Presented at FPGA2013 http://fpganetworks.org/FPGA2013/
Abstract: Field programmable gate arrays (FPGA) are extensively used for rapid prototyping in embedded system applications. While hardware acceleration can be done via specialized processors like a Graphical Processing Unit (GPU), they can also be accomplished with FPGAs for more specialized scenarios. GPUs essentially consist of massively parallel cores and have high memory bandwidth; FPGAs, on the other hand, provide flexibility in terms of customizable I/O and computational resources. In this paper, we explore the usage of GPUs and FPGAs as cryptographic co-processors in streaming dataflow systems with huge rate of data inhalation. Two classic lightweight encryption algorithms, Tiny Encryption Algorithm (TEA) and Extended Tiny Encryption Algorithm (XTEA), are targeted for implementation on GPUs and FPGAs. The GPU implementations of TEA and XTEA in this study depict a maximum speedup of 13x over CPU based implementation. The pipelined FPGA implementation is able to realize a throughput of 6-9x more than the GPU for small plaintext sizes.
It’s hardly news that carriers traditional revenue streams are under threat, and the pressure to react and adapt is greater than ever. fring and the fring like, once a Foe or Frenemy are actually becoming true friends for the carriers.
With communication OTT high quality of service on 3G and LTE netwroks, with the boarder lines between carriers and enterprise getting blurry .... and with consumers seeking features and capabilities from their devices and provider beyond price. It is mandatory by carries to leap into the OTT space. It's a reality
Attached presentation i have done with several leading carriers in Europe
La Corda D'Oro: Brand New Breeze for Violinsayakahime
Disponível originalmente no site Anime Keys, estou fazendo upload para que a partitura não se perca!
Música de abertura do anime La Corda D'Oro, Brand New Breeze, interpretada por Kanon, e transcrita por InfinityEX.
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
In this work, we propose a modified DEFENSE architecture termed as xDEFENSE that can detect and react to hardware attacks in real-time. In the past, several Root of Trust architectures such as DEFENSE and RETC have been proposed to foil attempts by hardware Trojans to leak sensitive information. In a typical Root of Trust architecture scenario, hardware is allowed to access the memory only by responding properly to a challenge requested by the memory guard. However in a recent effort, we observed that these architectures can in fact be susceptible to a variety of threats ranging from denial of service attacks, privilege escalation to information leakage, by injecting a Trojan into the Root of Trust modules such as memory guards and authorized hardware. In our work, we propose a security monitor that monitors all transactions between the authorized hardware, memory guard and memory. It also authenticates these components through the use of Hashed Message Authentication Codes (HMAC) to detect any invalid memory access or denial of service attack by disrupting the challenge-response pairs. The proposed xDEFENSE architecture was implemented on a Xilinx SPARTAN 3 FPGA evaluation board and our results indicate that xDEFENSE requires 143 additional slices as compared to DEFENSE and incurs a monitoring latency of 22ns.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
Hardware Trojan Threats (HTTs) are stealthy components embedded inside integrated circuits (ICs) with an intention to attack and cripple the IC similar to viruses infecting the human body. HTTs are easily introduced into the IC using untrusted tools and unauthenticated intellectual property (IP). Previous efforts have focused essentially on systems being compromised using HTTs and the effectiveness of physical parameters including power consumption, timing variation and utilization for detecting HTTs. Less attention has been devoted to the monitoring of the system to analyze the HTT infection using a combination of affected physical parameters. We propose a novel metric for hardware Trojan detection, termed as HTT detectability metric (HDM) that leverages a weighted combination of normalized physical parameters. As opposed to existing studies, this work investigates a system model from a designer perspective in increasing the security of the device and an adversary model from an attacker perspective exposing and exploiting the vulnerabilities in the device. Based on the models, seven malicious HTTs were designed and implemented on a FPGA testbed to perform a variety of threats ranging from sensitive information leak, denial of service to beat the Root of Trust (RoT). Security analysis on the implemented Trojans clearly showed that existing detection techniques based on physical characteristics such as power consumption, timing variation or utilization does not necessarily capture the existence of HTTs as HTTs can be optimally designed and placed into the hardware that masks within these parameters. Our results showed that using HDM, 86% of the implemented Trojans were detected as opposed to using power, timing and utilization alone.
More Related Content
Similar to Hardware acceleration of TEA and XTEA algorithms on FPGA, GPU and multi-core processors
It’s hardly news that carriers traditional revenue streams are under threat, and the pressure to react and adapt is greater than ever. fring and the fring like, once a Foe or Frenemy are actually becoming true friends for the carriers.
With communication OTT high quality of service on 3G and LTE netwroks, with the boarder lines between carriers and enterprise getting blurry .... and with consumers seeking features and capabilities from their devices and provider beyond price. It is mandatory by carries to leap into the OTT space. It's a reality
Attached presentation i have done with several leading carriers in Europe
La Corda D'Oro: Brand New Breeze for Violinsayakahime
Disponível originalmente no site Anime Keys, estou fazendo upload para que a partitura não se perca!
Música de abertura do anime La Corda D'Oro, Brand New Breeze, interpretada por Kanon, e transcrita por InfinityEX.
xDEFENSE: An Extended DEFENSE for mitigating Next Generation IntrusionsVivek Venugopalan
In this work, we propose a modified DEFENSE architecture termed as xDEFENSE that can detect and react to hardware attacks in real-time. In the past, several Root of Trust architectures such as DEFENSE and RETC have been proposed to foil attempts by hardware Trojans to leak sensitive information. In a typical Root of Trust architecture scenario, hardware is allowed to access the memory only by responding properly to a challenge requested by the memory guard. However in a recent effort, we observed that these architectures can in fact be susceptible to a variety of threats ranging from denial of service attacks, privilege escalation to information leakage, by injecting a Trojan into the Root of Trust modules such as memory guards and authorized hardware. In our work, we propose a security monitor that monitors all transactions between the authorized hardware, memory guard and memory. It also authenticates these components through the use of Hashed Message Authentication Codes (HMAC) to detect any invalid memory access or denial of service attack by disrupting the challenge-response pairs. The proposed xDEFENSE architecture was implemented on a Xilinx SPARTAN 3 FPGA evaluation board and our results indicate that xDEFENSE requires 143 additional slices as compared to DEFENSE and incurs a monitoring latency of 22ns.
Design, Implementation and Security Analysis of Hardware Trojan Threats in FPGAVivek Venugopalan
Hardware Trojan Threats (HTTs) are stealthy components embedded inside integrated circuits (ICs) with an intention to attack and cripple the IC similar to viruses infecting the human body. HTTs are easily introduced into the IC using untrusted tools and unauthenticated intellectual property (IP). Previous efforts have focused essentially on systems being compromised using HTTs and the effectiveness of physical parameters including power consumption, timing variation and utilization for detecting HTTs. Less attention has been devoted to the monitoring of the system to analyze the HTT infection using a combination of affected physical parameters. We propose a novel metric for hardware Trojan detection, termed as HTT detectability metric (HDM) that leverages a weighted combination of normalized physical parameters. As opposed to existing studies, this work investigates a system model from a designer perspective in increasing the security of the device and an adversary model from an attacker perspective exposing and exploiting the vulnerabilities in the device. Based on the models, seven malicious HTTs were designed and implemented on a FPGA testbed to perform a variety of threats ranging from sensitive information leak, denial of service to beat the Root of Trust (RoT). Security analysis on the implemented Trojans clearly showed that existing detection techniques based on physical characteristics such as power consumption, timing variation or utilization does not necessarily capture the existence of HTTs as HTTs can be optimally designed and placed into the hardware that masks within these parameters. Our results showed that using HDM, 86% of the implemented Trojans were detected as opposed to using power, timing and utilization alone.
http://www.dur.ac.uk/cfai/adaptiveoptics/rtc2011/agenda/abstracts/#VV1
Vivek Venugopal (National Solar Observatory): Real-time control for the Advanced Technology Solar Telescope (20 minutes)
Real-time processing for Adaptive Optics (AO) systems is challenging as the motion vectors have to be computed to properly actuate the mirrors before the wavefront information has become obsolete. The four meter Advanced Technology Solar Telescope (ATST) will provide unprecedented resolution for solar observation due to its larger aperture. The ATST AO system with 2 kHz frame rate camera, 1750 sub-apertures and 1900 actuators requires massive parallel processing and this increased demand in computational horsepower is far from being manageable by conventional processors. Hardware accelerators such as Field Programmable Gate Array (FPGA) and Graphics Processing Unit (GPU) are better equipped to harness the the parallel processing requirements of such a system. We investigate the implementation of the data processing architecture for Shack-Hartmann correlation and the wavefront reconstruction using FPGAs and GPUs. We benchmark the AO algorithm implemented using FPGAs and GPUs and compare it with the existing legacy FPGA-Digital Signal Processing (DSP) based hardware system used in the 76cm Dunn Solar Telescope(DST).
Accelerating Particle Image Velocimetry using Hybrid ArchitecturesVivek Venugopalan
High Performance Computing (HPC) applications are mapped to a cluster of multi-core processors communicating using high speed interconnects. More computational power is harnessed with the addition of hardware accelerators such as Graphics Processing Unit (GPU) cards and Field Programmable Gate Arrays (FPGAs). Particle Image Velocimetry (PIV) is an embarrassingly parallel application that can benefit from acceleration using hybrid architectures. The PIV application is mapped to a Nvidia GPU system, resulting in 3x speedup over a dual quad-core Intel processor implementation. The design methodology used to implement the PIV application on a specialized FPGA platform under development is described in brief and the resulting performance benefit is analyzed.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Hardware acceleration of TEA and XTEA algorithms on FPGA, GPU and multi-core processors
1. Hardware Acceleration of TEA and XTEA Algorithms on FPGA, GPU and
Multi-Core Processors
Vivek Venugopal and Devu Manikantan Shila {venugov, manikad}@utrc.utc.com
Introduction Tiny Encryption Algorithm (TEA) Extended Tiny Encryption Algorithm (XTEA)
half round1 half round 2 half round1 half round 2
v1 32
32 v1 32 << 4 32
<< 4
<< 4 << 4
k0 32 + k2 32 + v1 32
>> 5
XOR
32
>> 5
XOR
v1 32 32
v1 32
32 + XOR
32 + XOR + +
sum sum
Gateway to 32 32 32 32
v1 >> 5 >> 5 sum0 ky
Internet
GPU + ARM (NVIDIA CARMA) k1 32 + XOR k3 32 + XOR
kx 32 + XOR
sum1 32 + XOR
v1_new
v1_new
Planning 32 +/- v0_new 32 +/- 32 +/- 32 +/-
v0 v1 v0 v0_new v1
Computer
encrypt/decrypt encrypt/decrypt
Encrypted communication
Flight Control and
Navigation Computer • TEA uses addition, XOR and shift operations on 32-bit words • The Extended Tiny Encryption Algorithm (XTEA) was introduced after
and has a very small code footprint. weaknesses for smaller rounds were found in TEA.
Smart meter application FPGA + ARM (Xilinx Zynq)
Unmanned Autonomous Vehicle • TEA has security holes and weaknesses for smaller rounds, • In XTEA, the key scheduling is modified to reflect different patterns for
especially the Avalanche Effect seen for 6 rounds mixing the data and key continuously per round.
• In smart grids, sensitive information such as power
consumption, price update, or outage awareness is
exchanged between the meters and the power utility
Implementation platforms and Results 8000
8000 Intel Xeon X5650 Nvidia C2070
company in real-time over the Internet. • Nvidia's Tesla C2070 high-end GPU, 2 hexa-core Intel Xeon X5650
Nvidia C2070
Intel Quad core i7 Nvidia GT650M
• Unmanned Autonomous Vehicles (UAV) continuously Intel Xeon processors, Nvidia's GeForce GT 650M Intel Quad core i7
Nvidia GT650M 6000
Zynq
exchange dynamic information regarding the urban notebook GPU consisting of 384 cores, quad-core 6000
Throughput in Mbps
Zynq
Throughput in Mbps
environment with a gateway. The gateway also provides Intel Core i7 CPU.
feedback regarding the optimization parameters that • Xilinx's Zynq-7000 SoC ZC702 evaluation board. 4000
4000
need to be fed into the UAV's path planning algorithm The Zynq-7000 platform consists of a dual ARM
for mapping different routes to reach it's destination Cortex A-9 processor clocked at 800 MHz and 2000
2000
safely. Artix-7 FPGA as the programmable logic. Streaming Multiprocessor (SMX) Architecture
Kepler GK110’s new SMX introduces several architectural innovations that make it not only the most
• Cyber attacks on such critical and dynamic
powerful multiprocessor we’ve built, but also the most programmable and power efficient.
Copy input data and
keys to GPU memory
0
information can lead to severe losses of 0
8 KB 16 KB 8 MB 128 MB 1 GB
8 KB 16 KB 8 MB 128 MB 1 GB
resources and finance. SMX
Control Logic
SMX
Control Logic
pre-compute sum values
for each round and store
in shared memory Plaintext size
Plaintext size
Throughput (Mbps) comparison of TEA Throughput (Mbps) comparison of XTEA
Motivation calculate ciphers for
blocks in parallel
• All the information from/to these smart meters need GT650M: 2 SMX with
copy ciphers back to
CPU
Conclusion
to be decrypted/encrypted at the gateway, which in 192 cores each Inside SMX GPU Implementation
• GPUs and FPGAs provide better throughput for both TEA and XTEA as
SMX: 192 single precision CUDA cores, 64 double precision units, 32 special function units (SFU), and 32 load/store units
(LD/ST).
turn can lead to very large response times. A larger
compared to CPUs.
Flash DRAM SRAM
response time implies poorer performance in terms of
both throughput and latency.
GIGe
USB
Processing
System
Memory
Interfaces Custom
Displays
PCIe Running on Zynq board Running in ISIM
• FPGAs perform better for smaller plaintext sizes whereas GPUs are better for
larger plaintext sizes.
• Continuous transmission of data from UAV regarding CAN
AXI Interconnect
• In terms of development time and cost, GPUs are better suited as embedded
Dual ARM Cortex A-9
Fixed MPCore (800 MHz)
I2C Peripheral
peripherals
the evidence grid need to be encrypted fast.
SelectIO
Resources
Processing Programmable
SD System Logic
cryptography co-processors as compared to FPGAs.
JTAG
• FPGAs and GPUs can be used in gateways to speed
UART
2x 12-bit
Custom Programmable
• Future research efforts may address the use of Zynq platform as a complete, low-
GPIO MSPS ADC Memory
Logic
up the TEA/XTEA encryption and decryption of bulk
information for improved throughput and latency.
Analog Monitors Analog
cost cryptographic co-processor for more complex cryptographic algorithms
Zynq Internal block diagram Hardware in Loop setup
References
[1] D. J. Wheeler and R. M. Needham. TEA, a tiny encryption algorithm, 1995.
[2] D. J. Wheeler and R. M. Needham. TEA extensions. Technical report, Cambridge University, England, October 1997.
[3] Xilinx Inc. Xilinx Zynq-7000 SoC ZC702 Evaluation kit.
[4] Nvidia Inc. (Last Accessed: February 2012) Nvidia Tesla C2070 GPU Computing Processor, Nvidia GeoForce GT650M Notebook GPU [Available Online]