Collaborative Research: SaTC: CORE: Small: ERADICATOR: Techniques for Laser Assisted Side-Channel Attack Monitor & Response

协作研究:SaTC:核心:小型:ERADICATOR:激光辅助侧信道攻击监控技术

基本信息

  • 批准号:
    2150122
  • 负责人:
  • 金额:
    $ 23.37万
  • 依托单位:
  • 依托单位国家:
    美国
  • 项目类别:
    Standard Grant
  • 财政年份:
    2022
  • 资助国家:
    美国
  • 起止时间:
    2022-06-15 至 2025-05-31
  • 项目状态:
    未结题

项目摘要

The security of modern electronic systems relies on secret keys and assets stored on secure integrated circuits (ICs). Extracting such information using side-channel attacks would break the security of the entire system. One class of side-channel attacks relies on known laser techniques from the field of IC failure analysis, which makes the contactless probing of on-chip data possible. These optical probing attacks are so powerful in extracting secrets from computer chips that conventional countermeasures are ineffective against them. It has been demonstrated that these attacks can be accomplished in a matter of days (from initial analysis of IC activity to full data extraction), even with limited knowledge of the chip under attack. This leaves some of our most critical commercial, industrial, and defense systems vulnerable to intellectual property piracy and sensitive data breaches. Hence, the threats of laser-assisted side-channel attacks warrant an effective response to protect assets stored in ICs. Unfortunately, few countermeasures have been proposed in the academic literature, and none are available commercially. Those that do exist are not only expensive but are incompatible with current IC manufacturing processes. This project investigates ERADICATOR, a multi-layer suite of sensors, randomization, and tamper response mechanisms, to avert laser-assisted side-channel attacks. The project's novelties are that ERADICATOR not only revisits traditional design philosophies to build comprehensive and unbreakable protection mechanisms but also draws upon solutions from multiple disciplines, such as physics, IC design, and cryptography. All layers of the countermeasures will be suitable for application-specific integrated circuits (ASICs), but some will also apply to field programmable gate arrays (FPGAs). Moreover, this project explores the feasibility of having an open-source simulator for laser-assisted side-channel attacks that all researchers and practitioners can use to assess the security of their designs in the pre-silicon phase, and hence, choose the proper countermeasures. The project's broader significance and importance are the systematization of knowledge and exploration of novel laser attack countermeasures for electronic systems used in various applications, such as critical infrastructure, autonomous vehicles, aerospace, and defense equipment.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
现代电子系统的安全依赖于存储在安全集成电路 (IC) 上的密钥和资产。使用旁道攻击提取此类信息会破坏整个系统的安全性。一类侧信道攻击依赖于 IC 故障分析领域已知的激光技术,这使得对片上数据的非接触式探测成为可能。这些光学探测攻击在从计算机芯片中提取秘密方面非常强大,以至于传统的对策对其无效。事实证明,即使对受攻击芯片的了解有限,这些攻击也可以在几天内完成(从 IC 活动的初步分析到完整的数据提取)。这使得我们一些最关键的商业、工业和国防系统容易受到知识产权盗版和敏感数据泄露的影响。因此,激光辅助旁道攻击的威胁需要采取有效的应对措施来保护存储在 IC 中的资产。不幸的是,学术文献中提出的对策很少,而且也没有商业可用的对策。现有的那些不仅价格昂贵,而且与当前的 IC 制造工艺不兼容。该项目研究 ERADICATOR,这是一套多层传感器、随机化和篡改响应机制,以避免激光辅助的旁道攻击。该项目的新颖之处在于,ERADICATOR不仅重新审视传统的设计理念,构建全面且牢不可破的保护机制,而且还借鉴了物理、IC设计和密码学等多个学科的解决方案。所有层级的对策都将适用于专用集成电路(ASIC),但有些也适用于现场可编程门阵列(FPGA)。此外,该项目探索了用于激光辅助旁道攻击的开源模拟器的可行性,所有研究人员和从业者都可以使用它来评估其设计在硅前阶段的安全性,从而选择适当的对策。该项目更广泛的意义和重要性在于对用于各种应用(例如关键基础设施、自动驾驶车辆、航空航天和国防设备)的电子系统的新型激光攻击对抗知识进行系统化和探索。该奖项反映了 NSF 的法定使命,并被视为值得通过使用基金会的智力优点和更广泛的影响审查标准进行评估来支持。

项目成果

期刊论文数量(4)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Polymorphic Sensor to Detect Laser Logic State Imaging Attack
用于检测激光逻辑状态成像攻击的多态传感器
A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack
一种基于双重时钟和电压的激光逻辑状态成像攻击检测方法
Protection Against Physical Attacks Through Self-Destructive Polymorphic Latch
通过自毁式多态锁存器防御物理攻击
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities
针对物理攻击的硬件移动目标防御:设计挑战和机遇
  • DOI:
    10.1145/3560828.3564010
  • 发表时间:
    2022-11
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Koblah, David S.;Ganji, Fatemeh;Forte, Domenic;Tajik, Shahin
  • 通讯作者:
    Tajik, Shahin
{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Domenic Forte其他文献

Counterfeit Integrated Circuits
假冒集成电路
  • DOI:
    10.1007/978-3-319-11824-6_2
  • 发表时间:
    2024-09-14
  • 期刊:
  • 影响因子:
    0
  • 作者:
    M. Tehranipoor;Ujjwal Guin;Domenic Forte
  • 通讯作者:
    Domenic Forte
Nowhere to Hide: Monitoring Side Channels for Supply Chain Resiliency
无处可藏:监控侧渠道以提高供应链弹性
  • DOI:
    10.1109/mrl.2024.3388408
  • 发表时间:
    2024-06-01
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Domenic Forte;Ben Amaba;Cate Richards;Jeff Daniels
  • 通讯作者:
    Jeff Daniels
CSST: Preventing distribution of unlicensed and rejected ICs by untrusted foundry and assembly
CSST:防止不受信任的代工和组装分销未经许可和被拒绝的 IC
Automated Defective Pin Detection for Recycled Microelectronics Identification
用于回收微电子识别的自动缺陷引脚检测
  • DOI:
    10.1007/s41635-019-00069-7
  • 发表时间:
    2019-05-08
  • 期刊:
  • 影响因子:
    0
  • 作者:
    P. Ghosh;Aritra Bhattacharya;Domenic Forte;R. Chakraborty
  • 通讯作者:
    R. Chakraborty
Introduction to Hardware Obfuscation: Motivation, Methods and Evaluation
硬件混淆简介:动机、方法和评估
  • DOI:
  • 发表时间:
    2017
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Bicky Shakya;M. Tehranipoor;S. Bhunia;Domenic Forte
  • 通讯作者:
    Domenic Forte

Domenic Forte的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Domenic Forte', 18)}}的其他基金

CAMO: Counterfeit Attestation MOdule for Electronics Supply Chain Tracking and Provenance
CAMO:用于电子供应链跟踪和来源的防伪认证模块
  • 批准号:
    2341895
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
NSF Student Travel Grant for 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST): San Jose, CA - May 2020
NSF 学生旅费资助 2020 年 IEEE 国际硬件导向安全与信任研讨会 (HOST):加利福尼亚州圣何塞 - 2020 年 5 月
  • 批准号:
    2002804
  • 财政年份:
    2019
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
CAREER: Transformative Approaches for Hardware Obfuscation Protection, Attacks, and Assessment
职业:硬件混淆保护、攻击和评估的变革性方法
  • 批准号:
    1651701
  • 财政年份:
    2017
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
SaTC: STARSS: Small: iPROBE - An Internal Shielding Approach for Protecting against Frontside and Backside Probing Attacks
SaTC:STARSS:小型:iPROBE - 一种用于防止正面和背面探测攻击的内部屏蔽方法
  • 批准号:
    1717392
  • 财政年份:
    2017
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
Combating Counterfeit Analog and Mixed Signal ICs with Lightweight Embedded Mechanisms and Innovative Electrical Tests
利用轻量级嵌入式机制和创新电气测试打击假冒模拟和混合信号 IC
  • 批准号:
    1610075
  • 财政年份:
    2016
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
SHF: Small: GOALI: Advanced Physical Inspection of Counterfeit Integrated Circuits
SHF:小型:GOALI:假冒集成电路的高级物理检测
  • 批准号:
    1559772
  • 财政年份:
    2015
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant
SHF: Small: GOALI: Advanced Physical Inspection of Counterfeit Integrated Circuits
SHF:小型:GOALI:假冒集成电路的高级物理检测
  • 批准号:
    1423282
  • 财政年份:
    2014
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Standard Grant

相似国自然基金

IGF-1R调控HIF-1α促进Th17细胞分化在甲状腺眼病发病中的机制研究
  • 批准号:
    82301258
  • 批准年份:
    2023
  • 资助金额:
    30 万元
  • 项目类别:
    青年科学基金项目
CTCFL调控IL-10抑制CD4+CTL旁观者激活促口腔鳞状细胞癌新辅助免疫治疗抵抗机制研究
  • 批准号:
    82373325
  • 批准年份:
    2023
  • 资助金额:
    49 万元
  • 项目类别:
    面上项目
RNA剪接因子PRPF31突变导致人视网膜色素变性的机制研究
  • 批准号:
    82301216
  • 批准年份:
    2023
  • 资助金额:
    30 万元
  • 项目类别:
    青年科学基金项目
血管内皮细胞通过E2F1/NF-kB/IL-6轴调控巨噬细胞活化在眼眶静脉畸形中的作用及机制研究
  • 批准号:
    82301257
  • 批准年份:
    2023
  • 资助金额:
    30 万元
  • 项目类别:
    青年科学基金项目
基于多元原子间相互作用的铝合金基体团簇调控与强化机制研究
  • 批准号:
    52371115
  • 批准年份:
    2023
  • 资助金额:
    50 万元
  • 项目类别:
    面上项目

相似海外基金

Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317232
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338302
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
  • 批准号:
    2330940
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
  • 批准号:
    2330941
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317233
  • 财政年份:
    2024
  • 资助金额:
    $ 23.37万
  • 项目类别:
    Continuing Grant
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了