
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | September 8, 2014 |
Latest Amendment Date: | September 8, 2014 |
Award Number: | 1441710 |
Award Instrument: | Standard Grant |
Program Manager: |
Sandip Kundu
CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | October 1, 2014 |
End Date: | September 30, 2018 (Estimated) |
Total Intended Award Amount: | $307,000.00 |
Total Awarded Amount to Date: | $307,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
300 TURNER ST NW BLACKSBURG VA US 24060-3359 (540)231-5281 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
Durham Hall Blacksburg VA US 24061-0001 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
With the tremendous growth of sensitive and security-critical processing on embedded and pervasive platforms, the threat model for secure electronics is expanding from software into hardware. A wide range of fault attacks, based on physical manipulation of the electronics operating environment, is now available to the adversary.
The major outcome of this project is FAME, a collection of hardware techniques for microprocessor architectures to detect these fault injection attacks, and to mitigate fault analysis through an appropriate response in software. The FAME processor is developed both as an architecture concept as well as a chip prototype.
The FAME processor uses fault countermeasures that combine fault detection in microprocessor hardware with fault response in the software application. The fault detection in hardware uses static (design-time) and dynamic (runtime) techniques for in-situ fault detection. These fault-detecting hardware extensions are optimized for power and cost, and they can be enabled from the software application. This flexibility allows FAME to support non-critical applications at full microprocessor performance, while still offering full fault countermeasures for security-critical applications. The FAME processor chip demonstrates these techniques, as well as novel forms of fault analysis that are investigated in tandem with the development of FAME.
The impacts of this project are safer, more trustworthy microprocessors that are aware of their physical environment and the threats it poses to their internal processing. Such microprocessors offer the basis for cyber-security applications that can handle both logical as well as physical threats.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
When software runs on a microprocessor, the software programmer implicitly assumes that the processor will execute every instruction correctly, precisely as it was written by the programmer.
In this project, we investigate fault attacks. A hacker can change the meaning of software instructions by introducing deliberate faults into the microprocessor. The hacker injects faults through manipulation of the microprocessor hardware environment, such by manipulating the power supply or the microprocessor clock. Such a hardware hacker hence uses defects of the hardware execution to introduce defects in software. The scenario of the hardware hacker is real and credible: it has been demonstrated to affect a broad range of computers. Furthermore, novel applications in the area of Cyber-Physical Systems and Internet of Things imply that the microprocessor hardware is often within easy reach of hackers, and that fault injection attacks a realistic threat.
The project has two main activities. First, we investigate the difficulty of performing these fault injection attacks on software. We use a simulation of a microprocessor, as well as a microprocessor prototype implementation. Second, we investigate how the microprocessor can be improved such that it can detect fault injection attacks, and respond to it. We use sensors that detect fault injection as it happens, and that alert the software of the security emergency.
The challenge of fault injection attacks on software is that it is hard to predict the effect of fault injection on the execution of software. Our work develops an attack called Differential Fault Intensity Analysis. It takes away the biggest factor of uncertainty in conduction fault injection, namely the requirement to understand the exact nature of the fault. We demonstrate DFIA on multiple hardware and software targets, including cryptographic software and system software.
We also develop two chips, FAME1 and FAME2, which demonstrate countermeasures against fault injection attacks. The chips have fault injection sensors that detect various methods of fault injection using electromagnetic pulses and power supply pulses. We demonstrate the operation of these chips and their correct response to fault injection.
This project supports the graduate research project of 2 PhD level students and 3 Master level students. The project results are written up in 4 Journal level papers, 10 Conference level papers and one Book Chapter. The FAME1 design won the Best Hardware Demo Award at the 2017 IEEE Hardware Oriented Security and Trust Symposium.
Last Modified: 10/30/2018
Modified by: Patrick Schaumont
Please report errors in award information by writing to: awardsearch@nsf.gov.