Skip to main content

Showing 1–13 of 13 results for author: Holcomb, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14821  [pdf, other

    cs.CR

    Evaluating Vulnerability of Chiplet-Based Systems to Contactless Probing Techniques

    Authors: Aleksa Deric, Kyle Mitard, Shahin Tajik, Daniel Holcomb

    Abstract: Driven by a need for ever increasing chip performance and inclusion of innovative features, a growing number of semiconductor companies are opting for all-inclusive System-on-Chip (SoC) architectures. Although Moore's Law has been able to keep up with the demand for more complex logic, manufacturing large dies still poses a challenge. Increasingly the solution adopted to minimize the impact of sil… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2405.13933  [pdf, other

    cs.CR

    Resurrection Attack: Defeating Xilinx MPU's Memory Protection

    Authors: Bharadwaj Madabhushi, Chandra Sekhar Mummidi, Sandip Kundu, Daniel Holcomb

    Abstract: Memory protection units (MPUs) are hardware-assisted security features that are commonly used in embedded processors such as the ARM 940T, Infineon TC1775, and Xilinx Zynq. MPUs partition the memory statically, and set individual protection attributes for each partition. MPUs typically define two protection domains: user mode and supervisor mode. Normally, this is sufficient for protecting the ker… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  3. arXiv:2405.13927  [pdf, other

    cs.CR cs.AR

    Memory Scra** Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

    Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb

    Abstract: FPGA-based hardware accelerators are becoming increasingly popular due to their versatility, customizability, energy efficiency, constant latency, and scalability. FPGAs can be tailored to specific algorithms, enabling efficient hardware implementations that effectively leverage algorithm parallelism. This can lead to significant performance improvements over CPUs and GPUs, particularly for highly… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  4. arXiv:2312.06195  [pdf, other

    cs.CR

    Stealing Maggie's Secrets -- On the Challenges of IP Theft Through FPGA Reverse Engineering

    Authors: Simon Klix, Nils Albartus, Julian Speith, Paul Staat, Alice Verstege, Annika Wilde, Daniel Lammers, Jörn Langheinrich, Christian Kison, Sebastian Sester-Wehle, Daniel Holcomb, Christof Paar

    Abstract: Intellectual Property (IP) theft is a cause of major financial and reputational damage, reportedly in the range of hundreds of billions of dollars annually in the U.S. alone. Field Programmable Gate Arrays (FPGAs) are particularly exposed to IP theft, because their configuration file contains the IP in a proprietary format that can be mapped to a gate-level netlist with moderate effort. Despite th… ▽ More

    Submitted 1 July, 2024; v1 submitted 11 December, 2023; originally announced December 2023.

  5. arXiv:2011.07603  [pdf, other

    cs.CR

    Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

    Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier

    Abstract: To lower cost and increase the utilization of Cloud Field-Programmable Gate Arrays (FPGAs), researchers have recently been exploring the concept of multi-tenant FPGAs, where multiple independent users simultaneously share the same remote FPGA. Despite its benefits, multi-tenancy opens up the possibility of malicious users co-locating on the same FPGA as a victim user, and extracting sensitive info… ▽ More

    Submitted 17 April, 2021; v1 submitted 15 November, 2020; originally announced November 2020.

  6. Physical Design Obfuscation of Hardware: A Comprehensive Investigation of Device- and Logic-Level Techniques

    Authors: Arunkumar Vijayakumar, Vinay C. Patil, Daniel E. Holcomb, Christof Paar, Sandip Kundu

    Abstract: The threat of hardware reverse engineering is a growing concern for a large number of applications. A main defense strategy against reverse engineering is hardware obfuscation. In this paper, we investigate physical obfuscation techniques, which perform alterations of circuit elements that are difficult or impossible for an adversary to observe. The examples of such stealthy manipulations are chan… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Journal ref: IEEE Transactions on Information Forensics and Security (Volume: 12, Issue: 1, Jan. 2017)

  7. arXiv:1910.00735  [pdf, other

    cs.CR cs.AR

    Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs

    Authors: Samaneh Ghandali, Daniel Holcomb, Christof Paar

    Abstract: True random number generators (TRNGs) are essential components of cryptographic designs, which are used to generate private keys for encryption and authentication, and are used in masking countermeasures. In this work, we present a mechanism to design a stealthy parametric hardware Trojan for a ring oscillator based TRNG architecture proposed by Yang et al. at ISSCC 2014. Once the Trojan is trigge… ▽ More

    Submitted 22 September, 2019; originally announced October 2019.

  8. arXiv:1809.06207  [pdf, other

    cs.CR

    Algorithmic Obfuscation over GF($2^m$)

    Authors: Cunxi Yu, Daniel Holcomb

    Abstract: Galois Field arithmetic blocks are the key components in many security applications, such as Elliptic Curve Cryptography (ECC) and the S-Boxes of the Advanced Encryption Standard (AES) cipher. This paper introduces a novel hardware intellectual property (IP) protection technique by obfuscating arithmetic functions over Galois Field (GF), specifically, focusing on obfuscation of GF multiplication t… ▽ More

    Submitted 17 September, 2018; originally announced September 2018.

    Comments: 6 pages, 6 figures

  9. arXiv:1802.08919  [pdf, other

    cs.CR cs.AR

    Privacy Leakages in Approximate Adders

    Authors: Shahrzad Keshavarz, Daniel Holcomb

    Abstract: Approximate computing has recently emerged as a promising method to meet the low power requirements of digital designs. The erroneous outputs produced in approximate computing can be partially a function of each chip's process variation. We show that, in such schemes, the erroneous outputs produced on each chip instance can reveal the identity of the chip that performed the computation, possibly j… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: 2017 IEEE International Symposium on Circuits and Systems (ISCAS)

  10. arXiv:1802.08916  [pdf, other

    cs.CR

    SAT-based Reverse Engineering of Gate-Level Schematics using Fault Injection and Probing

    Authors: Shahrzad Keshavarz, Falk Schellenberg, Bastian Richter, Christof Paar, Daniel Holcomb

    Abstract: Gate camouflaging is a known security enhancement technique that tries to thwart reverse engineering by hiding the functions of gates or the connections between them. A number of works on SAT-based attacks have shown that it is often possible to reverse engineer a circuit function by combining a camouflaged circuit model and the ability to have oracle access to the obfuscated combinational circuit… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

    Comments: IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

  11. arXiv:1708.07150  [pdf, other

    cs.CR

    Threshold-based Obfuscated Keys with Quantifiable Security against Invasive Readout

    Authors: Shahrzad Keshavarz, Daniel Holcomb

    Abstract: Advances in reverse engineering make it challenging to deploy any on-chip information in a way that is hidden from a determined attacker. A variety of techniques have been proposed for design obfuscation including look-alike cells in which functionality is determined by hard to observe mechanisms including dummy vias or transistor threshold voltages. Threshold-based obfuscation is especially promi… ▽ More

    Submitted 25 October, 2017; v1 submitted 23 August, 2017; originally announced August 2017.

  12. arXiv:1703.00475  [pdf, other

    cs.CR

    Design Automation for Obfuscated Circuits with Multiple Viable Functions

    Authors: Shahrzad Keshavarz, Christof Paar, Daniel Holcomb

    Abstract: Gate camouflaging is a technique for obfuscating the function of a circuit against reverse engineering attacks. However, if an adversary has pre-existing knowledge about the set of functions that are viable for an application, random camouflaging of gates will not obfuscate the function well. In this case, the adversary can target their search, and only needs to decide whether each of the viable f… ▽ More

    Submitted 1 March, 2017; originally announced March 2017.

  13. arXiv:1612.04588  [pdf, ps, other

    cs.SC

    Reverse Engineering of Irreducible Polynomials in GF(2^m) Arithmetic

    Authors: Cunxi Yu, Daniel Holcomb, Maciej Ciesielski

    Abstract: Current techniques for formally verifying circuits implemented in Galois field (GF) arithmetic are limited to those with a known irreducible polynomial P(x). This paper presents a computer algebra based technique that extracts the irreducible polynomial P(x) used in the implementation of a multiplier in GF(2^m). The method is based on first extracting a unique polynomial in Galois field of each ou… ▽ More

    Submitted 14 December, 2016; originally announced December 2016.

    Comments: 6 pages, 4 figures, DATE 2017, Lausanne, Switzerland, March 27-31, 2017