35. A Formal Approach to Confidentiality Verification in SoCs at the Register Transfer Level. Johannes Müller; Mohammad R. Fadiheh; Anna Duque Anton; Thomas Eisenbarth; Dominik Stoffel and Wolfgang Kunz. In To appear in Proceedings of the 58th IEEE/ACM Design Automation Conference (DAC’21), San Francisco CA, USA, 2021.
BibTeX
34. Towards Reliable In-Memory Computing: From Emerging Devices to Post-von-Neumann Architectures. Hussam Amrouch; Anteneh Gebregiorgis; Nan Du; Said Hamdioui and Ilia Polian. In 29th IFIP/IEEE International Conference on Very Large Scale Integration (VLSI-SoC’21), 2021.
BibTeX
33. BasicBlocker: ISA Redesign to Make Spectre-Immune CPUs Faster. Jan Philipp Thoma; Jakob Feldtkeller; Markus Krausz; Tim Güneysu and Daniel J. Bernstein. In
Proceedings of 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021), San Sebastian, Spain, 2021. DOI:
https://doi.org/10.1145/3471621.3471857 BibTeX
32. Automatic Extraction of Secrets from the Transistor Jungle Using Laser-Assisted Side-Channel Attacks. Thilo Krachenfels; Tuba Kiyan; Shahin Tajik and Jean-Pierre Seifert. In 30th USENIX Security Symposium (USENIX Security 21), 2021.
BibTeX
31. A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems. Nico Mexis; Nikolaos Athanasios Anagnostopoulos; Shuai Chen; Jan Bambach; Tolga Arul and Stefan Katzenbeisser.
J. Emerg. Technol. Comput. Syst. 17, 3 (June 2021). DOI:
https://doi.org/10.1145/3458824 Abstract
In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In this work, we construct and examine a proof-of-concept prototype of such a system of systems, which consists of heterogeneous commercial off-the-shelf components, and utilises diverse communication protocols. We recognise the inherent need for lightweight security in this context, and address it by employing a low-cost state-of-the-art security solution. Our solution is based on a novel hardware and software co-engineering paradigm, utilising well-known software-based cryptographic algorithms, in order to maximise the security potential of the hardware security primitive (a Physical Unclonable Function) that is used as a security anchor. The performance of the proposed security solution is evaluated, proving its suitability even for real-time applications. Additionally, the Dolev-Yao attacker model is considered in order to assess the resilience of our solution towards attacks against the confidentiality, integrity, and availability of the examined system of systems. In this way, it is confirmed that the proposed solution is able to address the emerging security challenges of the oncoming era of systems of systems.BibTeX
30. Special Session: Physical Attacks through the Chip Backside: Threats, Challenges, and Opportunities. Elham Amini; Kai Bartels; Christian Boit; Marius Eggert; Norbert Herfurth; Tuba Kiyan; Thilo Krachenfels; Jean-Pierre Seifert and Shahin Tajik. In
2021 IEEE 39th VLSI Test Symposium (VTS), 2021, pp. 1--12. DOI:
https://doi.org/10.1109/VTS50974.2021.9441006 BibTeX
29. Nano Security: From Nano-Electronics to Secure Systems. Ilia Polian; Frank Altmann; Tolga Arul; Christian Boit; Ralf Brederlow; Lucas Davi; Rolf Drechsler; Nan Du; Thomas Eisenbarth; Tim Güneysu; Sascha Hermann; Matthias Hiller; Rainer Leupers; Farhad Merchant; Thomas Mussenbrock; Stefan Katzenbeisser; Akash Kumar; Wolfgang Kunz; Thomas Mikolajick; Vivek Pachauri; Jean-Pierre Seifert; Frank Sill Torres and Jens Trommer. In Proceedings of the Conference on Design, Automation & Test in Europe (DATE’21), Virtual Event, 2021.
BibTeX
28. HERA: Hotpatching of Embedded Real-time Applications. Christian Niesler; Sebastian Surminski and Lucas Davi. In
Proceedings of the Network and Distributed System Security Symposium (NDSS) 2021, 2021. DOI:
https://doi.org/10.14722/ndss.2021.24159 BibTeX
27. Vertical IP Protection of the Next-Generation Devices: Quo Vadis? Shubham Rai; Siddharth Garg; Christian Pilato; Vladimir Herdt; Elmira Moussavi; Dominik Sisejkovic; Ramesh Karri; Rolf Drechsler; Farhad Merchant and Akash Kumar. In
2021 Design, Automation Test in Europe Conference Exhibition (DATE), 2021, pp. 1905–1914. DOI:
https://doi.org/10.23919/DATE51398.2021.9474132 BibTeX
26. Exploring Physical Synthesis for Circuits based on Emerging Reconfigurable Nanotechnologies. Andreas Krinke; Shubham Rai; Akash Kumar and Jens Lienig. In
2021 IEEE/ACM International Conference On Computer Aided Design (ICCAD), 2021, pp. 1–9. DOI:
https://doi.org/10.1109/ICCAD51958.2021.9643439 BibTeX
25. ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions. Jan Philipp Thoma; Christian Niesler; Dominic Funke; Gregor Leander; Pierre Mayr; Nils Pohl; Lucas Davi and Tim Güneysu. 2021.2021. DOI:
https://doi.org/10.48550/ARXIV.2104.11469 BibTeX
24. A Design for a Secure Network of Networks Using a Hardware and Software Co-Engineering Architecture. Nico Mexis; Nikolaos Athanasios Anagnostopoulos; Shuai Chen; Jan Bambach; Tolga Arul and Stefan Katzenbeisser. In Proceedings of the SIGCOMM ’21 Poster and Demo Sessions. Association for Computing Machinery, New York, NY, USA, 2021, pp. 65–67.
Abstract
This work concerns the demonstration of a security solution for a network of networks, which comprises heterogeneous devices and utilises diverse communication protocols. The security solution used in this work employs an architecture presented in a previous work, which is based upon the concept of hardware and software security co-engineering.BibTeX
23. Low-power emerging memristive designs towards secure hardware systems for applications in internet of things. Nan Du; Heidemarie Schmidt and Ilia Polian.
Nano Materials Science (2021). DOI:
https://doi.org/10.1016/j.nanoms.2021.01.001 Abstract
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and in-memory computing (IMC), but there is a rising interest in using memristive technologies for security applications in the era of internet of things (IoT). In this review article, for achieving secure hardware systems in IoT, low-power design techniques based on emerging memristive technology for hardware security primitives/systems are presented. By reviewing the state-of-the-art in three highlighted memristive application areas, i.e. memristive non-volatile memory, memristive reconfigurable logic computing and memristive artificial intelligent computing, their application-level impacts on the novel implementations of secret key generation, crypto functions and machine learning attacks are explored, respectively. For the low-power security applications in IoT, it is essential to understand how to best realize cryptographic circuitry using memristive circuitries, and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security. This review article aims to help researchers to explore security solutions, to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs.BibTeX
22. Low-Temperature Attacks Against Digital Electronics: A Challenge for the Security of Superconducting Modules in High-Speed Magnetic Levitation (MagLev) Trains. Nikolaos Athanasios Anagnostopoulos; Yufan Fan; Markus Heinrich; Nikolay Matyunin; Dominik Püllen; Philipp Muth; Christian Hatzfeld; Markus Rosenstihl; Tolga Arul and Stefan Katzenbeisser. In
2021 IEEE 14th Workshop on Low Temperature Electronics (WOLTE), 2021, pp. 1–4. DOI:
https://doi.org/10.1109/WOLTE49037.2021.9555437 BibTeX
21. RealSWATT: Remote Software-Based Attestation for Embedded Devices under Realtime Constraints. Sebastian Surminski; Christian Niesler; Ferdinand Brasser; Lucas Davi and Ahmad-Reza Sadeghi. In
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 2021, pp. 2890–2905. DOI:
https://doi.org/10.1145/3460120.3484788 Abstract
Smart factories, critical infrastructures, and medical devices largely rely on embedded systems that need to satisfy realtime constraints to complete crucial tasks. Recent studies and reports have revealed that many of these devices suffer from crucial vulnerabilities that can be exploited with fatal consequences. Despite the security and safety-critical role of these devices, they often do not feature state-of-the-art security mechanisms. Moreover, since realtime systems have strict timing requirements, integrating new security mechanisms is not a viable option as they often influence the device's runtime behavior. One solution is to offload security enhancements to a remote instance, the so-called remote attestation.We present RealSWATT, the first software-based remote attestation system for realtime embedded devices. Remote attestation is a powerful security service that allows a party to verify the correct functionality of an untrusted remote device. In contrast to previous remote attestation approaches for realtime systems, RealSWATT does neither require custom hardware extensions nor trusted computing components. It is designed to work within real-world IoT networks, connected through Wi-Fi. RealSWATT leverages a dedicated processor core for remote attestation and provides the required timing guarantees without hardware extensions. We implement RealSWATT on the popular ESP32 microcontroller, and we evaluate it on a real-world medical device with realtime constraints. To demonstrate its applicability, we furthermore integrate RealSWATT into a framework for off-the-shelf IoT devices and apply it to a smart plug, a smoke detector, and a smart light bulb.BibTeX
20. Metastability with Emerging Reconfigurable Transistors: Exploiting Ambipolarity for Throughput. Abhiroop Bhattacharjee; Shubham Rai; Ansh Rupani; Michael Raitza and Akash Kumar. In
2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC), 2021, pp. 1–6. DOI:
https://doi.org/10.1109/VLSI-SoC53125.2021.9607015 BibTeX
19. Preserving Self-Duality During Logic Synthesis for Emerging Reconfigurable Nanotechnologies. Shubham Rai; Heinz Riener; Giovanni De Micheli and Akash Kumar. In
2021 Design, Automation Test in Europe Conference Exhibition (DATE), 2021, pp. 354–359. DOI:
https://doi.org/10.23919/DATE51398.2021.9474112 BibTeX