Collaborative Research: SaTC: CORE: Small: ERADICATOR: Techniques for Laser Assisted Side-Channel Attack Monitor & Response

协作研究:SaTC:核心:小型:ERADICATOR:激光辅助侧信道攻击监控技术

基本信息

  • 批准号:
    2150122
  • 负责人:
  • 金额:
    $ 23.37万
  • 依托单位:
  • 依托单位国家:
    美国
  • 项目类别:
    Standard Grant
  • 财政年份:
    2022
  • 资助国家:
    美国
  • 起止时间:
    2022-06-15 至 2025-05-31
  • 项目状态:
    未结题

项目摘要

The security of modern electronic systems relies on secret keys and assets stored on secure integrated circuits (ICs). Extracting such information using side-channel attacks would break the security of the entire system. One class of side-channel attacks relies on known laser techniques from the field of IC failure analysis, which makes the contactless probing of on-chip data possible. These optical probing attacks are so powerful in extracting secrets from computer chips that conventional countermeasures are ineffective against them. It has been demonstrated that these attacks can be accomplished in a matter of days (from initial analysis of IC activity to full data extraction), even with limited knowledge of the chip under attack. This leaves some of our most critical commercial, industrial, and defense systems vulnerable to intellectual property piracy and sensitive data breaches. Hence, the threats of laser-assisted side-channel attacks warrant an effective response to protect assets stored in ICs. Unfortunately, few countermeasures have been proposed in the academic literature, and none are available commercially. Those that do exist are not only expensive but are incompatible with current IC manufacturing processes. This project investigates ERADICATOR, a multi-layer suite of sensors, randomization, and tamper response mechanisms, to avert laser-assisted side-channel attacks. The project's novelties are that ERADICATOR not only revisits traditional design philosophies to build comprehensive and unbreakable protection mechanisms but also draws upon solutions from multiple disciplines, such as physics, IC design, and cryptography. All layers of the countermeasures will be suitable for application-specific integrated circuits (ASICs), but some will also apply to field programmable gate arrays (FPGAs). Moreover, this project explores the feasibility of having an open-source simulator for laser-assisted side-channel attacks that all researchers and practitioners can use to assess the security of their designs in the pre-silicon phase, and hence, choose the proper countermeasures. The project's broader significance and importance are the systematization of knowledge and exploration of novel laser attack countermeasures for electronic systems used in various applications, such as critical infrastructure, autonomous vehicles, aerospace, and defense equipment.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
现代电子系统的安全依赖于存储在安全集成电路(ICS)上的秘密密钥和资产。使用侧通道攻击提取此类信息将破坏整个系统的安全性。一类侧通道攻击依赖于IC失败分析领域的已知激光技术,这使得无接触式芯片数据的探测成为可能。这些光学探测攻击在从计算机芯片中提取秘密方面非常有力,以至于传统的对策对它们无效。已经证明,这些攻击可以在几天之内完成(从对IC活动的初始分析到完整数据提取),即使对芯片受到攻击的了解有限。这留下了我们一些最关键的商业,工业和防御系统,容易受到知识产权盗版和敏感数据泄露的影响。因此,激光辅助的侧通道攻击的威胁需要有效的回应,以保护IC中存储的资产。不幸的是,学术文献中很少有人提出对策,并且商业上没有任何对策。确实存在的不仅昂贵,而且与当前的IC制造过程不相容。该项目调查了Eradicator,这是一套多层传感器,随机化和篡改响应机制,以避免激光辅助侧向通道攻击。该项目的新颖性是消除器不仅重新审视了传统的设计理念,以建立全面且坚不可摧的保护机制,而且还利用了来自多个学科的解决方案,例如物理,IC设计和密码学。所有对策的所有层都适用于特定于应用的集成电路(ASIC),但有些也适用于现场可编程门阵列(FPGA)。此外,该项目探讨了为激光辅助侧渠道攻击提供开源模拟器的可行性,所有研究人员和从业人员都可以用来评估其在Silicon阶段的设计安全性,因此选择适当的对策。该项目的更广泛的意义和重要性是对用于各种应用中使用的电子系统的知识和探索的系统化,例如关键基础设施,自动驾驶汽车,航空航天和国防设备。这奖反映了NSF的法定任务,并通过使用基础的智能效果和广泛的范围来评估,并被视为值得通过评估来进行评估。

项目成果

期刊论文数量(4)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities
A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack
Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch
通过自毁式多态锁存器防御物理攻击
Polymorphic Sensor to Detect Laser Logic State Imaging Attack
用于检测激光逻辑状态成像攻击的多态传感器
{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Domenic Forte其他文献

EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs
EMFORCED:基于 EM 的防伪指纹识别框架,并在标记和克隆 IC 上进行演示
  • DOI:
  • 发表时间:
    2018
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Andrew Stern;Ulbert J. Botero;Bicky Shakya;Haoting Shen;Domenic Forte;M. Tehranipoor
  • 通讯作者:
    M. Tehranipoor
Design of Accurate Low-Cost On-Chip Structures for Protecting Integrated Circuits Against Recycling
用于保护集成电路免遭回收的精确低成本片上结构设计
Systematic Correlation and Cell Neighborhood Analysis of SRAM PUF for Robust and Unique Key Generation
SRAM PUF 的系统相关性和单元邻域分析,用于稳健且独特的密钥生成
  • DOI:
    10.1007/s41635-017-0012-3
  • 发表时间:
    2017
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Md. Tauhidur Rahman;Alison Hosey;Zimu Guo;Jackson Carroll;Domenic Forte;M. Tehranipoor
  • 通讯作者:
    M. Tehranipoor
Probing Assessment Framework and Evaluation of Antiprobing Solutions
探测评估框架和反探测解决方案评估
Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
硬件混淆简介:动机、方法和评估
  • DOI:
  • 发表时间:
    2017
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Bicky Shakya;M. Tehranipoor;S. Bhunia;Domenic Forte
  • 通讯作者:
    Domenic Forte

Domenic Forte的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Domenic Forte', 18)}}的其他基金

CAMO: Counterfeit Attestation MOdule for Electronics Supply Chain Tracking and Provenance
CAMO:用于电子供应链跟踪和来源的防伪认证模块
  • 批准号:
    2341895
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
NSF Student Travel Grant for 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST): San Jose, CA - May 2020
NSF 学生旅费资助 2020 年 IEEE 国际硬件导向安全与信任研讨会 (HOST):加利福尼亚州圣何塞 - 2020 年 5 月
  • 批准号:
    2002804
  • 财政年份:
    2019
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
CAREER: Transformative Approaches for Hardware Obfuscation Protection, Attacks, and Assessment
职业:硬件混淆保护、攻击和评估的变革性方法
  • 批准号:
    1651701
  • 财政年份:
    2017
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
SaTC: STARSS: Small: iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks
SaTC:STARSS:小型:iPROBE - 一种用于防止正面和背面探测攻击的内部屏蔽方法
  • 批准号:
    1717392
  • 财政年份:
    2017
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
Combating Counterfeit Analog and Mixed Signal ICs with Lightweight Embedded Mechanisms and Innovative Electrical Tests
利用轻量级嵌入式机制和创新电气测试打击假冒模拟和混合信号 IC
  • 批准号:
    1610075
  • 财政年份:
    2016
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
SHF: Small: GOALI: Advanced Physical Inspection of Counterfeit Integrated Circuits
SHF:小型:GOALI:假冒集成电路的高级物理检测
  • 批准号:
    1559772
  • 财政年份:
    2015
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
SHF: Small: GOALI: Advanced Physical Inspection of Counterfeit Integrated Circuits
SHF:小型:GOALI:假冒集成电路的高级物理检测
  • 批准号:
    1423282
  • 财政年份:
    2014
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant

相似国自然基金

钛基骨植入物表面电沉积镁氢涂层及其促成骨性能研究
  • 批准号:
    52371195
  • 批准年份:
    2023
  • 资助金额:
    50 万元
  • 项目类别:
    面上项目
CLMP介导Connexin45-β-catenin复合体对先天性短肠综合征的致病机制研究
  • 批准号:
    82370525
  • 批准年份:
    2023
  • 资助金额:
    49 万元
  • 项目类别:
    面上项目
人工局域表面等离激元高灵敏传感及其系统小型化的关键技术研究
  • 批准号:
    62371132
  • 批准年份:
    2023
  • 资助金额:
    49 万元
  • 项目类别:
    面上项目
优先流对中俄原油管道沿线多年冻土水热稳定性的影响机制研究
  • 批准号:
    42301138
  • 批准年份:
    2023
  • 资助金额:
    30 万元
  • 项目类别:
    青年科学基金项目
用于稳定锌负极的界面层/电解液双向调控研究
  • 批准号:
    52302289
  • 批准年份:
    2023
  • 资助金额:
    30 万元
  • 项目类别:
    青年科学基金项目

相似海外基金

Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317232
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
  • 批准号:
    2330940
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338301
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317233
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338302
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了