Filters








75 Hits in 2.3 sec

Run-Time Accessible DRAM PUFs in Commodity Devices [chapter]

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2016 Lecture Notes in Computer Science  
So far, most PUF constructions require addition of new hardware or FPGA implementations for their operation. Recently, intrinsic PUFs, which can be found in commodity devices, have been investigated.  ...  Finally, we introduce lightweight protocols for device authentication and secure channel establishment, that leverage the DRAM PUFs at run-time.  ...  The authors would like to thank Kevin Ryan and Ethan Weinberger for their help with building the heater setup used in the experiments, and Intel for donating the Intel Galileo boards used in this work.  ... 
doi:10.1007/978-3-662-53140-2_21 fatcat:3tpuyvnymvg4tfnpqzjz7fkjp4

Intrinsic Physical Unclonable Function (PUF) Sensors in Commodity Devices

Shuai Chen, Bing Li, Yuan Cao
2019 Sensors  
It can be difficult to implemented in commercial off-the-shelf devices.  ...  Furthermore, we configured the DRAM PUF-based sensor in a DRAM PUF-based key generation scheme which improves the practicability of the design.  ...  Acknowledgments: We would like to thank Jakub Szefer and Wenjie Xiong for guidance and help with the PUF implementation on Rpi.  ... 
doi:10.3390/s19112428 fatcat:tded54czafff3mkm7vzr23oqfi

Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security

Andre Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer
2017 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)  
Our PUF makes use of bit flips, which occur in DRAM cells due to rapid and repeated access of DRAM rows.  ...  In this work, we present a new type of a memory-based intrinsic PUF, which leverages the Rowhammer effect in DRAM modules; the Rowhammer PUF.  ...  Voltage: Prior work has also shown that voltage affects the leakage in DRAM cells [16] . In commodity, off-the-shelf devices there is currently no interface to control the voltage of DRAM cells.  ... 
doi:10.1109/hst.2017.7951729 dblp:conf/host/SchallerXASG0S17 fatcat:6z6ecd5fxjhthhcjm3ibv5gg3u

Dataplant: Enhancing System Security with Low-Cost In-DRAM Value Generation Primitives [article]

Lois Orosa, Yaohua Wang, Ivan Puddu, Mohammad Sadrosadati, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Arash Tavakkol, Minesh Patel, Jeremie Kim, Vivek Seshadri (+4 others)
2019 arXiv   pre-print
Using a combination of detailed simulations and experiments with 136 real commodity DRAM chips, we show that our Dataplant-based PUF has 1.8x higher throughput than the best state-of-the-art DRAM PUFs.  ...  To this end, we propose Dataplant, a new class of low-cost, high-performance, and reliable security primitives that can be integrated in commodity DRAM chips with minimal changes.  ...  We customize Ramulator [76] to support all the mechanisms on in-order cores.  ... 
arXiv:1902.07344v2 fatcat:rpfx6htqjfbhtjirzjy76rbbia

Improving DRAM Performance, Security, and Reliability by Understanding and Exploiting DRAM Timing Parameter Margins [article]

Jeremie S. Kim
2021 arXiv   pre-print
This dissertation rigorously characterizes many modern commodity DRAM devices and shows that by exploiting DRAM access timing margins within manufacturer-recommended DRAM timing specifications, we can  ...  Finally, we characterize the RowHammer security vulnerability on a wide range of modern DRAM chips while violating the DRAM refresh requirement in order to directly characterize the underlying DRAM technology  ...  for commodity devices.  ... 
arXiv:2109.14520v1 fatcat:7hhrlz3tfjgx5fekdblfawxf3a

Fast DRAM PUFs on Commodity Devices

Jack Miskelly, Maire OrNeill
2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
implementing a 800 DRAM latency PUF on commodity hardware.  ...  DRAM-Based PUFs 269 As a ubiquitous technology found in a wide range of 270 devices the idea of using DRAM as the core hardware for 271 an Intrinsic PUF has been explored in several works.  ... 
doi:10.1109/tcad.2020.3012218 fatcat:oqjx2lby5bdf5hilt66hp4nmpq

CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations [article]

Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose (+1 others)
2021 arXiv   pre-print
To demonstrate the potential of CODIC, we propose two new CODIC-based security mechanisms that outperform state-of-the-art mechanisms in several ways: (1) a new DRAM Physical Unclonable Function (PUF)  ...  To overcome these limitations, we propose enabling programmable DRAM internal timings for controlling in-DRAM components.  ...  A much earlier version of this paper was placed on arXiv in February 2019 [113] .  ... 
arXiv:2106.05632v1 fatcat:57kx6f3cibckzgcbuz3dcbnosa

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips [article]

Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu
2021 arXiv   pre-print
We experimentally demonstrate that QUAC reliably generates random values across 136 commodity DDR4 DRAM chips from one major DRAM manufacturer.  ...  QUAC-TRNG exploits the new observation that a carefully-engineered sequence of DRAM commands activates four consecutive DRAM rows in rapid succession.  ...  Our goal in this work is to develop a TRNG that uses commodity DRAM devices to generate random numbers with both high throughput and low latency.  ... 
arXiv:2105.08955v2 fatcat:64w37n2ymbbapoe4x4v4dd4tpm

An Overview of DRAM-Based Security Primitives

Nikolaos Anagnostopoulos, Stefan Katzenbeisser, John Chandy, Fatemeh Tehranipoor
2018 Cryptography  
Security primitives based on Dynamic Random Access Memory (DRAM) can provide cost-efficient and practical security solutions, especially for resource-constrained devices, such as hardware used in the Internet  ...  Then, we introduce the primitives that can be implemented using DRAM, namely Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), and present the applications of each of the  ...  This work has also been supported by Comcast Corporation, a company headquartered in Philadelphia, PA, USA, and Honeywell International Inc., a company headquarted in Morris Plains, NJ, USA.  ... 
doi:10.3390/cryptography2020007 fatcat:43ohhg2ctzhrzlv7msocufwg3e

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †

Nikolaos Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser
2018 Cryptography  
To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly  ...  As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore  ...  Run-Time Row Hammer PUF Implementations in Commodity DRAM In this section, we examine in detail the different parameters and factors that can affect the operation of a Row Hammer PUF.  ... 
doi:10.3390/cryptography2030013 fatcat:ec6iyndbpfdkreqa27aj53ewna

Guest Editors' Introduction: Special Issue on Top Picks in Hardware and Embedded Security

Rosario Cammarota, Francesco Regazzoni
2021 IEEE design & test  
The final topic of this special issue is "cryptographic hardware" and includes the following articles: "DRAM PUFs in Commodity Devices," by Xiong et al., that presents a technique to create robust DRAM  ...  physically unclonable functions (PUFs) with commodity hardware, and demonstrates its use on a Linux-based off-the-shelf device; and "A Systematic Design Methodology of Formally Proven Side-Channel-Resistant  ... 
doi:10.1109/mdat.2021.3068938 fatcat:vgxsg2sdrnb6fir5mr6xgczycm

Improving Resilience by Deploying Permuted Code onto Physically Unclonable Unique Processors

Andreas Assmuth, Paul Cockshott, Jana Kipke, Karen Renaud, Lewis Mackenzie, Wim Vanderbauwhede, Matthias Sollner, Tilo Fischer, George Weir
2016 2016 Cybersecurity and Cyberforensics Conference (CCC)  
In this paper we propose the deployment of permuted code onto Physically Unclonable Unique Processors in order to resist common cyber attacks.  ...  In: 2016 Cybersecurity and Cyberforensics Conference (CCC). IEEE, Piscataway, pp. 144-150. ISBN 9781509026579 , http://dx.  ...  Before loading the firmware in the DRAM for execution decryption has to be done, in order to fill the DRAM with the permuted firmware code. C.  ... 
doi:10.1109/ccc.2016.30 dblp:conf/ccc2/AssmuthCKRMVSFW16 fatcat:bsvx2xgydbafzlpyelncoimlau

D-RaNGe: Using Commodity DRAM Devices to Generate True Random Numbers with Low Latency and High Throughput [article]

Jeremie S. Kim, Minesh Patel, Hasan Hassan, Lois Orosa, Onur Mutlu
2018 arXiv   pre-print
To demonstrate that our TRNG design is viable using commodity DRAM chips, we rigorously characterize the behavior of activation failures in 282 state-of-the-art LPDDR4 devices from three major DRAM manufacturers  ...  Our results show that many cells in each device produce random data that remains robust over both time and temperature variation.  ...  commodity devices today.  ... 
arXiv:1808.04286v2 fatcat:32gvtbf56jclzh4sflno2g4cde

PiDRAM: A Holistic End-to-end FPGA-based Framework for Processing-in-DRAM [article]

Ataberk Olgun, Juan Gómez Luna, Konstantinos Kanellopoulos, Behzad Salami, Hasan Hassan, Oğuz Ergin, Onur Mutlu
2021 arXiv   pre-print
Several recent works have demonstrated PuM techniques in off-the-shelf DRAM devices.  ...  Using PiDRAM, we implement and evaluate two state-of-the-art PuM techniques: in-DRAM (i) copy and initialization, (ii) true random number generation.  ...  , implement physical unclonable functions [18, 66] , copy data [102] , and perform bitwise AND/OR operations [99] in commodity DRAM devices [38] .  ... 
arXiv:2111.00082v3 fatcat:xafmmdqxl5gi7hcmbtumotmrzq

Table of contents

2020 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Jin 3555 Fast DRAM PUFs on Commodity Devices .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . J. Miskelly and M.  ...  Guan 3711 Learning-Based Quality Management for Approximate Communication in Network-on-Chips . . . . . . . . . . . . . Y. Chen and A.  ... 
doi:10.1109/tcad.2020.3028016 fatcat:s4y5qe6n45hltizz3txl5g5ila
« Previous Showing results 1 — 15 out of 75 results