Filters








6 Hits in 8.5 sec

Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †

Nikolaos Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser
2018 Cryptography  
To address this issue, the Row Hammer PUF has been proposed by Schaller et al., which leverages the row hammer effect in DRAM modules to reduce the retention times of their cells and, therefore, significantly  ...  As our results prove, the Row Hammer PUF could potentially provide an adequate level of security for Commercial Off-The-Shelf (COTS) devices, if its dependency on temperature is mitigated, and, may therefore  ...  This paper extends the work of Schaller et al., demonstrating that the row hammer effect can be utilised to provide run-time accessible cryptographic applications and improved security.  ... 
doi:10.3390/cryptography2030013 fatcat:ec6iyndbpfdkreqa27aj53ewna

An Overview of DRAM-Based Security Primitives

Nikolaos Anagnostopoulos, Stefan Katzenbeisser, John Chandy, Fatemeh Tehranipoor
2018 Cryptography  
size, and the easy way in which they can be accessed, even at run-time.  ...  Cryptography 2018, 2, 7 2 of 33 This has led to an increased interest for hardware-based security primitives, such as Physical Unclonable Functions (PUFs) and True Random Number Generators (TRNGs), because  ...  Acknowledgments: This work has been partly funded by the DFG (Deutsche Forschungsgemeinschaft; German Research Foundation) as part of project P3 within the CRC (Collaborative Research Center) 1119 CROSSING  ... 
doi:10.3390/cryptography2020007 fatcat:43ohhg2ctzhrzlv7msocufwg3e

Foundations of Secure Scaling (Dagstuhl Seminar 16342)

Lejla Batina, Swarup Bhunia, Patrick Schaumont, Jean-Pierre Seifert, Marc Herbstritt
2017 Dagstuhl Reports  
Indeed, the relations between scaling and the resulting security are poorly understood.  ...  This report documents the program and the outcomes of Dagstuhl Seminar 16342 "Foundations of Secure Scaling".  ...  For instance, in the Bernstein's cache timing attack, we try to invoke the AES encryption by .xing part of the input, and randomize other parts of the inputs and obtain the total time for the encryption  ... 
doi:10.4230/dagrep.6.8.65 dblp:journals/dagstuhl-reports/BatinaBSS16 fatcat:qya6rznvonbi7pfic7ocbxwkea

A Modern Primer on Processing in Memory [article]

Onur Mutlu, Saugata Ghose, Juan Gómez-Luna, Rachata Ausavarungnirun
2020 arXiv   pre-print
At the same time, conventional memory technology is facing many technology scaling challenges in terms of reliability, energy, and performance.  ...  purposes (e.g., graphics, low-power, high bandwidth, low latency), and the necessity of designing new solutions to serious reliability and security issues, such as the RowHammer phenomenon, are an evidence  ...  PUFs are commonly used in cryptography to identify devices based on the uniqueness of their physical microstructures.  ... 
arXiv:2012.03112v1 fatcat:hq2i2xzq4nbszenq7rqmjzcjci

Dagstuhl Reports, Volume 6, Issue 8, August 2016, Complete Issue [article]

2017
Which technologies and design patterns are most effective for monitoring SLAs in real-time? What run-time adaptation and performance optimisations are practical to implement in business processes?  ...  In a fault attack, an adversary breaches the security by injecting faults into the underlying processor hardware and observing their effects in the output of the running software.  ...  Latin grammar, and submitted and accepted to the International Journal of Systemic and Evolutionary Microbiology (a fun read on the topic is at http: //biorxiv.org/content/biorxiv/early/2016/01/19/037325  ... 
doi:10.4230/dagrep.6.8 fatcat:jhbruchpmvdthoe45w75w35wpe

Editorial Associate: Position Papers of the 2017 Federated Conference on Computer Science and Information Systems and Information Systems Cover photo

Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, Maria Ganzha, Leszek Maciaszek, Marcin Paprzycki, Wil Van Der Aalst, Frederik Ahlemann, Marco Aiello, Mohammed Atiquzzaman, Barrett Bryant, Ana Fred (+17 others)
Polskie Towarzystwo Informatyczne Annals of Computer Science and Information Systems   unpublished
Dominik Slezak, Warsaw University for his comments on the presentation. ACKNOWLEDGMENT This work is fully supported by the eAsy inteLligent service Platform for Healthy Ageing (ALPHA) Project.  ...  ACKNOWLEDGMENT This work was supported by the Business Informatics Group at Dublin City University and in part, by Science Foundation Ireland grant 13/RC/2094 and co-funded under the European Regional  ...  post-quantum cryptography [12] for encryption, which is secure against quantum computer attacks, and blockchain for authentication without single point of failure.  ... 
fatcat:bln7ujge4zfqrijt5une7cce3q