Название: Hardware Security Training, Hands-on! Автор: Mark Tehranipoor, N. Nalla Anandakumar, Farimah Farahmandi Издательство: Springer Год: 2023 Страниц: 331 Язык: английский Формат: pdf (true) Размер: 17.1 MB
This is the first book dedicated to hands-on hardware security training. It includes a number of modules to demonstrate attacks on hardware devices and to assess the efficacy of the countermeasure techniques. This book aims to provide a holistic hands-on training to upper-level undergraduate engineering students, graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers. All the hands-on experiments presented in this book can be implemented on readily available Field Programmable Gate Array (FPGA) development boards, making it easy for academic and industry professionals to replicate the modules at low cost. This book enables readers to gain experiences on side-channel attacks, fault-injection attacks, optical probing attack, PUF, TRNGs, odometer, hardware Trojan insertion and detection, logic locking insertion and assessment, and more.
All information technology systems are built using the physical hardware of the semiconductor chips found in all modern electronics, computers, communications networks, and critical cyber-physical systems. These chips are becoming cheaper, faster, and more powerful, and this has enabled the rise of the Internet of Things (IoT), autonomous systems, and artificial intelligence as key technologies of the future. As the world becomes increasingly reliant on advanced technologies for economic growth and national security, implicit trust in hardware becomes an untenable option. Moreover, trusted computing in hardware is fundamental to information security practices. The basis of security guarantees in digital systems is essentially a set of cryptographic operations executing in a hardware root of trust. Advanced cyber-attacks therefore deliberately target hardware devices in cryptosystems applications. The semiconductor chips have been targeted for reverse engineering, counterfeiting, piracy, malicious insertion, side-channel attacks, fault injection attacks, and probing attacks. These attacks, their associated vulnerabilities, root causes, and their countermeasures form the field of hardware security.
Hardware security has become an important topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with computer science, electronics, cryptography, physics, material sciences, communication systems, and signal processing. It sometimes requires the construction of specialized equipment, and it usually takes some practice to acquire laboratory skills—especially where attacks involve laboratory equipment. Therefore, it is necessary to acquire laboratory skills to help both academia and industry investigate hardware attacks, countermeasures, and solutions to address hardware security problems. To address this important growing need, we embarked on this initiative for developing the first-ever textbook dedicated to hands-on hardware security training that includes different attacks deliberately targeting hardware devices and applying countermeasure techniques against them. In this book, a wide variety of topics will be covered in 16 chapters. Chapter 1 presents physical unclonable functions (PUFs), Chap. 2 provides a true random number generator (TRNG), Chap. 3 presents recycled chip detection using ring oscillator-based odometer, Chap. 4 provides a recycled FPGA detection, Chap. 5 presents techniques of hardware Trojan insertion, Chap. 6 provides hardware Trojan detection, Chap. 7 presents security verification, Chap. 8 presents power analysis attack on AES, Chap. 9 presents EM-based side-channel attack on AES, Chap. 10 presents logic locking insertion and assessment, Chap. 11 presents clock glitch fault-injection attack on AES/FSM, Chap. 12 provides voltage glitch fault-injection attack on AES/FSM, Chap. 13 presents laser fault-injection attack, Chap. 14 presents optical probing attack on logic locking, Chap. 15 presents a universal fault sensor, and Chap. 16 presents scanning electron microscope (SEM) training. This book aims to provide holistic hands-on hardware security training to upper-level undergraduate engineering students and graduate students, security researchers, practitioners, and industry professionals, including design engineers, security engineers, system architects, and chief security officers.
Contents:
1. Physical Unclonable Functions (PUFs) 2. True Random Number Generator (TRNG) 3. Recycled Chip Detection Using RO-Based Odometer 4. Recycled FPGA Detection 5. Hardware Trojan Insertion 6. Hardware Trojan Detection 7. Security Verification 8. Power Analysis Attacks on AES 9. EM Side-Channel Attack on AES 10. Logic-Locking Insertion and Assessment 11. Clock Glitch Fault Attack on FSM in AES Controller 12. Voltage Glitch Attack on an FPGA AES Implementation 13. Laser Fault Injection Attack (FIA) 14. Optical Probing Attack on Logic Locking 15. Universal Fault Sensor 16. Scanning Electron Microscope Training
Скачать Hardware Security Training, Hands-on!
|