94 research outputs found

    New Paradigms for Access Control in Constrained Environments

    No full text
    International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already connected and five times more devices are expected to be deployed in the next five years. Technological standarization and the management and fostering of rapid innovation by governments are among the main challenges of the IoT. However, security and privacy are the key to make the IoT reliable and trusted. Security mechanisms for the IoT should provide features such as scalability, interoperability and lightness. This paper adresses authentication and access control in the frame of the IoT. It presents Physical Unclonable Functions (PUF), which can provide cheap, secure, tamper-proof secret keys to authentify constrained M2M devices. To be successfully used in the IoT context, this technology needs to be embedded in a standardized identity and access management framework. On the other hand, Embedded Subscriber Identity Module (eSIM) can provide cellular connectivity with scalability, interoperability and standard compliant security protocols. The paper discusses an authorization scheme for a constrained resource server taking advantage of PUF and eSIM features. Concrete IoT uses cases are discussed (SCADA and building automation)

    Trusted Computing using Enhanced Manycore Architectures with Cryptoprocessors

    No full text
    International audienceManycore architectures correspond to a main evolution of computing systems due to their high processing power. Many applications can be executed in parallel which provides users with a very efficient technology. Cloud computing is one of the many domains where manycore architectures will play a major role. Thus, building secure manycore architectures is a critical issue. However a trusted platform based on manycore architectures is not available yet. In this paper we discuss the main challenges and some possible solutions to enhance manycore architectures with cryptoprocessor

    Electromagnetic Transmission of Intellectual Property Data to Protect FPGA Designs

    No full text
    International audienceOver the past 10 years, the designers of intellectual properties(IP) have faced increasing threats including cloning, counterfeiting, andreverse-engineering. This is now a critical issue for the microelectronicsindustry. The design of a secure, efficient, lightweight protection scheme fordesign data is a serious challenge for the hardware security community. In thiscontext, this chapter presents two ultra-lightweight transmitters using sidechannel leakage based on electromagnetic emanation to send embedded IPidentity discreetly and quickl

    Fast Prototyping of Reconfigurable Architectures From a C Program

    Get PDF
    Rapid evaluation and design space exploration at the algo­rithmic level are important issues in the design cycle. In this paper we propose an original area vs delay estimation methodology that targets reconfigurable architectures. Two main steps compose the estimation flow: i) the structural es­timation which is technological independent and performs an automatic design space exploration and ii) the physical estimation which performs a technologic mapping to the tar­get reconfigurable architecture. Experiments conducted on Xilinx (XC4000, Virtex) and Altera (Flex10K, Apex) com­ponents for a 2D DWT and a speech coder lead to an aver­age error of about 10 % for temporal values and 18 % for area estimations

    Macrocyclic colibactin induces DNA double-strand breaks via copper-mediated oxidative cleavage.

    Get PDF
    Colibactin is an assumed human gut bacterial genotoxin, whose biosynthesis is linked to the clb genomic island that has a widespread distribution in pathogenic and commensal human enterobacteria. Colibactin-producing gut microbes promote colon tumour formation and enhance the progression of colorectal cancer via cellular senescence and death induced by DNA double-strand breaks (DSBs); however, the chemical basis that contributes to the pathogenesis at the molecular level has not been fully characterized. Here, we report the discovery of colibactin-645, a macrocyclic colibactin metabolite that recapitulates the previously assumed genotoxicity and cytotoxicity. Colibactin-645 shows strong DNA DSB activity in vitro and in human cell cultures via a unique copper-mediated oxidative mechanism. We also delineate a complete biosynthetic model for colibactin-645, which highlights a unique fate of the aminomalonate-building monomer in forming the C-terminal 5-hydroxy-4-oxazolecarboxylic acid moiety through the activities of both the polyketide synthase ClbO and the amidase ClbL. This work thus provides a molecular basis for colibactin's DNA DSB activity and facilitates further mechanistic study of colibactin-related colorectal cancer incidence and prevention

    Side-Channel Analysis of the TERO PUF

    Get PDF
    Physical Unclonable Functions (PUFs) have the potential to provide a higher level of security for key storage than traditional Non-Volatile Memory (NVM). However, the susceptibility of the PUF primitives to non-invasive Side-Channel Analysis (SCA) is largely unexplored. While resistance to SCA was indicated for the Transient Effect Ring Oscillator (TERO) PUF, it was not backed by an actual assessment. To investigate the physical security of the TERO PUF, we first discuss and study the conceptual behavior of the PUF primitive to identify possible weaknesses. We support our claims by conducting an EM-analysis of a TERO design on an FPGA. When measuring TERO cells with an oscilloscope in the time domain, a Short Time Fourier Transform (STFT) based approach allows to extract the relevant information in the frequency domain. By applying this method we significantly reduce the entropy of the PUF. Our analysis shows the vulnerability of not only the originally suggested TERO PUF implementation but also the impact on TERO designs in general. We discuss enhancements of the design that potentially prevent the TERO PUF from exposing the secret and point out that regarding security the TERO PUF is similar to the more area-efficient Ring Oscillator PUF

    Improved Key Recovery Attacks on Reduced-Round AES with Practical Data an d Memory Complexities

    Get PDF
    Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Eurocrypt 2017 Grassi et al. presented a novel type of distinguisher for AES-like structures, but so far all the published attacks which were based on this distinguisher were inferior to previously known attacks in their complexity. In this paper we combine the technique of Grassi et al. with several other techniques in a novel way to obtain the best known key recovery attack on 5-round AES in the single-key model, reducing its overall complexity from about 2322^{32} to less than 2222^{22}. Extending our techniques to 7-round AES, we obtain the best known attacks on AES-192 which use practical amounts of data and memory, breaking the record for such attacks which was obtained in 2000 by the classical Square attack

    Landuse and soil degradation in the southern Maya lowlands, from Pre-Classic to Post-Classic times : The case of La Joyanca (Petén, Guatemala)

    Get PDF
    International audienceThis work focuses on the impact of Maya agriculture on soil degradation. In site and out site studies in the area of the city of La Joyanca (NW Petén) show that "Maya clays" do not constitute a homogeneous unit, but represent a complex sedimentary record. A high resolution analysis leads us to document changes in rates and practices evolving in time in relation with major socio-political and economic changes. It is possible to highlight extensive agricultural practices between Early Pre-classical to Late Pre-classical times. Intensification occurs in relation with reduction of the fallow duration during Pre-classic to Classic periods. The consequences of these changes on soil erosion are discussed. However, it does not seem that the agronomic potential of the soils was significantly degraded before the end of the Classic period

    Response of littoral chironomid community and organic matter to late glacial lake level and environmental changes at Lago dell'Accesa (Tuscany, Italy).

    No full text
    International audienceThis study focuses on the response of lacustrine littoral chironomid communities to late glacial changes in limnological, environmental and climate conditions in the Mediterranean context. Late glacial chironomid (Diptera: Chironomidae) assemblages, organic petrography and geochemistry were analysed in a sediment core from the littoral zone of Lago dell'Accesa (Tuscany, Italy), where the lake-level fluctuations and the vegetation history have been previously reconstructed. Comparison of the chironomid stratigraphy to other proxies (pollen assemblages, organic petrography and geochemistry, lake-level) and regional climate reconstruction suggested the predominant influence of lake-level changes on the littoral chironomid fauna. The main lowering events that occurred during the Oldest and the Younger Dryas were followed by higher proportions of taxa typical of littoral habitats. A complementary study of organic matter suggested the indirect impact of lake-level on the chironomids through changes in humic status and habitat characteristics, such as the type of substrate and aquatic macrophyte development. Several chironomid taxa, such as Glyptotendipes, Microtendipes and Cricotopus type patens, were identified as possible indicators of low lake-level in the late glacial records. Nevertheless, this study suggested that parallel analyses of organic matter and chironomid assemblages may be needed to circumvent misinterpretation of littoral chironomid assemblage stratigraphy. There was a weak response of the chironomid assemblages to small lake-level lowerings that corresponded to the Older Dryas and Preboreal oscillations. A higher level of determination, e.g. to the species group level, may be necessary to increase the sensibility of the indicators to lake-level changes
    • …
    corecore