-
Security layers and related services within the Horizon Europe NEUROPULS project
Authors:
Fabio Pavanello,
Cedric Marchand,
Paul Jimenez,
Xavier Letartre,
Ricardo Chaves,
Niccolò Marastoni,
Alberto Lovato,
Mariano Ceccato,
George Papadimitriou,
Vasileios Karakostas,
Dimitris Gizopoulos,
Roberta Bardini,
Tzamn Melendez Carmona,
Stefano Di Carlo,
Alessandro Savino,
Laurence Lerch,
Ulrich Ruhrmair,
Sergio Vinagrero Gutierrez,
Giorgio Di Natale,
Elena Ioana Vatajelu
Abstract:
In the contemporary security landscape, the incorporation of photonics has emerged as a transformative force, unlocking a spectrum of possibilities to enhance the resilience and effectiveness of security primitives. This integration represents more than a mere technological augmentation; it signifies a paradigm shift towards innovative approaches capable of delivering security primitives with key…
▽ More
In the contemporary security landscape, the incorporation of photonics has emerged as a transformative force, unlocking a spectrum of possibilities to enhance the resilience and effectiveness of security primitives. This integration represents more than a mere technological augmentation; it signifies a paradigm shift towards innovative approaches capable of delivering security primitives with key properties for low-power systems. This not only augments the robustness of security frameworks, but also paves the way for novel strategies that adapt to the evolving challenges of the digital age. This paper discusses the security layers and related services that will be developed, modeled, and evaluated within the Horizon Europe NEUROPULS project. These layers will exploit novel implementations for security primitives based on physical unclonable functions (PUFs) using integrated photonics technology. Their objective is to provide a series of services to support the secure operation of a neuromorphic photonic accelerator for edge computing applications.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Self-assembled physical unclonable function labels based on plasmonic coupling
Authors:
Mihir Dass,
Lena Raab,
Christoph Pauer,
Christoph Sikeler,
Larissa Heinze,
Joe Tavacoli,
Irina V. Martynenko,
Ulrich Rührmair,
Gregor Posnjak,
Tim Liedl
Abstract:
Counterfeiting threatens human health, social equity, national security and global and local economies. Hardware-based cryptography that exploits physical unclonable functions (PUFs) provides the means for secure identification and authentication of products. While optical PUFs are among the hardest to replicate, they suffer from low encoding capacity and often complex and expensive read-out. Here…
▽ More
Counterfeiting threatens human health, social equity, national security and global and local economies. Hardware-based cryptography that exploits physical unclonable functions (PUFs) provides the means for secure identification and authentication of products. While optical PUFs are among the hardest to replicate, they suffer from low encoding capacity and often complex and expensive read-out. Here we report PUF labels with nanoscale features and optical responses that arise from the guided self-assembly of plasmonic nanoparticles. Nanosphere lithography combined with DNA origami placement are used to create tightly packed randomised nanoparticle assemblies. Nanoscale variations within these assemblies define the scattering color of the individual spots that are arranged in a hexagonal lattice with spacing down to the optical resolution limit. Due to the nanoscale dimensions, the intrinsic randomness of the particle assemblies and their resulting optical responses, our PUFs are virtually impossible to replicate while they can be read-out with economical 3D-printed hardware.
△ Less
Submitted 3 November, 2023; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Design of Novel Analog Compute Paradigms with Ark
Authors:
Yu-Neng Wang,
Glenn Cowan,
Ulrich Rührmair,
Sara Achour
Abstract:
Previous efforts on reconfigurable analog circuits mostly focused on specialized analog circuits, produced through careful co-design, or on highly reconfigurable, but relatively resource inefficient, accelerators that implement analog compute paradigms. This work deals with an intermediate point in the design space: Specialized reconfigurable circuits for analog compute paradigms. This class of ci…
▽ More
Previous efforts on reconfigurable analog circuits mostly focused on specialized analog circuits, produced through careful co-design, or on highly reconfigurable, but relatively resource inefficient, accelerators that implement analog compute paradigms. This work deals with an intermediate point in the design space: Specialized reconfigurable circuits for analog compute paradigms. This class of circuits requires new methodologies for performing co-design, as prior techniques are typically highly specialized to conventional circuit classes (e.g., filters, ADCs).
In this context, we present Ark, a programming language for describing analog compute paradigms. Ark enables progressive incorporation of analog behaviors into computations, and deploys a validator and dynamical system compiler for verifying and simulating computations. We use Ark to codify the design space for three different exemplary circuit design problems, and demonstrate that Ark helps exploring design trade-offs and evaluating the impact of nonidealities to the computation.
△ Less
Submitted 10 October, 2023; v1 submitted 15 September, 2023;
originally announced September 2023.
-
NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS
Authors:
Fabio Pavanello,
Cedric Marchand,
Ian O'Connor,
Regis Orobtchouk,
Fabien Mandorlo,
Xavier Letartre,
Sebastien Cueff,
Elena Ioana Vatajelu,
Giorgio Di Natale,
Benoit Cluzel,
Aurelien Coillet,
Benoit Charbonnier,
Pierre Noe,
Frantisek Kavan,
Martin Zoldak,
Michal Szaj,
Peter Bienstman,
Thomas Van Vaerenbergh,
Ulrich Ruhrmair,
Paulo Flores,
Luis Guerra e Silva,
Ricardo Chaves,
Luis-Miguel Silveira,
Mariano Ceccato,
Dimitris Gizopoulos
, et al. (12 additional authors not shown)
Abstract:
This special session paper introduces the Horizon Europe NEUROPULS project, which targets the development of secure and energy-efficient RISC-V interfaced neuromorphic accelerators using augmented silicon photonics technology. Our approach aims to develop an augmented silicon photonics platform, an FPGA-powered RISC-V-connected computing platform, and a complete simulation platform to demonstrate…
▽ More
This special session paper introduces the Horizon Europe NEUROPULS project, which targets the development of secure and energy-efficient RISC-V interfaced neuromorphic accelerators using augmented silicon photonics technology. Our approach aims to develop an augmented silicon photonics platform, an FPGA-powered RISC-V-connected computing platform, and a complete simulation platform to demonstrate the neuromorphic accelerator capabilities. In particular, their main advantages and limitations will be addressed concerning the underpinning technology for each platform. Then, we will discuss three targeted use cases for edge-computing applications: Global National Satellite System (GNSS) anti-jamming, autonomous driving, and anomaly detection in edge devices. Finally, we will address the reliability and security aspects of the stand-alone accelerator implementation and the project use cases.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
Physical Realization of a Hyper Unclonable Function
Authors:
Sara Nocentini,
Ulrich Rührmair,
Mauro Barni,
Diederik S. Wiersma,
Francesco Riboli
Abstract:
Disordered photonic structures are promising materials for the realization of physical unclonable functions (PUF), physical objects that can overcome the limitations of conventional digital security methods and that enable cryptographic protocols immune against attacks by future quantum computers. One PUF limitation, so far, has been that their physical configuration is either fixed or can only be…
▽ More
Disordered photonic structures are promising materials for the realization of physical unclonable functions (PUF), physical objects that can overcome the limitations of conventional digital security methods and that enable cryptographic protocols immune against attacks by future quantum computers. One PUF limitation, so far, has been that their physical configuration is either fixed or can only be permanently modified, and hence allowing only one token per device. We show that it is possible to overcome this limitation by creating a reconfigurable structure made by light-transformable polymers, in which the physical structure of the unclonable function itself can be reversibly reconfigured. We term this novel concept Hyper PUF or HPUF in that it allows a large number of physical unclonable functions to co-exist simultaneously within one and the same device. The physical transformation of the structure is done all-optically in a reversible and spatially controlled fashion. Our novel technology provides a massive enhancement in security generating more complex keys containing a larger amount of information. At the same time, it allows for new applications, for example serving multiple clients on a single encryption device and the practical implementation of quantum secure authentication of data.
△ Less
Submitted 3 March, 2023; v1 submitted 23 December, 2022;
originally announced January 2023.
-
Clones of the Unclonable: Nanoduplicating Optical PUFs and Applications
Authors:
E. Marakis,
U. Rührmair,
M. Lachner,
R. Uppu,
B. Škorić,
P. W. H. Pinkse
Abstract:
Physical unclonable functions (PUFs), physical objects that are practically unclonable because of their andom and uncontrollable manufacturing variations, are becoming increasingly popular as security primitives and unique identifiers in a fully digitized world. One of the central PUF premises states that both friends and foes, both legitimate manufacturers and external attackers alike, cannot clo…
▽ More
Physical unclonable functions (PUFs), physical objects that are practically unclonable because of their andom and uncontrollable manufacturing variations, are becoming increasingly popular as security primitives and unique identifiers in a fully digitized world. One of the central PUF premises states that both friends and foes, both legitimate manufacturers and external attackers alike, cannot clone a PUF, producing two instances that are the same. Using the latest nanofabrication techniques, we show that this premise is not always met: We demonstrate the possibility of effective PUF duplication through sophisticated manufacturers by producing 63 copies of a non-trivial optical scattering structure which exhibit essentially the same scattering behavior. The remaining minuscule differences are close to or below noise levels, whence the duplicates have to be considered fully equivalent from a PUF perspective. The possibility for manufacturer-based optical PUF duplication has positive and negative consequences at the same time: While fully breaking the security of certain schemes, it enables new applications, too. For example, it facilitates unforgeable labels for valuable items; the first key-free group identification schemes over digital networks; or new types of encryption/decryption devices that do not contain secret keys.
△ Less
Submitted 23 December, 2022;
originally announced December 2022.
-
SpyHammer: Understanding and Exploiting RowHammer under Fine-Grained Temperature Variations
Authors:
Lois Orosa,
Ulrich Rührmair,
A. Giray Yaglikci,
Haocong Luo,
Ataberk Olgun,
Patrick Jattke,
Minesh Patel,
Jeremie Kim,
Kaveh Razavi,
Onur Mutlu
Abstract:
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely by accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly vulnerable to RowHammer, and many works demonstrate system-level attacks for privilege escalation or information leakage. In this work, we perform the first rigorous fine-grai…
▽ More
RowHammer is a DRAM vulnerability that can cause bit errors in a victim DRAM row solely by accessing its neighboring DRAM rows at a high-enough rate. Recent studies demonstrate that new DRAM devices are becoming increasingly vulnerable to RowHammer, and many works demonstrate system-level attacks for privilege escalation or information leakage. In this work, we perform the first rigorous fine-grained characterization and analysis of the correlation between RowHammer and temperature. We show that RowHammer is very sensitive to temperature variations, even if the variations are very small (e.g., $\pm 1$ °C). We leverage two key observations from our analysis to spy on DRAM temperature: 1) RowHammer-induced bit error rate consistently increases (or decreases) as the temperature increases, and 2) some DRAM cells that are vulnerable to RowHammer exhibit bit errors only at a particular temperature. Based on these observations, we propose a new RowHammer attack, called SpyHammer, that spies on the temperature of DRAM on critical systems such as industrial production lines, vehicles, and medical systems. SpyHammer is the first practical attack that can spy on DRAM temperature. Our evaluation in a controlled environment shows that SpyHammer can infer the temperature of the victim DRAM modules with an error of less than $\pm 2.5$ °C at the 90th percentile of all tested temperatures, for 12 real DRAM modules (120 DRAM chips) from four main manufacturers.
△ Less
Submitted 2 June, 2024; v1 submitted 8 October, 2022;
originally announced October 2022.
-
Exploiting structural nonlinearity of a reconfigurable multiple-scattering system
Authors:
Yaniv Eliezer,
Ulrich Ruhrmair,
Nils Wisiol,
Stefan Bittner,
Hui Cao
Abstract:
Nonlinear optics is a rapidly growing field that has found a wide range of applications. A major limitation, however, is the demand of high power, especially for high-order nonlinearities. Here, by reconfiguring a multiple-scattering system, we introduce 'structural nonlinearity' via a nonlinear map** between the scattering potential and the output light. Experimentally we demonstrate high-order…
▽ More
Nonlinear optics is a rapidly growing field that has found a wide range of applications. A major limitation, however, is the demand of high power, especially for high-order nonlinearities. Here, by reconfiguring a multiple-scattering system, we introduce 'structural nonlinearity' via a nonlinear map** between the scattering potential and the output light. Experimentally we demonstrate high-order, tunable nonlinearities at low power. The multiply-scattered light features enhanced intensity fluctuations and long-range spatial correlations. The flexibility, robustness and energy efficiency of our approach provides a versatile platform for exploring structural nonlinearities for various applications.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Authors:
Giuseppe Emanuele Lio,
Sara Nocentini,
Lorenzo Pattelli,
Eleonora Cara,
Diederik Sybolt Wiersma,
Ulrich Rührmair,
Francesco Riboli
Abstract:
Due to their unmatched entropy, complexity, and security level, optical Physical Unclonable Functions (PUFs) currently receive a lot of interest in the literature. Despite the large body of existing works, however, one of their core features has never been quantified in detail, namely their physical unclonability. This paper tackles this fundamental and yet largely unaddressed issue. In simulation…
▽ More
Due to their unmatched entropy, complexity, and security level, optical Physical Unclonable Functions (PUFs) currently receive a lot of interest in the literature. Despite the large body of existing works, however, one of their core features has never been quantified in detail, namely their physical unclonability. This paper tackles this fundamental and yet largely unaddressed issue. In simulations and/or experiments, the sensitivity of diffraction-based optical responses is investigated with respect to various small alterations such as variation in the position, size, and number of the scatterers, as well as perturbations in the spatial alignment between the physical unclonable function (PUF) and the measurement apparatus. Our analysis focuses on 2D optical PUFs because of their relevance in integrated applications and the need to reply to security concerns that can be raised when the physical structure of the geometry is accessible. Among the results of this study, the sensitivity analysis shows that a positional perturbation of scatterers on the order of \SI{30}{\nano\meter}, i.e., far below the wavelength of the probing laser light of \SI{632}{\nano\meter} wavelength, is sufficient to invalidate the PUF response and thus detect a forgery attempt. These results support and quantify the high adversarial efforts required to clone optical PUFs, even for 2D layouts.
△ Less
Submitted 29 July, 2022;
originally announced August 2022.
-
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature
Authors:
Florian Frank,
Wenjie Xiong,
Nikolaos Athanasios Anagnostopoulos,
André Schaller,
Tolga Arul,
Farinaz Koushanfar,
Stefan Katzenbeisser,
Ulrich Ruhrmair,
Jakub Szefer
Abstract:
The ubiquity and pervasiveness of modern Internet of Things (IoT) devices opens up vast possibilities for novel applications, but simultaneously also allows spying on, and collecting data from, unsuspecting users to a previously unseen extent. This paper details a new attack form in this vein, in which the decay properties of widespread, off-the-shelf DRAM modules are exploited to accurately sense…
▽ More
The ubiquity and pervasiveness of modern Internet of Things (IoT) devices opens up vast possibilities for novel applications, but simultaneously also allows spying on, and collecting data from, unsuspecting users to a previously unseen extent. This paper details a new attack form in this vein, in which the decay properties of widespread, off-the-shelf DRAM modules are exploited to accurately sense the temperature in the vicinity of the DRAM-carrying device. Among others, this enables adversaries to remotely and purely digitally spy on personal behavior in users' private homes, or to collect security-critical data in server farms, cloud storage centers, or commercial production lines. We demonstrate that our attack can be performed by merely compromising the software of an IoT device and does not require hardware modifications or physical access at attack time. It can achieve temperature resolutions of up to 0.5°C over a range of 0°C to 70°C in practice. Perhaps most interestingly, it even works in devices that do not have a dedicated temperature sensor on board. To complete our work, we discuss practical attack scenarios as well as possible countermeasures against our temperature espionage attacks.
△ Less
Submitted 3 August, 2022;
originally announced August 2022.