Quick Nav
Course Information
Schedule
Assignments
Resources
Syllabus – 5013
Course Information
Instructor: Alexander Nelson, ahnelson-at-uark.edu
Lecture: T/Th – 9:30-10:45, JBHT 236
Office Hours: T/Th 3:30-5:00 and by appointment
Schedule
Date |
Notes |
Info |
---|---|---|
01/18/22 | Syllabus, COVID-19 Policies, Introduction | Reading 1: Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL, and Wi-Fi |
1/20/22 | No Class – Snow Day | Alternative Instruction – Finish Readings |
1/25/22 | Presentation 1 – Disrupting Continuity of Apple’s Wireless Ecosystem Security Lecture 2 – Review of Embedded |
|
1/27/22 | Distribute Chipwhisperers | |
2/1/22 | Chipwhisperer Introduction Chipwhisperer 2_1A |
Reading 2: Mangard, Stefan. “A simple power-analysis (SPA) attack on implementations of the AES key expansion.” In International Conference on Information Security and Cryptology, pp. 343-358. Springer, Berlin, Heidelberg, 2002. |
2/3/22 | No Class – Snow Day | Alternative Instruction – Chipwhisperer 2_B |
2/8/22 | Presentation 2 – SPA on AES Review Chipwhisperer 2_1B – Simple power analysis Chipwhisperer 3_1 – Large Hamming Weight Swings |
Reading 3: One, Aleph. “Smashing the stack for fun and profit.” Phrack magazine 7, no. 49 (1996): 14-16. (URL) |
2/10/22 | Presentation 3 – Stack Smashing Lecture 3 – Symmetric Encryption |
|
2/15/22 | Python Implementation of AES – Link | Reading 4: Clark, Shane S., Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, and Wenyuan Xu. “Current events: Identifying webpages by tapping the electrical outlet.” In European Symposium on Research in Computer Security, pp. 700-717. Springer, Berlin, Heidelberg, 2013. (URL) |
2/17/22 | Presentation 4 – Current Events Chipwhisperer 3_2 – Recovering Data from a Single Bit |
|
2/22/22 | Lecture 4 – Serial Communications (and how to exploit them!) Chipwhisperer 3_3 – DPA on Firmware Implementation of AES |
Reading 5: Kocher, Paul, Joshua Jaffe, and Benjamin Jun. “Differential power analysis.” In Annual international cryptology conference, pp. 388-397. Springer, Berlin, Heidelberg, 1999. (URL) |
2/24/22 | Snow Day – Alternative Education | |
3/1/22 | Presentation 5 – Differential Power Analysis Grade Assignment 1 |
Reading 6: Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg et al. “Spectre attacks: Exploiting speculative execution.” In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1-19. IEEE, 2019. (URL) |
3/3/22 | Presentation 6 – Spectre Attacks Finish Chipwhisperer 3_3 |
|
3/8/22 | Lecture 5 – Power Analysis Chipwhisperer 4_1 – Hamming Weights |
Reading 7: Checkoway, Stephen, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. “Comprehensive experimental analyses of automotive attack surfaces.” In 20th USENIX Security Symposium (USENIX Security 11). 2011. (URL) |
3/10/22 | Presentation 7 — Checkoway Chipwhisperer 4_2 – Correlation Power Attacks |
|
3/15/22 | Lecture 6 — Preventing Side Channel Analysis | Reading 8: D. Halperin et al., “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses,” 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008, pp. 129-142, doi: 10.1109/SP.2008.31. (URL) |
3/17/22 | Presentation 8 — Halperin Lecture 7 — Generalizing Our Attack Model |
|
3/22/22 | No Class – Spring Break | |
3/24/22 | No Class – Spring Break | |
3/29/22 | Lecture 8 — Introduction to Fault Injection | Reading 9: Kune, Denis Foo, John Backes, Shane S. Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. “Ghost talk: Mitigating EMI signal injection attacks against analog sensors.” In 2013 IEEE Symposium on Security and Privacy, pp. 145-159. IEEE, 2013. (URL) |
3/31/22 | Presentation 9 — Kune Finish Lecture 8 Chipwhisperer Fault 101: 1_1 |
|
4/5/22 | Lecture 9 — Fault Injection Continued Chipwhisperer Fault 101:1_2 |
Reading 10:
Razavi, Kaveh, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. “Flip feng shui: Hammering a needle in the software stack.” In 25th USENIX Security Symposium (USENIX Security 16), pp. 1-18. 2016. (URL)
|
4/7/22 | Presentation 10 – Razavi 2016 Finish Chipwhsperer Fault 101:1_2 Chipwhisperer Fault 101:1_3 |
|
4/12/22 | Lecture 10 – Secure RTOS | Reading 11: Maji, Saurav, Utsav Banerjee, and Anantha P. Chandrakasan. “Leaky nets: Recovering embedded neural network models and inputs through simple power and timing side-channels—Attacks and defenses.” IEEE Internet of Things Journal 8, no. 15 (2021): 12079-12092. (URL) |
4/14/22 | Presentation 11 – Maji 2021 Finish Lecture 10 |
|
4/19/22 | Final Project Day | |
4/21/22 | Presentation 12 | |
4/26/22 | Final Project Day | |
4/28/22 | Presentation 13 | |
5/3/22 | Presentation 14 | |
5/5/22 | Final Project Day |
Assignments
All dates are tentative and subject to change.
Date Assigned |
Date Due |
Assignment |
Info |
---|---|---|---|
2/17/2022 | 2/25/2022 | Assignment 1 | |
3/1/2022 | 4/1/2022 | Assignment 2 | |
4/21/2022 | 5/5/2022 | Assignment 3 |
Resources
Type |
Links |
---|---|
Course Textbook (Optional) | The Hardware Hacking Handbook:
Breaking Embedded Security with Hardware Attacks
|
Chipwhisperer GitHub | https://github.com/newaetech/chipwhisperer |
Class Discord | Invite Link |