学位论文详细信息
Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect
Security;System;Memory Remanence;Approximate Computing;Computer Science;Engineering;Computer Science & Engineering
Rahmati, AmirHoneyman, Peter ;
University of Michigan
关键词: Security;    System;    Memory Remanence;    Approximate Computing;    Computer Science;    Engineering;    Computer Science & Engineering;   
Others  :  https://deepblue.lib.umich.edu/bitstream/handle/2027.42/136985/rahmati_1.pdf?sequence=1&isAllowed=y
瑞士|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

In computer systems, manufacturing variances and hardware effects are typically abstracted away by the software layer. This dissertation explores how these effects, specifically memory remanence, can be used both as an attack vector and a tool to defend emerging computing systems. To achieve this, we show how time-keeping, anonymity, and authenticity can be affected by memory remanence. In terms of attacks, we explore the deanonymizing effect of approximate computing in the context of approximate memory in Probable Cause. We show how data passing through an approximate memory is watermarked with a device specific tag that points the attacker back to the device. In terms of defenses, we first present TARDIS: an approach to provide a notion of time for transiently powered embedded devices without requiring any hardware modification using remanence effect of SRAM. TARDIS allows these devices to keep a coarse-grained notion of time without the need for a running clock. Second, we propose data retention voltage of memory cells as a new type of physical unclonable function that allows for low-cost authentication and counterfeit resistance in computer systems.

【 预 览 】
附件列表
Files Size Format View
Attacking and Defending Emerging Computer Systems Using The Memory Remanence Effect 7619KB PDF download
  文献评价指标  
  下载次数:8次 浏览次数:16次