Hardware-Based Attacks to Compromise the Cryptographic Security of an Election System

被引:0
|
作者
Bidmeshki, Mohammad-Mahdi [1 ]
Reddy, Gaurav Rajavendra [1 ]
Zhou, Liwei [1 ]
Rajendran, Jeyavijayan [1 ]
Makris, Yiorgos [1 ]
机构
[1] Univ Texas Dallas, Dept Elect Engn, Richardson, TX 75080 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We present our experiences in implementing hardware-based attacks to subvert the results of an election system. The election system was outlined by the Cyber Security Awareness Week (CSAW) Embedded Security Challenge (ESC) competition in 2015, held at the New York University (NYU). The system had multiple layers of security and primarily used homomorphic encryption. The competition presented a challenge to hack the election system such that a preferred candidate wins the election. We cryptanalyzed the given election system to evaluate the effectiveness of various theoretical and practical attacks, and used a custom designed embedded system to demonstrate our attacks. The embedded system was implemented on a Nexys 4 DDR Artix-7 FPGA board. Our work, which earned the first place in the competition, demonstrates that low-cost hardware-based attacks can indeed lead to catastrophic consequences.
引用
收藏
页码:153 / 156
页数:4
相关论文
共 50 条
  • [1] Dynamic Function Verification for System on Chip Security Against Hardware-Based Attacks
    Kim, Lok-Won
    Villasenor, John D.
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2015, 64 (04) : 1229 - 1242
  • [2] Dynamic Function Replacement for System-on-Chip Security in the Presence of Hardware-Based Attacks
    Kim, Lok-Won
    Villasenor, John D.
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (02) : 661 - 675
  • [3] Virtualization and hardware-based security
    Perez, Ronald
    Sailer, Reiner
    van Doorn, Leendert
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 24 - 31
  • [4] Hardware-based IT security - Security Token Technologies in Automation
    Runde, Markus
    Niemann, Karl-Heinz
    Tebbe, Christopher
    [J]. ATP EDITION, 2012, (03): : 42 - 49
  • [5] Security by design: Hardware-based Security in Windows 8
    EMEA, United Kingdom
    [J]. Comput. Fraud Secur., 2013, 5 (18-20):
  • [6] Fault-based Attacks on Cryptographic Hardware
    Polian, Ilia
    Kreuzer, Martin
    [J]. PROCEEDINGS OF THE 2013 IEEE 16TH INTERNATIONAL SYMPOSIUM ON DESIGN AND DIAGNOSTICS OF ELECTRONIC CIRCUITS & SYSTEMS (DDECS), 2013, : 12 - 17
  • [7] Investigation and Design of the Efficient Hardware-based RNG for Cryptographic Applications
    Razy, Ahmad Firdaus Mohamad
    Naziri, Siti Zarina Md
    Ismail, Rizalafande Che
    Idris, Norina
    [J]. 2014 2ND INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2014, : 255 - 260
  • [8] Privacy Enhancements for Hardware-Based Security Modules
    Pasupathinathan, Vijayakrishnan
    Pieprzyk, Josef
    Wang, Huaxiong
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2011, 130 : 224 - +
  • [9] Security Primitives for Reconfigurable Hardware-Based Systems
    Huffmire, Ted
    Levin, Timothy
    Thuy Nguyen
    Irvine, Cynthia
    Brotherton, Brett
    Wang, Gang
    Sherwood, Timothy
    Kastner, Ryan
    [J]. ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2010, 3 (02)
  • [10] Multi-level Attacks: an Emerging Security Concern for Cryptographic Hardware
    Ali, Sk. Subidh
    Chakraborty, Rajat Subhra
    Mukhopadhyay, Debdeep
    Bhunia, Swamp
    [J]. 2011 DESIGN, AUTOMATION & TEST IN EUROPE (DATE), 2011, : 1176 - 1179