-
Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques
Authors:
Aleksa Deric,
Kyle Mitard,
Shahin Tajik,
Daniel Holcomb
Abstract:
Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up with the demand for more complex logic, manufacturing large dies still poses a challenge. Increasingly the solution adopted to minimize the impact of sil…
▽ More
Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up with the demand for more complex logic, manufacturing large dies still poses a challenge. Increasingly the solution adopted to minimize the impact of silicon defects on manufacturing yield has been to split a design into multiple smaller dies called chiplets which are then brought together on a silicon interposer. Advanced 2.5D and 3D packaging techniques that enable this kind of integration also promise increased power efficiency and opportunities for heterogeneous integration.
However, despite their advantages, chiplets are not without issues. Apart from manufacturing challenges that come with new packaging techniques, disaggregating a design into multiple logically and physically separate dies introduces new threats, including the possibility of tampering with and probing exposed data lines. In this paper we evaluate the exposure of chiplets to probing by applying laser contactless probing techniques to a chiplet-based AMD/Xilinx VU9P FPGA. First, we identify and map interposer wire drivers and show that probing them is easier compared to probing internal nodes. Lastly, we demonstrate that delay-based sensors, which can be used to protect against physical probes, are insufficient to protect against laser probing as the delay change due to laser probing is only 0.792ps even at 100\% laser power.
△ Less
Submitted 23 May, 2024;
originally announced May 2024.
-
LaserEscape: Detecting and Mitigating Optical Probing Attacks
Authors:
Saleh Khalaj Monfared,
Kyle Mitard,
Andrew Cannon,
Domenic Forte,
Shahin Tajik
Abstract:
The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even with limited knowledge of the IC under attack. Unfortunately, few countermeasures are proposed in the literature, and none has been fabricated and tes…
▽ More
The security of integrated circuits (ICs) can be broken by sophisticated physical attacks relying on failure analysis methods. Optical probing is one of the most prominent examples of such attacks, which can be accomplished in a matter of days, even with limited knowledge of the IC under attack. Unfortunately, few countermeasures are proposed in the literature, and none has been fabricated and tested in practice. These countermeasures usually require changing the standard cell libraries and, thus, are incompatible with digital and programmable platforms, such as field programmable gate arrays (FPGAs). In this work, we shift our attention from preventing the attack to detecting and responding to it. We introduce LaserEscape, the first fully digital and FPGA-compatible countermeasure to detect and mitigate optical probing attacks. LaserEscape incorporates digital delay-based sensors to reliably detect the physical alteration on the fabric caused by laser beam irradiations in real time. Furthermore, as a response to the attack, LaserEscape deploys real-time hiding approaches using randomized hardware reconfigurability. It realizes 1) moving target defense (MTD) to physically move the sensitive circuity under attack out of the probing field of focus to protect secret keys and 2) polymorphism to logically obfuscate the functionality of the targeted circuit to counter function extraction and reverse engineering attempts. We demonstrate the effectiveness and resiliency of our approach by performing optical probing attacks on protected and unprotected designs on a 28-nm FPGA. Our results show that optical probing attacks can be reliably detected and mitigated without interrupting the chip's operation.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Parasitic Circus:On the Feasibility of Golden Free PCB Verification
Authors:
Maryam Saadat Safa,
Patrick Schaumont,
Shahin Tajik
Abstract:
Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techniques grounded in impedance characterization of PCB's Power Delivery Network (PDN) have gained prominence due to their global detection coverage, non-…
▽ More
Printed circuit boards (PCBs) are an integral part of electronic systems. Hence, verifying their physical integrity in the presence of supply chain attacks (e.g., tampering and counterfeiting) is of utmost importance. Recently, tamper detection techniques grounded in impedance characterization of PCB's Power Delivery Network (PDN) have gained prominence due to their global detection coverage, non-invasive, and low-cost nature. Similar to other physical verification methods, these techniques rely on the existence of a physical golden sample for signature comparisons. However, having access to a physical golden sample for golden signature extraction is not feasible in many real-world scenarios. In this work, we assess the feasibility of eliminating a physical golden sample and replacing it with a simulated golden signature obtained by the PCB design files. By performing extensive simulation and measurements on an in-house designed PCB, we demonstrate how the parasitic impedance of the PCB components plays a major role in reaching a successful verification. Based on the obtained results and using statistical metrics, we show that we can mitigate the discrepancy between collected signatures from simulation and measurements.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
RandOhm: Mitigating Impedance Side-channel Attacks using Randomized Circuit Configurations
Authors:
Saleh Khalaj Monfared,
Domenic Forte,
Shahin Tajik
Abstract:
Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate them. However, as demonstrated recently, these mitiga…
▽ More
Physical side-channel attacks can compromise the security of integrated circuits. Most physical side-channel attacks (e.g., power or electromagnetic) exploit the dynamic behavior of a chip, typically manifesting as changes in current consumption or voltage fluctuations where algorithmic countermeasures, such as masking, can effectively mitigate them. However, as demonstrated recently, these mitigation techniques are not entirely effective against backscattered side-channel attacks such as impedance analysis. In the case of an impedance attack, an adversary exploits the data-dependent impedance variations of the chip power delivery network (PDN) to extract secret information. In this work, we introduce RandOhm, which exploits a moving target defense (MTD) strategy based on the partial reconfiguration (PR) feature of mainstream FPGAs and programmable SoCs to defend against impedance side-channel attacks. We demonstrate that the information leakage through the PDN impedance could be significantly reduced via runtime reconfiguration of the secret-sensitive parts of the circuitry. Hence, by constantly randomizing the placement and routing of the circuit, one can decorrelate the data-dependent computation from the impedance value. Moreover, in contrast to existing PR-based countermeasures, RandOhm deploys open-source bitstream manipulation tools on programmable SoCs to speed up the randomization and provide real-time protection. To validate our claims, we apply RandOhm to AES ciphers realized on 28-nm FPGAs. We analyze the resiliency of our approach by performing non-profiled and profiled impedance analysis attacks and investigate the overhead of our mitigation in terms of delay and performance.
△ Less
Submitted 6 May, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
The Pros and Cons of Using Machine Learning and Interpretable Machine Learning Methods in psychiatry detection applications, specifically depression disorder: A Brief Review
Authors:
Hossein Simchi,
Samira Tajik
Abstract:
The COVID-19 pandemic has forced many people to limit their social activities, which has resulted in a rise in mental illnesses, particularly depression. To diagnose these illnesses with accuracy and speed, and prevent severe outcomes such as suicide, the use of machine learning has become increasingly important. Additionally, to provide precise and understandable diagnoses for better treatment, A…
▽ More
The COVID-19 pandemic has forced many people to limit their social activities, which has resulted in a rise in mental illnesses, particularly depression. To diagnose these illnesses with accuracy and speed, and prevent severe outcomes such as suicide, the use of machine learning has become increasingly important. Additionally, to provide precise and understandable diagnoses for better treatment, AI scientists and researchers must develop interpretable AI-based solutions. This article provides an overview of relevant articles in the field of machine learning and interpretable AI, which helps to understand the advantages and disadvantages of using AI in psychiatry disorder detection applications.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
LeakyOhm: Secret Bits Extraction using Impedance Analysis
Authors:
Saleh Khalaj Monfared,
Tahoura Mosavirik,
Shahin Tajik
Abstract:
The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physica…
▽ More
The threats of physical side-channel attacks and their countermeasures have been widely researched. Most physical side-channel attacks rely on the unavoidable influence of computation or storage on current consumption or voltage drop on a chip. Such data-dependent influence can be exploited by, for instance, power or electromagnetic analysis. In this work, we introduce a novel non-invasive physical side-channel attack, which exploits the data-dependent changes in the impedance of the chip. Our attack relies on the fact that the temporarily stored contents in registers alter the physical characteristics of the circuit, which results in changes in the die's impedance. To sense such impedance variations, we deploy a well-known RF/microwave method called scattering parameter analysis, in which we inject sine wave signals with high frequencies into the system's power distribution network (PDN) and measure the echo of the signals. We demonstrate that according to the content bits and physical location of a register, the reflected signal is modulated differently at various frequency points enabling the simultaneous and independent probing of individual registers. Such side-channel leakage challenges the $t$-probing security model assumption used in masking, which is a prominent side-channel countermeasure. To validate our claims, we mount non-profiled and profiled impedance analysis attacks on hardware implementations of unprotected and high-order masked AES. We show that in the case of the profiled attack, only a single trace is required to recover the secret key. Finally, we discuss how a specific class of hiding countermeasures might be effective against impedance leakage.
△ Less
Submitted 23 October, 2023; v1 submitted 8 May, 2023;
originally announced October 2023.
-
Counterfeit Chip Detection using Scattering Parameter Analysis
Authors:
Maryam Saadat Safa,
Tahoura Mosavirik,
Shahin Tajik
Abstract:
The increase in the number of counterfeit and recycled microelectronic chips in recent years has created significant security and safety concerns in various applications. Hence, detecting such counterfeit chips in electronic systems is critical before deployment in the field. Unfortunately, the conventional verification tools using physical inspection and side-channel methods are costly, unscalabl…
▽ More
The increase in the number of counterfeit and recycled microelectronic chips in recent years has created significant security and safety concerns in various applications. Hence, detecting such counterfeit chips in electronic systems is critical before deployment in the field. Unfortunately, the conventional verification tools using physical inspection and side-channel methods are costly, unscalable, error-prone, and often incompatible with legacy systems. This paper introduces a generic non-invasive and low-cost counterfeit chip detection based on characterizing the impedance of the system's power delivery network (PDN). Our method relies on the fact that the impedance of the counterfeit and recycled chips differs from the genuine ones. To sense such impedance variations confidently, we deploy scattering parameters, frequently used for impedance characterization of RF/microwave circuits. Our proposed approach can directly be applied to soldered chips on the system's PCB and does not require any modifications on the legacy systems. To validate our claims, we perform extensive measurements on genuine and aged samples from two families of STMicroelectronics chips to assess the effectiveness of the proposed approach.
△ Less
Submitted 21 February, 2023;
originally announced February 2023.
-
Homology Groups of Embedded Fractional Brownian Motion
Authors:
H. Masoomy,
S. Tajik,
S. M. S. Movahed
Abstract:
A well-known class of non-stationary self-similar time series is the fractional Brownian motion (fBm) considered to model ubiquitous stochastic processes in nature. In this paper, we study the homology groups of high-dimensional point cloud data (PCD) constructed from synthetic fBm data. We covert the simulated fBm series to a PCD, a subset of unit $D$-dimensional cube, employing the time delay em…
▽ More
A well-known class of non-stationary self-similar time series is the fractional Brownian motion (fBm) considered to model ubiquitous stochastic processes in nature. In this paper, we study the homology groups of high-dimensional point cloud data (PCD) constructed from synthetic fBm data. We covert the simulated fBm series to a PCD, a subset of unit $D$-dimensional cube, employing the time delay embedding method for a given embedding dimension and a time-delay parameter. In the context of persistent homology (PH), we compute topological measures for embedded PCD as a function of associated Hurst exponent, $H$, for different embedding dimensions, time-delays and amount of irregularity existed in the dataset in various scales. Our results show that for a regular synthetic fBm, the higher value of the embedding dimension leads to increasing the $H$-dependency of topological measures based on zeroth and first homology groups. To achieve a reliable classification of fBm, we should consider the small value of time-delay irrespective of the irregularity presented in the data. More interestingly, the value of scale for which the PCD to be path-connected and the post-loopless regime scale are more robust concerning irregularity for distinguishing the fBm signal. Such robustness becomes less for the higher value of embedding dimension.
△ Less
Submitted 16 June, 2022;
originally announced August 2022.
-
Quantum Bohmian Inspired Potential to Model Non-Gaussian Events and the Application in Financial Markets
Authors:
Reza Hosseini,
Samin Tajik,
Zahra Koohi Lai,
Tayeb Jamali,
Emmanuel Haven,
G. Reza Jafari
Abstract:
We have implemented quantum modeling mainly based on Bohmian Mechanics to study time series that contain strong coupling between their events. We firstly propose how compared to normal densities, our target time series seem to be associated with a higher number of rare events, and Gaussian statistics tend to underestimate these events' frequency drastically. To this end, we suggest that by imposin…
▽ More
We have implemented quantum modeling mainly based on Bohmian Mechanics to study time series that contain strong coupling between their events. We firstly propose how compared to normal densities, our target time series seem to be associated with a higher number of rare events, and Gaussian statistics tend to underestimate these events' frequency drastically. To this end, we suggest that by imposing Gaussian densities to the natural processes, one will seriously neglect the existence of extreme events in many circumstances. The central question of our study concerns the consideration of the effects of these rare events in the corresponding probability densities and studying their role from the point of view of quantum measurements. To model the non-Gaussian behavior of these time-series, we utilize the multifractal random walk (MRW) approach and control the non-Gaussianity parameter $λ$ accordingly. Using the framework of quantum mechanics, we then examine the role of $λ$ in quantum potentials derived for these time series. Our Bohmian quantum analysis shows that the derived potential takes some negative values in high frequencies (its mean values), then substantially increases, and the value drops again for the rare events. We thus conclude that these events could generate a potential barrier that the system, lingering in a non-Gaussian high-frequency region, encounters, and their role becomes more prominent when it comes to transversing this barrier. In this study, as an example of the application of quantum potential outside of the micro-world, we compute the quantum potentials for the S\&P financial market time series to verify the presence of rare events in the non-Gaussian densities for this real data and remark the deviation from the Gaussian case.
△ Less
Submitted 24 April, 2022;
originally announced April 2022.
-
A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation
Authors:
David Selasi Koblah,
Rabin Yu Acharya,
Daniel Capecci,
Olivia P. Dizon-Paradis,
Shahin Tajik,
Fatemeh Ganji,
Damon L. Woodard,
Domenic Forte
Abstract:
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analo…
▽ More
Artificial intelligence (AI) and machine learning (ML) techniques have been increasingly used in several fields to improve performance and the level of automation. In recent years, this use has exponentially increased due to the advancement of high-performance computing and the ever increasing size of data. One of such fields is that of hardware design; specifically the design of digital and analog integrated circuits~(ICs), where AI/ ML techniques have been extensively used to address ever-increasing design complexity, aggressive time-to-market, and the growing number of ubiquitous interconnected devices (IoT). However, the security concerns and issues related to IC design have been highly overlooked. In this paper, we summarize the state-of-the-art in AL/ML for circuit design/optimization, security and engineering challenges, research in security-aware CAD/EDA, and future research directions and needs for using AI/ML for security-aware circuit design.
△ Less
Submitted 20 April, 2022; v1 submitted 19 April, 2022;
originally announced April 2022.
-
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging (Extended Version)
Authors:
Thilo Krachenfels,
Jean-Pierre Seifert,
Shahin Tajik
Abstract:
The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecti…
▽ More
The threat of hardware Trojans (HTs) and their detection is a widely studied field. While the effort for inserting a Trojan into an application-specific integrated circuit (ASIC) can be considered relatively high, especially when trusting the chip manufacturer, programmable hardware is vulnerable to Trojan insertion even after the product has been shipped or during usage. At the same time, detecting dormant HTs with small or zero-overhead triggers and payloads on these platforms is still a challenging task, as the Trojan might not get activated during the chip verification using logical testing or physical measurements. In this work, we present a novel Trojan detection approach based on a technique known from integrated circuit (IC) failure analysis, capable of detecting virtually all classes of dormant Trojans. Using laser logic state imaging (LLSI), we show how supply voltage modulations can awaken inactive Trojans, making them detectable using laser voltage imaging techniques. Therefore, our technique does not require triggering the Trojan. To support our claims, we present three case studies on 28 and 20 SRAM- and flash-based field-programmable gate arrays (FPGAs). We demonstrate how to detect with high confidence small changes in sequential and combinatorial logic as well as in the routing configuration of FPGAs in a non-invasive manner. Finally, we discuss the practical applicability of our approach on dormant analog Trojans in ASICs.
△ Less
Submitted 2 February, 2023; v1 submitted 21 July, 2021;
originally announced July 2021.
-
Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attack
Authors:
Yuan Yao,
Pantea Kiaei,
Richa Singh,
Shahin Tajik,
Patrick Schaumont
Abstract:
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such countermeasures have been developed for each attack vector separately. We demonstrate a multipurpose ring oscillator design - Programmable Ring Oscillator (…
▽ More
Side-channel and fault injection attacks reveal secret information by monitoring or manipulating the physical effects of computations involving secret variables. Circuit-level countermeasures help to deter these attacks, and traditionally such countermeasures have been developed for each attack vector separately. We demonstrate a multipurpose ring oscillator design - Programmable Ring Oscillator (PRO) to address both fault attacks and side-channel attacks in a generic, application-independent manner. PRO, as an integrated primitive, can provide on-chip side-channel resistance, power monitoring, and fault detection capabilities to a secure design. We present a grid of PROs monitoring the on-chip power network to detect anomalies. Such power anomalies may be caused by external factors such as electromagnetic fault injection and power glitches, as well as by internal factors such as hardware Trojans. By monitoring the frequency of the ring oscillators, we are able to detect the on-chip power anomaly in time as well as in location. Moreover, we show that the PROs can also inject a random noise pattern into a design's power consumption. By randomly switching the frequency of a ring oscillator, the resulting power-noise pattern significantly reduces the power-based side-channel leakage of a cipher. We discuss the design of PRO and present measurement results on a Xilinx Spartan-6 FPGA prototype, and we show that side-channel and fault vulnerabilities can be addressed at a low cost by introducing PRO to the design. We conclude that PRO can serve as an application-independent, multipurpose countermeasure.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
Automatic Extraction of Secrets from the Transistor Jungle using Laser-Assisted Side-Channel Attacks
Authors:
Thilo Krachenfels,
Tuba Kiyan,
Shahin Tajik,
Jean-Pierre Seifert
Abstract:
The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to t…
▽ More
The security of modern electronic devices relies on secret keys stored on secure hardware modules as the root-of-trust (RoT). Extracting those keys would break the security of the entire system. As shown before, sophisticated side-channel analysis (SCA) attacks, using chip failure analysis (FA) techniques, can extract data from on-chip memory cells. However, since the chip's layout is unknown to the adversary in practice, secret key localization and reverse engineering are onerous tasks. Consequently, hardware vendors commonly believe that the ever-growing physical complexity of the integrated circuit (IC) designs can be a natural barrier against potential adversaries. In this work, we present a novel approach that can extract the secret key without any knowledge of the IC's layout, and independent from the employed memory technology as key storage. We automate the -- traditionally very labor-intensive -- reverse engineering and data extraction process. To that end, we demonstrate that black-box measurements captured using laser-assisted SCA techniques from a training device with known key can be used to profile the device for a later key prediction on other victim devices with unknown keys. To showcase the potential of our approach, we target keys on three different hardware platforms, which are utilized as RoT in different products.
△ Less
Submitted 23 February, 2021;
originally announced February 2021.
-
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model
Authors:
Thilo Krachenfels,
Fatemeh Ganji,
Amir Moradi,
Shahin Tajik,
Jean-Pierre Seifert
Abstract:
Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be ob…
▽ More
Due to its sound theoretical basis and practical efficiency, masking has become the most prominent countermeasure to protect cryptographic implementations against physical side-channel attacks (SCAs). The core idea of masking is to randomly split every sensitive intermediate variable during computation into at least t+1 shares, where t denotes the maximum number of shares that are allowed to be observed by an adversary without learning any sensitive information. In other words, it is assumed that the adversary is bounded either by the possessed number of probes (e.g., microprobe needles) or by the order of statistical analyses while conducting higher-order SCA attacks (e.g., differential power analysis). Such bounded models are employed to prove the SCA security of the corresponding implementations. Consequently, it is believed that given a sufficiently large number of shares, the vast majority of known SCA attacks are mitigated. In this work, we present a novel laser-assisted SCA technique, called Laser Logic State Imaging (LLSI), which offers an unlimited number of contactless probes, and therefore, violates the probing security model assumption. This technique enables us to take snapshots of hardware implementations, i.e., extract the logical state of all registers at any arbitrary clock cycle with a single measurement. To validate this, we mount our attack on masked AES hardware implementations and practically demonstrate the extraction of the full-length key in two different scenarios. First, we assume that the location of the registers (key and/or state) is known, and hence, their content can be directly read by a single snapshot. Second, we consider an implementation with unknown register locations, where we make use of multiple snapshots and a SAT solver to reveal the secrets.
△ Less
Submitted 9 September, 2020;
originally announced September 2020.
-
Physically Unclonable Functions and AI: Two Decades of Marriage
Authors:
Fatemeh Ganji,
Shahin Tajik
Abstract:
The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature. The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has…
▽ More
The current chapter aims at establishing a relationship between artificial intelligence (AI) and hardware security. Such a connection between AI and software security has been confirmed and well-reviewed in the relevant literature. The main focus here is to explore the methods borrowed from AI to assess the security of a hardware primitive, namely physically unclonable functions (PUFs), which has found applications in cryptographic protocols, e.g., authentication and key generation. Metrics and procedures devised for this are further discussed. Moreover, By reviewing PUFs designed by applying AI techniques, we give insight into future research directions in this area.
△ Less
Submitted 11 February, 2021; v1 submitted 25 August, 2020;
originally announced August 2020.
-
Artificial Neural Networks and Fault Injection Attacks
Authors:
Shahin Tajik,
Fatemeh Ganji
Abstract:
This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order to define the threat models precisely. With r…
▽ More
This chapter is on the security assessment of artificial intelligence (AI) and neural network (NN) accelerators in the face of fault injection attacks. More specifically, it discusses the assets on these platforms and compares them with ones known and well-studied in the field of cryptographic systems. This is a crucial step that must be taken in order to define the threat models precisely. With respect to that, fault attacks mounted on NNs and AI accelerators are explored.
△ Less
Submitted 11 February, 2021; v1 submitted 16 August, 2020;
originally announced August 2020.
-
Defense-in-Depth: A Recipe for Logic Locking to Prevail
Authors:
M Tanjidur Rahman,
M Sazadur Rahman,
Huanyu Wang,
Shahin Tajik,
Waleed Khalil,
Farimah Farahmandi,
Domenic Forte,
Navid Asadizanjani,
Mark Tehranipoor
Abstract:
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid…
▽ More
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confidentiality of the key is imperative for the security of the locked IP as it stands as the lone barrier against IP infringement. Therefore, the logic locking is considered as a broken scheme once the key value is exposed. The research community has shown the vulnerability of the logic locking techniques against different classes of attacks, such as Oracle-guided and physical attacks. Although several countermeasures have already been proposed against such attacks, none of them is simultaneously impeccable against Oracle-guided, Oracle-less, and physical attacks. Under such circumstances, a defense-in-depth approach can be considered as a practical approach in addressing the vulnerabilities of logic locking. Defense-in-depth is a multilayer defense approach where several independent countermeasures are implemented in the device to provide aggregated protection against different attack vectors. Introducing such a multilayer defense model in logic locking is the major contribution of this paper. With regard to this, we first identify the core components of logic locking schemes, which need to be protected. Afterwards, we categorize the vulnerabilities of core components according to potential threats for the locking key in logic locking schemes. Furthermore, we propose several defense layers and countermeasures to protect the device from those vulnerabilities. Finally, we turn our focus to open research questions and conclude with suggestions for future research directions.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
The effect of strong electron-rattling phonon coupling on some superconducting properties
Authors:
Samin Tajik,
Božidar Mitrović,
Frank Marsiglio
Abstract:
Using the Eliashberg theory of superconductivity we have examined several properties of a model in which electrons are coupled only to rattling phonon modes represented by a sharp peak in the electron-phonon coupling function. Our choice of parameters was guided by experiments on $β$-pyrochlore oxide superconductor KOs$_{2}$Os$_{6}$. We have calculated the temperature dependence of the superconduc…
▽ More
Using the Eliashberg theory of superconductivity we have examined several properties of a model in which electrons are coupled only to rattling phonon modes represented by a sharp peak in the electron-phonon coupling function. Our choice of parameters was guided by experiments on $β$-pyrochlore oxide superconductor KOs$_{2}$Os$_{6}$. We have calculated the temperature dependence of the superconducting gap edge, the quasiparticle decay rate, the NMR relaxation rate assuming that the coupling between the nuclear spins and the conduction electrons is via a contact hyperfine interaction which would be appropriate for the O-site in KOs$_{2}$Os$_{6}$, and the microwave conductivity. We examined the limit of very strong coupling by considering three values of the electron-phonon coupling parameter $λ=$ 2.38, 3, and 5 and {\em did not} assume that the rattler frequency $Ω_{0}$ is temperature dependent in the superconducting state. We obtained a very unusual temperature dependence of the superconducting gap edge $Δ(T)$, very much like the one extracted from photoemission experiments on KOs$_2$O$_6$.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Database Learning: Toward a Database that Becomes Smarter Every Time
Authors:
Yongjoo Park,
Ahmad Shahab Tajik,
Michael Cafarella,
Barzan Mozafari
Abstract:
In today's databases, previous query answers rarely benefit answering future queries. For the first time, to the best of our knowledge, we change this paradigm in an approximate query processing (AQP) context. We make the following observation: the answer to each query reveals some degree of knowledge about the answer to another query because their answers stem from the same underlying distributio…
▽ More
In today's databases, previous query answers rarely benefit answering future queries. For the first time, to the best of our knowledge, we change this paradigm in an approximate query processing (AQP) context. We make the following observation: the answer to each query reveals some degree of knowledge about the answer to another query because their answers stem from the same underlying distribution that has produced the entire dataset. Exploiting and refining this knowledge should allow us to answer queries more analytically, rather than by reading enormous amounts of raw data. Also, processing more queries should continuously enhance our knowledge of the underlying distribution, and hence lead to increasingly faster response times for future queries.
We call this novel idea---learning from past query answers---Database Learning. We exploit the principle of maximum entropy to produce answers, which are in expectation guaranteed to be more accurate than existing sample-based approximations. Empowered by this idea, we build a query engine on top of Spark SQL, called Verdict. We conduct extensive experiments on real-world query traces from a large customer of a major database vendor. Our results demonstrate that Verdict supports 73.7% of these queries, speeding them up by up to 23.0x for the same accuracy level compared to existing AQP systems.
△ Less
Submitted 28 March, 2017; v1 submitted 15 March, 2017;
originally announced March 2017.