4 research outputs found
Investigating SRAM PUFs in large CPUs and GPUs
Physically unclonable functions (PUFs) provide data that can be used for
cryptographic purposes: on the one hand randomness for the initialization of
random-number generators; on the other hand individual fingerprints for unique
identification of specific hardware components. However, today's off-the-shelf
personal computers advertise randomness and individual fingerprints only in the
form of additional or dedicated hardware.
This paper introduces a new set of tools to investigate whether intrinsic
PUFs can be found in PC components that are not advertised as containing PUFs.
In particular, this paper investigates AMD64 CPU registers as potential PUF
sources in the operating-system kernel, the bootloader, and the system BIOS;
investigates the CPU cache in the early boot stages; and investigates shared
memory on Nvidia GPUs. This investigation found non-random non-fingerprinting
behavior in several components but revealed usable PUFs in Nvidia GPUs.Comment: 25 pages, 6 figures. Code in appendi
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay
The fourth industrial revolution leads to an increased use of embedded
computation and intercommunication in an industrial environment. While reducing
cost and effort for set up, operation and maintenance, and increasing the time
to operation or market respectively as well as the efficiency, this also
increases the attack surface of enterprises. Industrial enterprises have become
targets of cyber criminals in the last decade, reasons being espionage but also
politically motivated. Infamous attack campaigns as well as easily available
malware that hits industry in an unprepared state create a large threat
landscape. As industrial systems often operate for many decades and are
difficult or impossible to upgrade in terms of security, legacy-compatible
industrial security solutions are necessary in order to create a security
parameter. One plausible approach in industry is the implementation and
employment of side-channel sensors. Combining readily available sensor data
from different sources via different channels can provide an enhanced insight
about the security state. In this work, a data set of an experimental
industrial set up containing side channel sensors is discussed conceptually and
insights are derived