protection. These side-channel based watermarks can also be extended to be used as a tool to detect counterfeit ICs, another problem the embedded system industry is facing. However, intentional side-channels also have malicious applications. In this thesis, an extremely stealthy approach to build hardware Trojans is introduced. By only modifying the IC below the transistor level, meaningful hardware Trojans can be built without adding a single transistor. Such hardware Trojans are especially hard to detect with currently proposed Trojan detection mechanisms and highlight not only the fact that new Trojan detection mechanisms are needed, but also how stealthy intentional side-channels can be. Besides intentional side-channels, this thesis also examines unintentional side-channels in delay based Physically Unclonable Functions (PUFs). PUFs have emerged as an alternative to traditional cryptography and are believed to be especially well suited for counterfeit protection. They are also often believed to be more resistant to side-channel attacks than traditional cryptography. However, by combining side-channel analysis with machine learning, we demonstrate that delay based PUFs can be attacked, using both active as well as passive side-channels. The results not only raise strong doubt about the side-channel resistance and usefulness of delay based PUFs, but also show how powerful combining side-channel analysis techniques with machine learning can be in practice.


Intentional and Unintentional Side-channels in Embedded Systems Related Books

Intentional and Unintentional Side-channels in Embedded Systems
Language: en
Pages: 132
Authors: Georg Tobias Becker
Categories: Computer security
Type: BOOK - Published: 2014 - Publisher:

DOWNLOAD EBOOK

Side-channel attacks have become a very important and well-studied area in computer security. Traditionally, side-channels are unwanted byproducts of implementa
Side-Channel Analysis of Embedded Systems
Language: en
Pages: 163
Authors: Maamar Ouladj
Categories: Computers
Type: BOOK - Published: 2021-07-28 - Publisher: Springer Nature

DOWNLOAD EBOOK

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute c
Cryptographic Hardware and Embedded Systems - CHES 2002
Language: en
Pages: 625
Authors: Burton S. Jr. Kaliski
Categories: Computers
Type: BOOK - Published: 2003-08-02 - Publisher: Springer

DOWNLOAD EBOOK

ThesearetheproceedingsofCHES2002,theFourthWorkshoponCryptographic Hardware and Embedded Systems. After the ?rst two CHES Workshops held in Massachusetts, and th
Physical Side Channels in Embedded Hardware Security
Language: en
Pages: 0
Authors: Ge Li (Ph. D. in electrical and computer engineering)
Categories:
Type: BOOK - Published: 2022 - Publisher:

DOWNLOAD EBOOK

The advancement of digital silicon technology brings a variety of novel embedded systems to our daily life. As a unique yet critical requirement, the demand for
A New Frequency-based Side Channel Attack for Embedded Systems
Language: en
Pages: 216
Authors: Chin Chi Tiu
Categories:
Type: BOOK - Published: 2005 - Publisher:

DOWNLOAD EBOOK