Showing 1-25 of 89 results

Filter Results

Show

Results

In this article, we introduce a novel approach to achieving lightweight device authentication through the use of a low-complexity Convolutional Neural Network (CNN). In our work, we improve the False Authentication Rate (FAR) by transforming the standard CNN into a Bayesian CNN (BCNN or BNN). This transformation enables the use of probabilistic modelling techniques, increasing the model’s robustne...Show More
This work investigates the potential of temperature-dependent resistors to serve as Physical Unclonable Functions (PUFs). Five types of temperature-dependent resistors were subjected to testing at four different temperatures. The analysis of the collected data revealed patterns and trends that do not immediately qualify the devices as PUFs, but indicate their potential to be utilised for the reali...Show More
The automotive industry undergoes significant advancements in terms of speed, processes, methods, and technology. A notable focus on autonomous driving gains widespread attention, leading various research groups to work on its development. The continuous development, especially with the introduction of digitization, expands the attack surface, emphasizing the need for enhanced vehicular security. ...Show More
In this work, we analyse Commercial Off-The-Shelf (COTS) Resistive Random Access Memory (ReRAM) modules for their suitability to implement a novel runtime-accessible True Random Number Generator (TRNG). For this purpose, modules from two different manufacturers (Adesto Technologies and Fujitsu) were tested, which exhibited distinct characteristics under different conditions. If suitable parameters...Show More
This work expands the current state of the art in the field of chaos-based cryptography, by removing the need for a dedicated synchronisation line that provides a shared information channel between the relevant transmitter and the receiver devices. We present two different real-world implementations of a secure digital communication system based on chaotic circuits that are synchronised without a ...Show More
In this work, we present a secure communication system based on synchronised Lorenz chaotic circuits. Drawing inspiration from similar works based on nonlinear Chua circuits, our secure communication system is based upon the synchronisation of two Lorenz circuits. One of these nonlinear circuits is incorporated into the transmitter and the other one into the receiver. Both of these circuits are se...Show More
In this paper, we investigate the security implications of virtualized and software-based Open Radio Access Network (RAN) systems, specifically focusing on the architecture proposed by the O-RAN ALLIANCE and O-Cloud deployments based on the O-RAN Software Community (OSC) stack and infrastructure. Our key findings are based on a thorough security assessment and static scanning of the OSC Near Real-...Show More
The Raspberry Pi 3B+ is a well-known single-board computer that can be used to implement and test a number of hardware security primitives suitable for Commercial Off-The-Shelf (COTS) devices. However, the software that implements and tests these primitives is rarely made fully available as open-source code. In this work, we present and discuss open-source software for the Raspberry Pi that enable...Show More
This work studies the effects of thermal stress on Dynamic Random-Access Memory (DRAM) retention-based Physical Unclonable Functions (PUFs) based on Commercial Off-The-Shelf (COTS) Single-Board Computer (SBC) modules. Our results show that prolonged thermal stress, in general, leads to a decrease in the entropy of the responses of this PUF (as the number of bit flips is reduced) and a loss of its ...Show More
In this paper, we present a new methodology that enables the MITRE ATT&CK framework to objectively assess specific threats in 6G Radio Access Networks (RANs). This helps address new security challenges that arise in the transition to open RANs. We analyze the O-Cloud component within the O-RAN ecosystem as a representative example, wherein no individual threat class demonstrates complete security....Show More
The Automotive Service-Oriented software Architecture (ASOA) is a framework for the effective design, fast deployment, and efficient maintenance of automotive software architectures, facilitating reliable communication among loosely coupled services. It maintains a global view of functional units, allowing them to be updated, replaced, and reconnected so that road vehicles obtain or lose capabilit...Show More
In this work, we study the possibility of utilizing an LED-LDR pair for generating a Physical Unclonable Function. Towards this, the nonlinear response between an optically cou-pled LED-LDR pair, as well as the dynamic behavior of the LDR, were considered. The resulting behavior was highly nonlinear and strongly dependent on the actual physical properties of the components. We tested the idea usin...Show More
In this paper, we introduce Over-the-Air Multi-Party Communication, a novel approach to achieve efficiently scalable, private, secure, and dependable data aggregation using Over-the-Air computation. The main idea of our approach lies in a combination of techniques from lattice coding, Over-the-Air computation and secure Multi-Party Computation to securely and confidentially aggregate data over a m...Show More
Physical Unclonable Functions (PUFs) are increasingly used in the process of securing applications. For this purpose, it is crucial that the PUF satisfies all the required properties adequately, including Unpredictability. An important aspect of Unpredictability is Randomness, which includes being free of spatial correlation effects. However, most methods for assessing randomness are not capable o...Show More
In this work, we present a novel method of increasing the entropy of the CNT-PUF, a Physical Unclonable Function (PUF) based on Carbon-NanoTube Field Effect Transistors (CNT-FETs). The binary responses of this PUF are based on the drain current ID of each CNT-FET under the influence of a particular gate-source voltage VGS, which, through the employment of a single threshold value for I D, can indi...Show More
In this work, we present a device-based approach for a Single Sign-On (SSO) system that can be used for user authentication to web services hosted by remote servers. Our approach is based on the utilisation of intrinsic Physical Unclonable Functions (PUFs) and each user's credentials in the context of the Operating System (OS) found on the device. We examine the security and privacy benefits and d...Show More
This study addresses the vulnerability of Matter networks against reactive jamming attacks in Internet of Things (IoT) solutions. Through an analysis of various scenarios, we provide empirical evidence demonstrating the substantial threat posed by these attacks, as indicated by their exceptionally high success rate of 91%. Additionally, we identify significant weaknesses in the jamming detection m...Show More
This paper presents a cascading scheme designed to measure and validate the software integrity of interconnected and automated road vehicles. With modern vehicular architectures decoupling hardware from specific functions and supporting frequent updates, we require proactive means to detect software manipulations, especially as compromised control units pose a severe risk to passenger safety. Ther...Show More
In this work, we explore a highly robust and unique Physical Unclonable Function (PUF) based on the stochastic assembly of single-walled Carbon NanoTubes (CNTs) integrated by a cost-efficient printing approach on 200mm silicon wafers. PUFs are hardware security primitives that leverage small physical variations to generate device fingerprints that are hard to simulate or clone. Our work demonstrat...Show More
We conduct a comprehensive analysis of Channel-based Key Extraction across various frequency ranges that have potential applications in the 6th generation mobile standard. Specifically, we examine the minimum distance required between an attacker and a legitimate entity to achieve secure key generation through channel measurement. By simulating various metrics across diverse configurations, we obs...Show More
The ubiquity and pervasiveness of modern Internet of Things (IoT) devices opens up vast possibilities for novel applications, but simultaneously also allows spying on, and collecting data from, unsuspecting users to a previously unseen extent. This paper details a new attack form in this vein, in which the decay properties of widespread, off-the-shelf DRAM modules are exploited to accurately spy o...Show More
In this work, we present a Physical Unclonable Function (PUF) implemented on a Commercial Off-The-Shelf (COTS) NAND Flash memory module using programming disturbances, and examine the robustness of its responses to environmental variations. In particular, we test a removable Flash memory module serving as a PUF, under nominal conditions, as well as under temperature and voltage variations. To dete...Show More
Modern cars offer one common interface to the outside, the OBD. Among the multitude of protocols that could exchange messages with the car's internal devices over OBD the CAN-BUS protocol is the most well-known; several commercial devices (so-called dongles) would allow to send and receive messages without any user-controlled restrictions. In order to enable fine-grained filtering on the CAN - BUS...Show More
Our work proposes a characterisation and testing methodology, as well as the relevant custom implementation, for measuring novel digital security circuits that use nanomaterial-based Physical Unclonable Functions (PUFs) as their security anchors. Although in this work we focus on PUFs that utilise the electrical characteristics of a crossbar structure of Carbon NanoTube (CNT) cells, the proposed m...Show More
Timing-based side and covert channels in processor caches continue to be a threat to modern computers. This work shows for the first time, a systematic, large-scale analysis of Arm devices and the detailed results of attacks the processors are vulnerable to. Compared to x86, Arm uses different architectures, microarchitectural implementations, cache replacement policies, etc., which affects how at...Show More