(Back to Session Schedule)

The 20th Asia and South Pacific Design Automation Conference

Session 9C  Building Secure Systems
Time: 15:50 - 17:30 Thursday, January 22, 2015
Location: Room 105
Chairs: Wenjing Rao (University of Illinois, Chicago, U.S.A.), Sandip Ray (Intel Corporation, Portland, U.S.A.)

9C-1 (Time: 15:50 - 16:15)
TitleTiming-Based Anomaly Detection in Embedded Systems
AuthorSixing Lu, Minjun Seo, *Roman Lysecky (University of Arizona, U.S.A.)
Pagepp. 809 - 814
KeywordNon-intrusive monitoring, anomaly detection, mimicry attack
AbstractRecent research has demonstrated that many systems are vulnerable to numerous types of malicious activity. As the pervasiveness of embedded systems with network connectivity continues to increase, embedded systems security has become a critical challenge. However, most existing techniques for detecting malware utilize software-based methods that incur significant performance overheads that are often not feasible in embedded systems. In this paper, we present an overview of a novel method for non-intrusively detecting malware in embedded system. The proposed technique utilizes timing requirements to improve detection performance and provide increased resilience to mimicry attacks.
Slides

9C-2 (Time: 16:15 - 16:40)
TitleSatisfiability Don't Care Condition Based Circuit Fingerprinting Techniques
Author*Carson J Dunbar, Gang Qu (University of Maryland, U.S.A.)
Pagepp. 815 - 820
KeywordSDC, fingerprint, IP, SoC
AbstractCircuit fingerprints allow the authors of design intellectual properties (IPs) to trace each copy of their IPs by embedding features, known as digital fingerprints, which are unique to each device. In this paper, we propose a novel gate replacement approach to encode fingerprints based on the inherent Satisfiability Don’t Care (SDC) conditions in the circuit. Moreover, existing fingerprinting schemes all require redesign of the circuit which makes it prohibitively expensive for manufacturing. We develop a practical method to implement our SDC-based circuit fingerprint. First, we introduce flexibilities during the logic synthesis phase by replacing certain library cells with versatile multiplexers (MUXs). The MUX can be configured either as the original gate or one of its replacements with identical functionality except the SDC conditions. Then at the post-silicon stage, we configure these MUXs to create distinct fingerprints. We consider standard benchmark circuits and demonstrate that even on these circuits with limited size, we can find sufficient locations to embed fingerprints. Simulation with TSMC 0.35μm technology shows non-trivial design overhead, however, such overhead will become negligible for large real-life circuits.
Slides

9C-3 (Time: 16:40 - 17:05)
TitleIC Piracy Prevention via Design Withholding and Entanglement
AuthorSoroush Khaleghi, Kai Da Zhao, *Wenjing Rao (University of Illinois at Chicago, U.S.A.)
Pagepp. 821 - 826
KeywordHardware Security, IC Piracy, Reverse Engineering, Design Withholding
AbstractGlobalization of the semiconductor industry has raised serious concerns about trustworthy hardware. Particularly, an untrusted manufacturer can steal the information of a design (Reverse Engineering), and/or produce extra chips illegally (IC Piracy). Among many candidates that address these attacks, Design Withholding techniques work by replacing a part of the design with a reconfigurable block on chip, so that none of the manufactured chips will function properly until they are activated in a trusted facility, where the withheld function is restored back into the reconfigurable block on chip. However, most existing approaches are ad-hoc based, and are facing two major challenges: 1) susceptibility to a category of algorithmic attacks, from attackers in a strong position, such as a manufacturer; and 2) scaling up the defense level is checkmated by the explosion of hardware cost that has to be paid at the designer’s side. In this paper, we propose a novel protection scheme, called Entanglement, which can substantially strengthen the Design Withholding framework: 1) the algorithmic attacks are prevented by forcing the attacker to solve a huge number of problems of high computational complexity; 2) the attack cost (in terms of computational complexity) is quantitatively controllable at the designer’s end, with low hardware overhead: while the cost of attack can be increased exponentially, the hardware overhead imposed on the designer’s side grows only linearly. The proposed work distinguishes itself from the previous works by not relying on the difficulty of finding the solution for some NP-Complete/NP-Hard problems, but rather, on the exponentially boosted number of such problems that an attacker has to solve, while carefully maintaining the growth of the hardware overhead to be scalable via Entanglement.
Slides

9C-4 (Time: 17:05 - 17:30)
TitleVulnerability Analysis for Crypto Devices against Probing Attack
Author*Lingxiao Wei, Jie Zhang, Feng Yuan, Yannan Liu (The Chinese University of Hong Kong, Hong Kong), Junfeng Fan (Open Security Research, China), Qiang Xu (The Chinese University of Hong Kong, Hong Kong)
Pagepp. 827 - 832
KeywordProbing Attack, Vulnerability Analysis, Crypto Devices
AbstractProbing attack is a severe threat for the security of hardware cryptographic modules (HCMs). In this paper, we make the first step to evaluate the vulnerability of HCMs against probing attack, wherein we investigate the probing complexity and the key candidate reduction capability for probing attack on every signal in the circuit. We also present approximate solutions for the calculation of the proposed metrics to reduce computational complexity. Experimental results demonstrate that the proposed evaluation metric is both effective and efficient.