Attacks on Physically-Embedded Data Encryption for Embedded Devices

被引:3
|
作者
Du, Chaohui [1 ]
Bai, Guoqiang [2 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
[2] Tsinghua Univ, Inst Microelect, Beijing, Peoples R China
关键词
Embedded device; Physical unclonable function; Physical effect; Encryption; Security; Reliability; Known-plaintext attack; Modeling attack; RANDOM NUMBER GENERATOR;
D O I
10.1109/TrustCom.2014.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data encryption is the primary method to protect embedded devices in the hostile environment. The security of the traditional data encryption algorithms relies on keeping the keys secret and they always require a lot of arithmetic and logical computations, which may be not suitable for area critical or power critical embedded devices. At TrustCom 2013, Hou et al. proposed to use a physical unclonable function (PUF) to build a novel physically-embedded data encryption (PEDE) for embedded devices. The PEDE is lightweight since all it does is xor-ing the plaintext with the output of a PUF. As the PUF is unique and unclonable, only the original physical device can decrypt the ciphertext. Without possessing the original PEDE device, adversaries could not determine anything about the plaintext even if both the secret key and the ciphertext are available to them. In this paper, we show that the existing PEDE architecture is sensitive to environmental variations, which leads to the fact that the decrypted plaintext does not equal to the original plaintext. Besides the lack of reliability, we also show that the existing PEDE architecture is vulnerable to known-plaintext attack and modeling attack. To address these issues, we propose a secure and robust PEDE architecture.
引用
收藏
页码:967 / 972
页数:6
相关论文
共 50 条
  • [31] Embedded Configurable Sensor Interface Devices for Seamless Data Acquisition
    Grunde, Uldis
    2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 526 - 528
  • [32] Data Reorganization for Scalable Video Service with Embedded Mobile Devices
    Lim, Seung-Ho
    Choi, Min
    Jeong, Young Sik
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 12 (02)
  • [33] Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks
    Fournaris, Apostolos P.
    Fraile, Lidia Pocero
    Koufopavlou, Odysseas
    ELECTRONICS, 2017, 6 (03)
  • [34] A Physically Reconfigurable Structurally Embedded Vascular Antenna
    Huff, Gregory H.
    Pan, Hong
    Hartl, Darren J.
    Frank, Geoffrey J.
    Bradford, Robyn L.
    Baur, Jeffrey W.
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2017, 65 (05) : 2282 - 2288
  • [35] Affordances in an ecology of physically embedded intelligent systems
    Saffiotti, Alessandro
    Broxvall, Mathias
    TOWARDS AFFORDANCE-BASED ROBOT CONTROL, 2008, 4760 : 106 - 121
  • [36] The Impact of Physically Embedded Librarianship on Academic Departments
    O'Toole, Erin
    Barham, Rebecca
    Monahan, Jo
    PORTAL-LIBRARIES AND THE ACADEMY, 2016, 16 (03) : 529 - 556
  • [37] Hardware Trojan Attacks in Embedded Memory
    Hoque, Tamzidul
    Wang, Xinmu
    Basak, Abhishek
    Karam, Robert
    Bhunia, Swamp
    2018 IEEE 36TH VLSI TEST SYMPOSIUM (VTS 2018), 2018,
  • [38] Revisiting Rowhammer Attacks in Embedded Systems
    Fraile, Lidia Pocero
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    2019 14TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2019), 2019,
  • [39] MEMORY ALLOCATION IN EMBEDDED DEVICES
    Larmour, Vicky
    ELECTRONICS WORLD, 2009, 115 (1881): : 8 - 9
  • [40] Thermal Management of Embedded Devices
    Rajmond, Jano
    Fodor, Alexandra
    2013 PROCEEDINGS OF THE 36TH INTERNATIONAL SPRING SEMINAR ON ELECTRONICS TECHNOLOGY (ISSE), 2013, : 30 - 34