-
Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study
Authors:
Md Sadik Awal,
Buddhipriya Gayanath,
Md Tauhidur Rahman
Abstract:
In recent times, impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems. It leverages variations in the intrinsic impedance of a chip's internal structure across different logic states. In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established…
▽ More
In recent times, impedance side-channel analysis has emerged as a potent strategy for adversaries seeking to extract sensitive information from computing systems. It leverages variations in the intrinsic impedance of a chip's internal structure across different logic states. In this study, we conduct a comparative analysis between the newly explored impedance side channel and the well-established power side channel. Through experimental evaluation, we investigate the efficacy of these two side channels in extracting the cryptographic key from the Advanced Encryption Standard (AES) and analyze their performance. Our results indicate that impedance analysis demonstrates a higher potential for cryptographic key extraction compared to power side-channel analysis. Moreover, we identify scenarios where power side-channel analysis does not yield satisfactory results, whereas impedance analysis proves to be more robust and effective. This work not only underscores the significance of impedance side-channel analysis in enhancing cryptographic security but also emphasizes the necessity for a deeper understanding of its mechanisms and implications.
△ Less
Submitted 10 May, 2024;
originally announced May 2024.
-
Hiding Information for Secure and Covert Data Storage in Commercial ReRAM Chips
Authors:
Farah Ferdaus,
B. M. S. Bahar Talukder,
Md Tauhidur Rahman
Abstract:
This article introduces a novel, low-cost technique for hiding data in commercially available resistive-RAM (ReRAM) chips. The data is kept hidden in ReRAM cells by manipulating its analog physical properties through switching ($\textit{set/reset}$) operations. This hidden data, later, is retrieved by sensing the changes in cells' physical properties (i.e., $\textit{set/reset}$ time of the memory…
▽ More
This article introduces a novel, low-cost technique for hiding data in commercially available resistive-RAM (ReRAM) chips. The data is kept hidden in ReRAM cells by manipulating its analog physical properties through switching ($\textit{set/reset}$) operations. This hidden data, later, is retrieved by sensing the changes in cells' physical properties (i.e., $\textit{set/reset}$ time of the memory cells). The proposed system-level hiding technique does not affect the normal memory operations and does not require any hardware modifications. Furthermore, the proposed hiding approach is robust against temperature variations and the aging of the devices through normal read/write operation. The silicon results show that our proposed data hiding technique is acceptably fast with ${\sim}0.4bit/min$ of encoding and ${\sim}15.625bits/s$ of retrieval rates, and the hidden message is unrecoverable without the knowledge of the secret key, which is used to enhance the security of hidden information.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
A New Paradigm in Blockchain-based Financial Aid Distribution
Authors:
Md. Raisul Hasan Shahrukh,
Md. Tabassinur Rahman,
Nafees Mansoor
Abstract:
Blockchain technology has emerged as a game-changer in a variety of industries, providing robust solutions that can supplant conventional procedures. The unique potential of this technology originates from its decentralized ledger systems, which enable enhanced security, transparency, and the validation of transactions without the need for intermediaries. Notably, the financial sector is making su…
▽ More
Blockchain technology has emerged as a game-changer in a variety of industries, providing robust solutions that can supplant conventional procedures. The unique potential of this technology originates from its decentralized ledger systems, which enable enhanced security, transparency, and the validation of transactions without the need for intermediaries. Notably, the financial sector is making substantial progress toward implementing blockchain solutions for a variety of operations, including remittances, lending, and investments. The healthcare industry is simultaneously incorporating this technology into systems for managing medical records, tracing supply chains, and data management. Similarly, the capacity of blockchain to enhance transparency, traceability, and accountability is widely acknowledged in supply chain management, from the procurement of basic materials to the delivery of finished goods. Diverse industries, including real estate, energy, and government, are actively investigating the potential of blockchain to improve efficiency, security, and transparency. Notably, Hyperledger Besu, an open-source blockchain platform, is used to implement smart contracts that automate processes and reduce manual intervention along distribution pathways. This exhaustive review examines the transformative potential of blockchain technology across a variety of industries, discussing the obstacles encountered and providing key insights into future research and development directions. This paper seeks to serve as a pivotal resource for academics, industry stakeholders, and policymakers by synthesizing existing scholarly literature and shedding light on significant findings.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Exploration of Hyperledger Besu in Designing Private Blockchain-based Financial Distribution Systems
Authors:
Md. Raisul Hasan Shahrukh,
Md. Tabassinur Rahman,
Nafees Mansoor
Abstract:
Blockchain, a decentralized technology that provides unrivaled security, transparency, and process validation, is redefining the operational landscape across numerous industries. This article focuses on the development of an innovative consortium blockchain based financial distribution application. This paper illuminates the transformative role of blockchain technology in a variety of sectors by d…
▽ More
Blockchain, a decentralized technology that provides unrivaled security, transparency, and process validation, is redefining the operational landscape across numerous industries. This article focuses on the development of an innovative consortium blockchain based financial distribution application. This paper illuminates the transformative role of blockchain technology in a variety of sectors by drawing on a plethora of academic literature and current industry practices. It demonstrates the diverse applications of blockchain, ranging from remittances to lending and investments in finance to data administration in healthcare and supply chain tracking. The paper reveals the design and potential of a consortium blockchain based application for financial distribution. Utilizing the capabilities of Hyperledger Besu, the application is tailored to improve security, scalability, and interoperability, thereby contributing to a more integrated financial ecosystem. The investigation sheds light on the combination of consortium blockchain controlled access and Hyprledger Besu comprehensive functionality, proposing a secure, transparent, and efficient financial transaction environment. The investigation serves as a resource for academics, industry professionals, and policymakers alike, highlighting the vast potential of blockchain technology, enabled by platforms such as Hyperledger Besu, in accelerating the evolution of traditional systems toward a more decentralized, secure, and efficient future.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Aid Nexus : A Blockchain Based Financial Distribution System
Authors:
Md. Raisul Hasan Shahrukh,
Md. Tabassinur Rahman,
Nafees Mansoor
Abstract:
Blockchain technology has emerged as a disruptive force with transformative potential across numerous industries, promising efficient and automated solutions that can revolutionize traditional systems. By leveraging decentralized ledger systems, blockchain offers enhanced security, transparency, and transaction verification without the need for intermediaries. The finance sector is exploring block…
▽ More
Blockchain technology has emerged as a disruptive force with transformative potential across numerous industries, promising efficient and automated solutions that can revolutionize traditional systems. By leveraging decentralized ledger systems, blockchain offers enhanced security, transparency, and transaction verification without the need for intermediaries. The finance sector is exploring blockchain-based solutions for payments, remittances, lending, and investments, while healthcare adopts the technology for medical record kee**, supply chain tracking, and data management. Similarly, supply chain management benefits from blockchain's ability to enhance transparency, traceability, and accountability from raw materials to finished products. Other sectors, including real estate, energy, and government, are also investigating blockchain-based solutions to improve efficiency, security, and transparency. Furthermore, smart contracts within the blockchain enable process automation, reducing manual intervention in distribution workflows. AidNeux, a consortium-based blockchain DApp, reimagines the distribution of financial assistance by addressing inefficiencies and opaqueness. Using smart contracts ensures the security and directness of money transfers. Its robust digital identity verification and real-time auditability reduce fraud risks and strengthen accountability, thereby presenting a scalable, transparent solution to problems inherent to conventional financial aid systems.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Impedance Leakage Vulnerability and its Utilization in Reverse-engineering Embedded Software
Authors:
Md Sadik Awal,
Md Tauhidur Rahman
Abstract:
Discovering new vulnerabilities and implementing security and privacy measures are important to protect systems and data against physical attacks. One such vulnerability is impedance, an inherent property of a device that can be exploited to leak information through an unintended side channel, thereby posing significant security and privacy risks. Unlike traditional vulnerabilities, impedance is o…
▽ More
Discovering new vulnerabilities and implementing security and privacy measures are important to protect systems and data against physical attacks. One such vulnerability is impedance, an inherent property of a device that can be exploited to leak information through an unintended side channel, thereby posing significant security and privacy risks. Unlike traditional vulnerabilities, impedance is often overlooked or narrowly explored, as it is typically treated as a fixed value at a specific frequency in research and design endeavors. Moreover, impedance has never been explored as a source of information leakage. This paper demonstrates that the impedance of an embedded device is not constant and directly relates to the programs executed on the device. We define this phenomenon as impedance leakage and use this as a side channel to extract software instructions from protected memory. Our experiment on the ATmega328P microcontroller and the Artix 7 FPGA indicates that the impedance side channel can detect software instructions with 96.1% and 92.6% accuracy, respectively. Furthermore, we explore the dual nature of the impedance side channel, highlighting the potential for beneficial purposes and the associated risk of intellectual property theft. Finally, potential countermeasures that specifically address impedance leakage are discussed.
△ Less
Submitted 13 December, 2023; v1 submitted 4 October, 2023;
originally announced October 2023.
-
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities
Authors:
Md Sadik Awal,
Christopher Thompson,
Md Tauhidur Rahman
Abstract:
The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop po…
▽ More
The massive trend toward embedded systems introduces new security threats to prevent. Malicious firmware makes it easier to launch cyberattacks against embedded systems. Systems infected with malicious firmware maintain the appearance of normal firmware operation but execute undesirable activities, which is usually a security risk. Traditionally, cybercriminals use malicious firmware to develop possible back-doors for future attacks. Due to the restricted resources of embedded systems, it is difficult to thwart these attacks using the majority of contemporary standard security protocols. In addition, monitoring the firmware operations using existing side channels from outside the processing unit, such as electromagnetic radiation, necessitates a complicated hardware configuration and in-depth technical understanding. In this paper, we propose a physical side channel that is formed by detecting the overall impedance changes induced by the firmware actions of a central processing unit. To demonstrate how this side channel can be exploited for detecting firmware activities, we experimentally validate it using impedance measurements to distinguish between distinct firmware operations with an accuracy of greater than 90%. These findings are the product of classifiers that are trained via machine learning. The implementation of our proposed methodology also leaves room for the use of hardware authentication.
△ Less
Submitted 17 January, 2023;
originally announced January 2023.
-
AFIA: ATPG-Guided Fault Injection Attack on Secure Logic Locking
Authors:
Yadi Zhong,
Ayush Jain,
M. Tanjidur Rahman,
Navid Asadizanjani,
Jiafeng Xie,
Ujjwal Guin
Abstract:
The outsourcing of the design and manufacturing of integrated circuits has raised severe concerns about the piracy of Intellectual Properties and illegal overproduction. Logic locking has emerged as an obfuscation technique to protect outsourced chip designs, where the circuit netlist is locked and can only be functional once a secure key is programmed. However, Boolean Satisfiability-based attack…
▽ More
The outsourcing of the design and manufacturing of integrated circuits has raised severe concerns about the piracy of Intellectual Properties and illegal overproduction. Logic locking has emerged as an obfuscation technique to protect outsourced chip designs, where the circuit netlist is locked and can only be functional once a secure key is programmed. However, Boolean Satisfiability-based attacks have shown to break logic locking, simultaneously motivating researchers to develop more secure countermeasures. In this paper, we present a novel fault injection attack to break any locking technique that relies on a stored secret key, and denote this attack as AFIA, ATPG-guided Fault Injection Attack. The proposed attack is based on sensitizing a key bit to the primary output while injecting faults at a few other key lines that block the propagation of the targeted key bit. AIFA is very effective in determining a key bit as there exists a stuck-at fault pattern that detects a stuck-at 1 (or stuck-at 0) fault at any key line. The average complexity of number of injected faults for AFIA is linear with the key size and requires only |K| test patterns to determine a secret key, K. AFIA requires a fewer number of injected faults to sensitize a bit to the primary output, compared to 2|K|-1 faults for the differential fault analysis attack [26].
△ Less
Submitted 12 October, 2022; v1 submitted 9 June, 2022;
originally announced June 2022.
-
Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips
Authors:
Farah Ferdaus,
B. M. S. Bahar Talukder,
Md Tauhidur Rahman
Abstract:
Electronic counterfeiting is a longstanding problem with adverse long-term effects for many sectors, remaining on the rise. This article presents a novel low-cost technique to embed watermarking in devices with resistive-RAM (ReRAM) by manipulating its analog physical characteristics through switching (set/reset) operation to prevent counterfeiting. We develop a system-level framework to control m…
▽ More
Electronic counterfeiting is a longstanding problem with adverse long-term effects for many sectors, remaining on the rise. This article presents a novel low-cost technique to embed watermarking in devices with resistive-RAM (ReRAM) by manipulating its analog physical characteristics through switching (set/reset) operation to prevent counterfeiting. We develop a system-level framework to control memory cells' physical properties for imprinting irreversible watermarks into commercial ReRAMs that will be retrieved by sensing the changes in cells' physical properties. Experimental results show that our proposed ReRAM watermarking is robust against temperature variation and acceptably fast with ~0.6bit/min of imprinting and ~15.625bits/s of retrieval rates.
△ Less
Submitted 5 April, 2022;
originally announced April 2022.
-
Attacking Deep Learning AI Hardware with Universal Adversarial Perturbation
Authors:
Mehdi Sadi,
B. M. S. Bahar Talukder,
Kaniz Mishty,
Md Tauhidur Rahman
Abstract:
Universal Adversarial Perturbations are image-agnostic and model-independent noise that when added with any image can mislead the trained Deep Convolutional Neural Networks into the wrong prediction. Since these Universal Adversarial Perturbations can seriously jeopardize the security and integrity of practical Deep Learning applications, existing techniques use additional neural networks to detec…
▽ More
Universal Adversarial Perturbations are image-agnostic and model-independent noise that when added with any image can mislead the trained Deep Convolutional Neural Networks into the wrong prediction. Since these Universal Adversarial Perturbations can seriously jeopardize the security and integrity of practical Deep Learning applications, existing techniques use additional neural networks to detect the existence of these noises at the input image source. In this paper, we demonstrate an attack strategy that when activated by rogue means (e.g., malware, trojan) can bypass these existing countermeasures by augmenting the adversarial noise at the AI hardware accelerator stage. We demonstrate the accelerator-level universal adversarial noise attack on several deep Learning models using co-simulation of the software kernel of Conv2D function and the Verilog RTL model of the hardware under the FuseSoC environment.
△ Less
Submitted 17 November, 2021;
originally announced November 2021.
-
A Non-invasive Technique to Detect Authentic/Counterfeit SRAM Chips
Authors:
B. M. S. Bahar Talukder,
Farah Ferdaus,
Md Tauhidur Rahman
Abstract:
Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a…
▽ More
Many commercially available memory chips are fabricated worldwide in untrusted facilities. Therefore, a counterfeit memory chip can easily enter into the supply chain in different formats. Deploying these counterfeit memory chips into an electronic system can severely affect security and reliability domains because of their sub-standard quality, poor performance, and shorter lifespan. Therefore, a proper solution is required to identify counterfeit memory chips before deploying them in mission-, safety-, and security-critical systems. However, a single solution to prevent counterfeiting is challenging due to the diversity of counterfeit types, sources, and refinement techniques. Besides, the chips can pass initial testing and still fail while being used in the system. Furthermore, existing solutions focus on detecting a single counterfeit type (e.g., detecting recycled memory chips). This work proposes a framework that detects major counterfeit static random-access memory (SRAM) types by attesting/identifying the origin of the manufacturer. The proposed technique generates a single signature for a manufacturer and does not require any exhaustive registration/authentication process. We validate our proposed technique using 345 SRAM chips produced by major manufacturers. The silicon results show that the test scores ($F_{1}$ score) of our proposed technique of identifying memory manufacturer and part-number are 93% and 71%, respectively.
△ Less
Submitted 5 May, 2023; v1 submitted 19 July, 2021;
originally announced July 2021.
-
Approximate MRAM: High-performance and Power-efficient Computing with MRAM Chips for Error-tolerant Applications
Authors:
Farah Ferdaus,
B. M. S. Bahar Talukder,
Md Tauhidur Rahman
Abstract:
Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be used to enhance performance and save power significan…
▽ More
Approximate computing (AC) leverages the inherent error resilience and is used in many big-data applications from various domains such as multimedia, computer vision, signal processing, and machine learning to improve systems performance and power consumption. Like many other approximate circuits and algorithms, the memory subsystem can also be used to enhance performance and save power significantly. This paper proposes an efficient and effective systematic methodology to construct an approximate non-volatile magneto-resistive RAM (MRAM) framework using consumer-off-the-shelf (COTS) MRAM chips. In the proposed scheme, an extensive experimental characterization of memory errors is performed by manipulating the write latency of MRAM chips which exploits the inherent (intrinsic/extrinsic process variation) stochastic switching behavior of magnetic tunnel junctions (MTJs). The experimental results and error-resilient image application reveal that the proposed AC framework provides a significant performance improvement and demonstrates a maximum reduction in MRAM write current of ~66% on average with negligible or no loss in output quality.
△ Less
Submitted 14 March, 2022; v1 submitted 28 May, 2021;
originally announced May 2021.
-
True Random Number Generation using Latency Variations of Commercial MRAM Chips
Authors:
Farah Ferdaus,
B. M. S. Bahar Talukder,
Mehdi Sadi,
Md Tauhidur Rahman
Abstract:
The emerging magneto-resistive RAM (MRAM) has considerable potential to become a universal memory technology because of its several advantages: unlimited endurance, lower read/write latency, ultralow-power operation, high-density, and CMOS compatibility, etc. This paper will demonstrate an effective technique to generate random numbers from energy-efficient consumer-off-the-shelf (COTS) MRAM chips…
▽ More
The emerging magneto-resistive RAM (MRAM) has considerable potential to become a universal memory technology because of its several advantages: unlimited endurance, lower read/write latency, ultralow-power operation, high-density, and CMOS compatibility, etc. This paper will demonstrate an effective technique to generate random numbers from energy-efficient consumer-off-the-shelf (COTS) MRAM chips. In the proposed scheme, the inherent (intrinsic/extrinsic process variation) stochastic switching behavior of magnetic tunnel junctions (MTJs) is exploited by manipulating the write latency of COTS MRAM chips. This is the first system-level experimental implementation of true random number generator (TRNG) using COTS toggle MRAM technology to the best of our knowledge. The experimental results and subsequent NIST SP-800-22 suite test reveal that the proposed latency-based TRNG is acceptably fast (~22 Mbit/s in the worst case) and robust over a wide range of operating conditions.
△ Less
Submitted 31 March, 2021;
originally announced April 2021.
-
An Automated Contact Tracing Approach for Controlling Covid-19 Spread Based on Geolocation Data from Mobile Cellular Networks
Authors:
Md. Tanvir Rahman,
Risala T. Khan,
Muhammad R. A. Khandaker,
Md. Sifat Ar Salan
Abstract:
The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant i…
▽ More
The coronavirus (COVID-19) has appeared as the greatest challenge due to its continuous structural evolution as well as the absence of proper antidotes for this particular virus. The virus mainly spreads and replicates itself among mass people through close contact which unfortunately can happen in many unpredictable ways. Therefore, to slow down the spread of this novel virus, the only relevant initiatives are to maintain social distance, perform contact tracing, use proper safety gears, and impose quarantine measures. But despite being theoretically possible, these approaches are very difficult to uphold in densely populated countries and areas. Therefore, to control the virus spread, researchers and authorities are considering the use of smartphone based mobile applications (apps) to identify the likely infected persons as well as the highly risky zones to maintain isolation and lockdown measures. However, these methods heavily depend on advanced technological features and expose significant privacy loopholes. In this paper, we propose a new method for COVID-19 contact tracing based on mobile phone users' geolocation data. The proposed method will help the authorities to identify the number of probable infected persons without using smartphone based mobile applications. In addition, the proposed method can help people take the vital decision of when to seek medical assistance by letting them know whether they are already in the list of exposed persons. Numerical examples demonstrate that the proposed method can significantly outperform the smartphone app-based solutions.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Hardware Trust and Assurance through Reverse Engineering: A Survey and Outlook from Image Analysis and Machine Learning Perspectives
Authors:
Ulbert J. Botero,
Ronald Wilson,
Hangwei Lu,
Mir Tanjidur Rahman,
Mukhil A. Mallaiyan,
Fatemeh Ganji,
Navid Asadizanjani,
Mark M. Tehranipoor,
Damon L. Woodard,
Domenic Forte
Abstract:
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent…
▽ More
In the context of hardware trust and assurance, reverse engineering has been often considered as an illegal action. Generally speaking, reverse engineering aims to retrieve information from a product, i.e., integrated circuits (ICs) and printed circuit boards (PCBs) in hardware security-related scenarios, in the hope of understanding the functionality of the device and determining its constituent components. Hence, it can raise serious issues concerning Intellectual Property (IP) infringement, the (in)effectiveness of security-related measures, and even new opportunities for injecting hardware Trojans. Ironically, reverse engineering can enable IP owners to verify and validate the design. Nevertheless, this cannot be achieved without overcoming numerous obstacles that limit successful outcomes of the reverse engineering process. This paper surveys these challenges from two complementary perspectives: image processing and machine learning. These two fields of study form a firm basis for the enhancement of efficiency and accuracy of reverse engineering processes for both PCBs and ICs. In summary, therefore, this paper presents a roadmap indicating clearly the actions to be taken to fulfill hardware trust and assurance objectives.
△ Less
Submitted 7 April, 2021; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Towards the Avoidance of Counterfeit Memory: Identifying the DRAM Origin
Authors:
B. M. S. Bahar Talukder,
Vineetha Menon,
Biswajit Ray,
Tempestt Neal,
Md Tauhidur Rahman
Abstract:
Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor performance, and shorter life span. Besides, studies sugg…
▽ More
Due to the globalization in the semiconductor supply chain, counterfeit dynamic random-access memory (DRAM) chips/modules have been spreading worldwide at an alarming rate. Deploying counterfeit DRAM modules into an electronic system can have severe consequences on security and reliability domains because of their sub-standard quality, poor performance, and shorter life span. Besides, studies suggest that a counterfeit DRAM can be more vulnerable to sophisticated attacks. However, detecting counterfeit DRAMs is very challenging because of their nature and ability to pass the initial testing. In this paper, we propose a technique to identify the DRAM origin (i.e., the origin of the manufacturer and the specification of individual DRAM) to detect and prevent counterfeit DRAM modules. A silicon evaluation shows that the proposed method reliably identifies off-the-shelf DRAM modules from three major manufacturers.
△ Less
Submitted 8 November, 2019;
originally announced November 2019.
-
Defense-in-Depth: A Recipe for Logic Locking to Prevail
Authors:
M Tanjidur Rahman,
M Sazadur Rahman,
Huanyu Wang,
Shahin Tajik,
Waleed Khalil,
Farimah Farahmandi,
Domenic Forte,
Navid Asadizanjani,
Mark Tehranipoor
Abstract:
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confid…
▽ More
Logic locking has emerged as a promising solution for protecting the semiconductor intellectual Property (IP) from the untrusted entities in the design and fabrication process. Logic locking hides the functionality of the IP by embedding additional key-gates in the circuit. The correct output of the chip is produced, once the correct key value is available at the input of the key-gates. The confidentiality of the key is imperative for the security of the locked IP as it stands as the lone barrier against IP infringement. Therefore, the logic locking is considered as a broken scheme once the key value is exposed. The research community has shown the vulnerability of the logic locking techniques against different classes of attacks, such as Oracle-guided and physical attacks. Although several countermeasures have already been proposed against such attacks, none of them is simultaneously impeccable against Oracle-guided, Oracle-less, and physical attacks. Under such circumstances, a defense-in-depth approach can be considered as a practical approach in addressing the vulnerabilities of logic locking. Defense-in-depth is a multilayer defense approach where several independent countermeasures are implemented in the device to provide aggregated protection against different attack vectors. Introducing such a multilayer defense model in logic locking is the major contribution of this paper. With regard to this, we first identify the core components of logic locking schemes, which need to be protected. Afterwards, we categorize the vulnerabilities of core components according to potential threats for the locking key in logic locking schemes. Furthermore, we propose several defense layers and countermeasures to protect the device from those vulnerabilities. Finally, we turn our focus to open research questions and conclude with suggestions for future research directions.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network
Authors:
Kyle Worley,
Md Tauhidur Rahman
Abstract:
With the globalization of the semiconductor manufacturing process, electronic devices are powerless against malicious modification of hardware in the supply chain. The ever-increasing threat of hardware Trojan attacks against integrated circuits has spurred a need for accurate and efficient detection methods. Ring oscillator network (RON) is used to detect the Trojan by capturing the difference in…
▽ More
With the globalization of the semiconductor manufacturing process, electronic devices are powerless against malicious modification of hardware in the supply chain. The ever-increasing threat of hardware Trojan attacks against integrated circuits has spurred a need for accurate and efficient detection methods. Ring oscillator network (RON) is used to detect the Trojan by capturing the difference in power consumption; the power consumption of a Trojan-free circuit is different from the Trojan-inserted circuit. However, the process variation and measurement noise are the major obstacles to detect hardware Trojan with high accuracy. In this paper, we quantitatively compare four supervised machine learning algorithms and classifier optimization strategies for maximizing accuracy and minimizing the false positive rate (FPR). These supervised learning techniques show an improved false positive rate compared to principal component analysis (PCA) and convex hull classification by nearly 40% while maintaining > 90\% binary classification accuracy.
△ Less
Submitted 11 March, 2019;
originally announced March 2019.
-
Decimeter Ranging with Channel State Information
Authors:
Navid Tadayon,
Muhammed T. Rahman,
Shuo Han,
Shahrokh Valaee,
Wei Yu
Abstract:
This paper aims at the problem of time-of-flight (ToF) estimation using channel state information (CSI) obtainable from commercialized MIMO-OFDM WLAN receivers. It was often claimed that the CSI phase is contaminated with errors of known and unknown natures rendering ToF-based positioning difficult. To search for an answer, we take a bottom-up approach by first understanding CSI, its constituent b…
▽ More
This paper aims at the problem of time-of-flight (ToF) estimation using channel state information (CSI) obtainable from commercialized MIMO-OFDM WLAN receivers. It was often claimed that the CSI phase is contaminated with errors of known and unknown natures rendering ToF-based positioning difficult. To search for an answer, we take a bottom-up approach by first understanding CSI, its constituent building blocks, and the sources of error that contaminate it. We then model these effects mathematically. The correctness of these models is corroborated based on the CSI collected in extensive measurement campaign including radiated, conducted and chamber tests. Knowing the nature of contamination in CSI phase and amplitude, we proceed with introducing pre-processing methods to clean CSI from those errors and make it usable for range estimation. To check the validity of proposed algorithms, the MUSIC super-resolution algorithm is applied to post-processed CSI to perform range estimates. Results substantiate that median accuracy of 0.6m, 0.8m, and 0.9m is achievable in highly multipath line-of-sight environment where transmitter and receiver are 5m, 10m, and 15m apart.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Interference Mitigation and Capacity Enhancement based on Dynamic Frequency Reuse for Femtocell Networks
Authors:
Md. Tashikur Rahman,
Md. Didarul Alam,
Mostafa Zaman Chowdhury
Abstract:
Wireless networks employing small cells like femtocells are considered to be the choice of network deployment for 4G or advanced networks. This hierarchical deployment of cells introduces the necessity of effective frequency planning for mitigation of interference between different layers of network. As the scarce spectrum resources are likely to be reused to increase spectral efficiency, interfer…
▽ More
Wireless networks employing small cells like femtocells are considered to be the choice of network deployment for 4G or advanced networks. This hierarchical deployment of cells introduces the necessity of effective frequency planning for mitigation of interference between different layers of network. As the scarce spectrum resources are likely to be reused to increase spectral efficiency, interference free signal reception has to be guaranteed to ensure better quality of service (QoS). In this paper we propose a dynamic frequency reuse scheme for the deployment of femtocells within a macrocell with the femtocells reusing the spectrum of neighbouring macrocells. We also provide a protective scheme for cell edge femtocell users as they are vulnerable to interference signals from neighbouring macrocells. A detailed frequency planning is provided to maximize spectral reuse while providing maximum throughput. We compare our proposed scheme with other frequency allocation schemes already described in literature. Simulation results shows that our scheme provides better throughput and ensures lower outage probability.
△ Less
Submitted 5 October, 2018;
originally announced October 2018.
-
PreLatPUF: Exploiting DRAM Latency Variations for Generating Robust Device Signatures
Authors:
B. M. S. Bahar Talukder,
Biswajit Ray,
Domenic Forte,
Md Tauhidur Rahman
Abstract:
Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data),…
▽ More
Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Dynamic random-access memory (DRAM) has been proposed as one of the promising candidates for generating robust keys. Unfortunately, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data), and disruptive to system operation. In this paper, we propose \textit{precharge} latency-based PUF (PreLatPUF) that exploits DRAM \textit{precharge} latency variations to generate signatures. The proposed PreLatPUF is fast, robust, least disruptive, and non-destructive. The silicon results from commercially available $DDR3$ chips from different manufacturers show that the proposed key generation technique is at least $ \sim 1,192X$ faster than the existing approaches, while reliably reproducing the key in extreme operating conditions.
△ Less
Submitted 31 July, 2019; v1 submitted 7 August, 2018;
originally announced August 2018.
-
Exploiting DRAM Latency Variations for Generating True Random Numbers
Authors:
B. M. S. Bahar Talukder,
Joseph Kerns,
Biswajit Ray,
Thomas Morris,
Md Tauhidur Rahman
Abstract:
True random number generator (TRNG) plays a vital role in a variety of security applications and protocols. The security and privacy of an asset rely on the encryption, which solely depends on the quality of random numbers. Memory chips are widely used for generating random numbers because of their prevalence in modern electronic systems. Unfortunately, existing Dynamic Random-access Memory (DRAM)…
▽ More
True random number generator (TRNG) plays a vital role in a variety of security applications and protocols. The security and privacy of an asset rely on the encryption, which solely depends on the quality of random numbers. Memory chips are widely used for generating random numbers because of their prevalence in modern electronic systems. Unfortunately, existing Dynamic Random-access Memory (DRAM)-based TRNGs produce random numbers with either limited entropy or poor throughput. In this paper, we propose a DRAM-latency based TRNG that generates high-quality random numbers. The silicon results from Samsung and Micron DDR3 DRAM modules show that our proposed DRAM-latency based TRNG is robust (against different operating conditions and environmental variations) and acceptably fast.
△ Less
Submitted 7 November, 2018; v1 submitted 6 August, 2018;
originally announced August 2018.
-
Checkpointing to minimize completion time for Inter-dependent Parallel Processes on Volunteer Grids
Authors:
Mohammad Tanvir Rahman,
Hien Nguyen,
Jaspal Subhlok,
Gopal Pandurangan
Abstract:
Volunteer computing is being used successfully for large scale scientific computations. This research is in the context of Volpex, a programming framework that supports communicating parallel processes in a volunteer environment. Redundancy and checkpointing are combined to ensure consistent forward progress with Volpex in this unique execution environment characterized by heterogeneous failure pr…
▽ More
Volunteer computing is being used successfully for large scale scientific computations. This research is in the context of Volpex, a programming framework that supports communicating parallel processes in a volunteer environment. Redundancy and checkpointing are combined to ensure consistent forward progress with Volpex in this unique execution environment characterized by heterogeneous failure prone nodes and interdependent replicated processes. An important parameter for optimizing performance with Volpex is the frequency of checkpointing. The paper presents a mathematical model to minimize the completion time for inter-dependent parallel processes running in a volunteer environment by finding a suitable checkpoint interval. Validation is performed with a sample real world application running on a pool of distributed volunteer nodes. The results indicate that the performance with our predicted checkpoint interval is fairly close to the best performance obtained empirically by varying the checkpoint interval.
△ Less
Submitted 10 March, 2016;
originally announced March 2016.
-
Review Study For Inter-Operability Of Manet Protocols In Wireless Sensor Networks
Authors:
Gurpreet Singh Saini,
Priyanka Dubey,
Md Tanzilur Rahman
Abstract:
Wireless Networks are most appealing in terms of deployment over a wide range of applications. The key areas are disaster management, industrial unit automation and battlefield surveillance. The paper presents a study over inter-operability of MANET (Mobile Ad-Hoc Network) protocols i.e DSDV, OLSR, ZRP, AODV over WSN (Wireless Sensor Network) [10]. The review here covers all the prevailing protoco…
▽ More
Wireless Networks are most appealing in terms of deployment over a wide range of applications. The key areas are disaster management, industrial unit automation and battlefield surveillance. The paper presents a study over inter-operability of MANET (Mobile Ad-Hoc Network) protocols i.e DSDV, OLSR, ZRP, AODV over WSN (Wireless Sensor Network) [10]. The review here covers all the prevailing protocol solutions for WSN and deployment of MANET protocols over them. The need of moving to MANET protocols lie in situation when we talk about mobile sensory nodes which are a compulsion when we talk about the above mentioned three areas. However, the deployment may not be limited to these only.
△ Less
Submitted 21 June, 2013;
originally announced June 2013.