Collaborative Research: SaTC: CORE: Small: ERADICATOR: Techniques for Laser Assisted Side-Channel Attack Monitor & Response

协作研究:SaTC:核心:小型:ERADICATOR:激光辅助侧信道攻击监控技术

基本信息

  • 批准号:
    2150123
  • 负责人:
  • 金额:
    $ 26.35万
  • 依托单位:
  • 依托单位国家:
    美国
  • 项目类别:
    Standard Grant
  • 财政年份:
    2022
  • 资助国家:
    美国
  • 起止时间:
    2022-06-15 至 2025-05-31
  • 项目状态:
    未结题

项目摘要

The security of modern electronic systems relies on secret keys and assets stored on secure integrated circuits (ICs). Extracting such information using side-channel attacks would break the security of the entire system. One class of side-channel attacks relies on known laser techniques from the field of IC failure analysis, which makes the contactless probing of on-chip data possible. These optical probing attacks are so powerful in extracting secrets from computer chips that conventional countermeasures are ineffective against them. It has been demonstrated that these attacks can be accomplished in a matter of days (from initial analysis of IC activity to full data extraction), even with limited knowledge of the chip under attack. This leaves some of our most critical commercial, industrial, and defense systems vulnerable to intellectual property piracy and sensitive data breaches. Hence, the threats of laser-assisted side-channel attacks warrant an effective response to protect assets stored in ICs. Unfortunately, few countermeasures have been proposed in the academic literature, and none are available commercially. Those that do exist are not only expensive but are incompatible with current IC manufacturing processes. This project investigates ERADICATOR, a multi-layer suite of sensors, randomization, and tamper response mechanisms, to avert laser-assisted side-channel attacks. The project's novelties are that ERADICATOR not only revisits traditional design philosophies to build comprehensive and unbreakable protection mechanisms but also draws upon solutions from multiple disciplines, such as physics, IC design, and cryptography. All layers of the countermeasures will be suitable for application-specific integrated circuits (ASICs), but some will also apply to field programmable gate arrays (FPGAs). Moreover, this project explores the feasibility of having an open-source simulator for laser-assisted side-channel attacks that all researchers and practitioners can use to assess the security of their designs in the pre-silicon phase, and hence, choose the proper countermeasures. The project's broader significance and importance are the systematization of knowledge and exploration of novel laser attack countermeasures for electronic systems used in various applications, such as critical infrastructure, autonomous vehicles, aerospace, and defense equipment.This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
现代电子系统的安全性依赖于存储在安全集成电路(ic)上的密钥和资产。使用侧信道攻击提取此类信息将破坏整个系统的安全性。一类侧通道攻击依赖于IC失效分析领域的已知激光技术,这使得对片上数据的非接触式探测成为可能。这些光学探测攻击在从计算机芯片中提取机密方面是如此强大,以至于传统的对抗措施对它们无效。已经证明,这些攻击可以在几天内完成(从IC活动的初始分析到完整的数据提取),即使对受攻击的芯片了解有限。这使得我们一些最关键的商业、工业和国防系统容易受到知识产权盗版和敏感数据泄露的攻击。因此,激光辅助侧信道攻击的威胁需要有效的响应来保护存储在ic中的资产。不幸的是,在学术文献中几乎没有提出对策,而且没有一个是商业上可用的。那些确实存在的不仅昂贵,而且与当前的集成电路制造工艺不兼容。该项目研究了radicator,一套多层传感器、随机化和篡改响应机制,以避免激光辅助的侧信道攻击。该项目的新颖之处在于,ERADICATOR不仅重新审视了传统的设计理念,以建立全面而牢不可破的保护机制,而且还借鉴了物理学、IC设计和密码学等多学科的解决方案。所有的对抗层都将适用于特定应用的集成电路(asic),但有些也将适用于现场可编程门阵列(fpga)。此外,该项目探讨了为激光辅助侧信道攻击提供开源模拟器的可行性,所有研究人员和从业人员都可以使用该模拟器来评估其设计在预硅阶段的安全性,从而选择适当的对策。该项目的更广泛的意义和重要性是知识的系统化和探索用于各种应用的电子系统的新型激光攻击对策,如关键基础设施、自动驾驶汽车、航空航天和国防设备。该奖项反映了美国国家科学基金会的法定使命,并通过使用基金会的知识价值和更广泛的影响审查标准进行评估,被认为值得支持。

项目成果

期刊论文数量(6)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
Hardware Moving Target Defenses against Physical Attacks: Design Challenges and Opportunities
Polymorphic Sensor to Detect Laser Logic State Imaging Attack
用于检测激光逻辑状态成像攻击的多态传感器
LeakyOhm: Secret Bits Extraction using Impedance Analysis
Electrons Vs. Photons: Assessment of Circuit’s Activity Requirements for E-Beam and Optical Probing Attacks
电子与。
  • DOI:
    10.31399/asm.cp.istfa2023p0339
  • 发表时间:
    2023
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Amini, Elham;Kiyan, Tuba;Renkes, Lars;Krachenfels, Thilo;Boit, Christian;Seifert, Jean-Pierre;Jatzkowski, Jörg;Altmann, Frank;Brand, Sebastian;Tajik, Shahin
  • 通讯作者:
    Tajik, Shahin
A Twofold Clock and Voltage-Based Detection Method for Laser Logic State Imaging Attack
{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Shahin Tajik其他文献

Emission Analysis of Hardware Implementations
硬件实现的排放分析
PUFMon: Security monitoring of FPGAs using physically unclonable functions
PUFMon:使用物理上不可克隆的功能对 FPGA 进行安全监控
Key Extraction Using Thermal Laser Stimulation
使用热激光刺激提取密钥
Multi-sensor Finger Ring for Authentication Based on 3D Signatures
基于 3D 签名的多传感器指环认证
  • DOI:
    10.1007/978-3-319-07230-2_13
  • 发表时间:
    2014
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Mehran Roshandel;Aarti Munjal;Peyman Moghadam;Shahin Tajik;Hamed Ketabdar
  • 通讯作者:
    Hamed Ketabdar
Trojan Awakener: Detecting Dormant Malicious Hardware Using Laser Logic State Imaging
Trojan Awakener:使用激光逻辑状态成像检测休眠的恶意硬件

Shahin Tajik的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Shahin Tajik', 18)}}的其他基金

CAREER: Toward Power Delivery Network-aware Hardware Security
职业:迈向电力传输网络感知硬件安全
  • 批准号:
    2338069
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Travel: NSF Student Travel Grant for 2024 New England Hardware Security Day (NEHWS2024)
旅行:2024 年新英格兰硬件安全日 NSF 学生旅行补助金 (NEHWS2024)
  • 批准号:
    2420415
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Standard Grant

相似国自然基金

Research on Quantum Field Theory without a Lagrangian Description
  • 批准号:
    24ZR1403900
  • 批准年份:
    2024
  • 资助金额:
    0.0 万元
  • 项目类别:
    省市级项目
Cell Research
  • 批准号:
    31224802
  • 批准年份:
    2012
  • 资助金额:
    24.0 万元
  • 项目类别:
    专项基金项目
Cell Research
  • 批准号:
    31024804
  • 批准年份:
    2010
  • 资助金额:
    24.0 万元
  • 项目类别:
    专项基金项目
Cell Research (细胞研究)
  • 批准号:
    30824808
  • 批准年份:
    2008
  • 资助金额:
    24.0 万元
  • 项目类别:
    专项基金项目
Research on the Rapid Growth Mechanism of KDP Crystal
  • 批准号:
    10774081
  • 批准年份:
    2007
  • 资助金额:
    45.0 万元
  • 项目类别:
    面上项目

相似海外基金

Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317232
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
  • 批准号:
    2330940
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338301
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Differentially Private SQL with flexible privacy modeling, machine-checked system design, and accuracy optimization
协作研究:SaTC:核心:中:具有灵活隐私建模、机器检查系统设计和准确性优化的差异化私有 SQL
  • 批准号:
    2317233
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: NSF-BSF: SaTC: CORE: Small: Detecting malware with machine learning models efficiently and reliably
协作研究:NSF-BSF:SaTC:核心:小型:利用机器学习模型高效可靠地检测恶意软件
  • 批准号:
    2338302
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Using Intelligent Conversational Agents to Empower Adolescents to be Resilient Against Cybergrooming
合作研究:SaTC:核心:中:使用智能会话代理使青少年能够抵御网络诱骗
  • 批准号:
    2330941
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Continuing Grant
Collaborative Research: SaTC: CORE: Small: Towards Secure and Trustworthy Tree Models
协作研究:SaTC:核心:小型:迈向安全可信的树模型
  • 批准号:
    2413046
  • 财政年份:
    2024
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: EDU: Adversarial Malware Analysis - An Artificial Intelligence Driven Hands-On Curriculum for Next Generation Cyber Security Workforce
协作研究:SaTC:EDU:对抗性恶意软件分析 - 下一代网络安全劳动力的人工智能驱动实践课程
  • 批准号:
    2230609
  • 财政年份:
    2023
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: EDU: RoCCeM: Bringing Robotics, Cybersecurity and Computer Science to the Middled School Classroom
合作研究:SaTC:EDU:RoCCeM:将机器人、网络安全和计算机科学带入中学课堂
  • 批准号:
    2312057
  • 财政年份:
    2023
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Standard Grant
Collaborative Research: SaTC: CORE: Medium: Understanding the Impact of Privacy Interventions on the Online Publishing Ecosystem
协作研究:SaTC:核心:媒介:了解隐私干预对在线出版生态系统的影响
  • 批准号:
    2237329
  • 财政年份:
    2023
  • 资助金额:
    $ 26.35万
  • 项目类别:
    Standard Grant
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了