Attacking the Edge-of-Things: A Physical Attack Perspective

被引:5
|
作者
Gai, Keke [1 ,2 ]
Ding, Yaoling [3 ,4 ]
Wang, An [1 ,2 ]
Zhu, Liehuang [5 ]
Choo, Kim-Kwang Raymond [6 ,7 ]
Zhang, Qi [5 ]
Wang, Zhuping [8 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[5] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[6] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[7] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[8] Xingtang Telecommun Technol Co Ltd, Beijing 100191, Peoples R China
基金
中国国家自然科学基金; 北京市自然科学基金;
关键词
Low voltage; Circuit faults; Internet of Things; Cloud computing; Generators; Resists; Hardware; Edge computing; fault analysis; Internet of Things (IoT); physical attacks; power analysis; true random number generators (TRNGs); POWER ANALYSIS; COUNTERMEASURE; DESIGN; IMPLEMENTATIONS; SECURITY;
D O I
10.1109/JIOT.2021.3109917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The concepts between Internet of Things (IoT) and edge computing are increasingly intertwined, as an edge-computing architecture generally comprises a (large) number of diverse IoT devices. This, however, increases the potential attack vectors since any one of these connected IoT devices can be targeted to facilitate other malicious cyber activities. Physical attacks are generally harder to mitigate and less studied, in comparison to their cyber counterparts. Thus, in this article we present an attack framework targeting true random number generators (TRNGs), which are a key component in cryptosystems for edge devices. We then demonstrate how such a framework can guide our investigation of a commercial ASIC chip that runs ring-oscillator-based TRNG. Specifically, we show that our template power attack, low voltage fault attack, and voltage glitch fault attack do not require prior knowledge of the TRNG implementation.
引用
收藏
页码:5240 / 5253
页数:14
相关论文
共 50 条
  • [31] Things at the Edge of the World
    Wood, David
    PHENOMENOLOGIES OF THE STRANGER: BETWEEN HOSTILITY AND HOSPITALITY, 2011, : 67 - 79
  • [32] Enhancing security of internet of medical things in fog-edge environment: a study on attack detection performance
    Sharma, Ravi
    Sharma, Nonita
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2024, 49 (04):
  • [33] RAD-EI: A routing attack detection scheme for edge-based Internet of Things environment
    Wazid, Mohammad
    Dsouza, Poonam Reshma
    Das, Ashok Kumar
    Bhat, Vivekananda K.
    Kumar, Neeraj
    Rodrigues, Joel J. P. C.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (15)
  • [34] Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things
    Liu, Yi
    Zhao, Ruihui
    Kang, Jiawen
    Yassine, Abdulsalam
    Niyato, Dusit
    Peng, Jialiang
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (03)
  • [35] Optimal Disintegration Strategy in Multiplex Networks:From an Edge-based Attack Perspective
    Wang, Chen
    Feng, Yuan
    Zeng, Chengyi
    Liu, Hongfu
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 788 - 794
  • [36] Attacking Quality-of-Care Gaps in Transient Ischemic Attack
    Kelly, Adam G.
    STROKE, 2021, 52 (07) : 2379 - 2380
  • [37] Diffusion Attack: Leveraging Stable Diffusion for Naturalistic Image Attacking
    Guo, Qianyu
    Fu, Jiaming
    Lu, Yawen
    Gan, Dongming
    2024 IEEE CONFERENCE ON VIRTUAL REALITY AND 3D USER INTERFACES ABSTRACTS AND WORKSHOPS, VRW 2024, 2024, : 975 - 976
  • [38] The Pushdown Attack and Attacking the Substitution Cipher Chaining mode (SCC)
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 546 - 559
  • [39] Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective
    Gulatas, Ibrahim
    Kilinc, H. Hakan
    Zaim, A. Halim
    Aydin, M. Ali
    IEEE ACCESS, 2023, 11 : 33584 - 33606
  • [40] Attack Some while Protecting Others: Selective Attack Strategies for Attacking and Protecting Multiple Concepts
    Belavadi, Vibha
    Zhou, Yan
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 801 - 814