CSCE 5013 – Embedded System Security (Spring 2022)

Quick Nav

Course Information
Schedule
Assignments
Resources
Syllabus – 5013

Course Information

Instructor: Alexander Nelson, ahnelson-at-uark.edu
Lecture: T/Th – 9:30-10:45, JBHT 236
Office Hours: T/Th 3:30-5:00 and by appointment

Schedule

 

 

Date

Notes

Info

01/18/22 Syllabus, COVID-19 Policies, Introduction Reading 1: Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy,
AWDL, and Wi-Fi
1/20/22 No Class – Snow Day Alternative Instruction – Finish Readings
1/25/22 Presentation 1 – Disrupting Continuity of Apple’s Wireless Ecosystem Security
Lecture 2 – Review of Embedded
1/27/22 Distribute Chipwhisperers
2/1/22 Chipwhisperer Introduction
Chipwhisperer 2_1A
Reading 2: Mangard, Stefan. “A simple power-analysis (SPA) attack on implementations of the AES key expansion.” In International Conference on Information Security and Cryptology, pp. 343-358. Springer, Berlin, Heidelberg, 2002.
2/3/22 No Class – Snow Day Alternative Instruction – Chipwhisperer 2_B
2/8/22 Presentation 2 – SPA on AES
Review Chipwhisperer 2_1B – Simple power analysis
Chipwhisperer 3_1 – Large Hamming Weight Swings
Reading 3: One, Aleph. “Smashing the stack for fun and profit.” Phrack magazine 7, no. 49 (1996): 14-16. (URL)
2/10/22 Presentation 3 – Stack Smashing
Lecture 3 – Symmetric Encryption
2/15/22 Python Implementation of AES – Link Reading 4: Clark, Shane S., Hossen Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, and Wenyuan Xu. “Current events: Identifying webpages by tapping the electrical outlet.” In European Symposium on Research in Computer Security, pp. 700-717. Springer, Berlin, Heidelberg, 2013. (URL)
2/17/22  Presentation 4 – Current Events
Chipwhisperer 3_2 – Recovering Data from a Single Bit
2/22/22 Lecture 4 – Serial Communications (and how to exploit them!)
Chipwhisperer 3_3 – DPA on Firmware Implementation of AES
Reading 5: Kocher, Paul, Joshua Jaffe, and Benjamin Jun. “Differential power analysis.” In Annual international cryptology conference, pp. 388-397. Springer, Berlin, Heidelberg, 1999. (URL)
2/24/22  Snow Day – Alternative Education
3/1/22  Presentation 5 – Differential Power Analysis
Grade Assignment 1
Reading 6: Kocher, Paul, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg et al. “Spectre attacks: Exploiting speculative execution.” In 2019 IEEE Symposium on Security and Privacy (SP), pp. 1-19. IEEE, 2019. (URL)
3/3/22 Presentation 6 – Spectre Attacks
Finish Chipwhisperer 3_3
3/8/22 Lecture 5 – Power Analysis
Chipwhisperer 4_1 – Hamming Weights
Reading 7: Checkoway, Stephen, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. “Comprehensive experimental analyses of automotive attack surfaces.” In 20th USENIX Security Symposium (USENIX Security 11). 2011. (URL)
3/10/22 Presentation 7 — Checkoway
Chipwhisperer 4_2 – Correlation Power Attacks
3/15/22 Lecture 6 — Preventing Side Channel Analysis Reading 8: D. Halperin et al., “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses,” 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008, pp. 129-142, doi: 10.1109/SP.2008.31. (URL)
3/17/22 Presentation 8 — Halperin
Lecture 7 — Generalizing Our Attack Model
3/22/22 No Class – Spring Break
3/24/22 No Class – Spring Break
3/29/22 Lecture 8 — Introduction to Fault Injection Reading 9: Kune, Denis Foo, John Backes, Shane S. Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, and Wenyuan Xu. “Ghost talk: Mitigating EMI signal injection attacks against analog sensors.” In 2013 IEEE Symposium on Security and Privacy, pp. 145-159. IEEE, 2013. (URL)
3/31/22 Presentation 9 — Kune
Finish Lecture 8
Chipwhisperer Fault 101: 1_1
4/5/22 Lecture 9 — Fault Injection Continued
Chipwhisperer Fault 101:1_2
Reading 10:

Razavi, Kaveh, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. “Flip feng shui: Hammering a needle in the software stack.” In 25th USENIX Security Symposium (USENIX Security 16), pp. 1-18. 2016. (URL)
4/7/22 Presentation 10 – Razavi 2016
Finish Chipwhsperer Fault 101:1_2
Chipwhisperer Fault 101:1_3
4/12/22 Lecture 10 – Secure RTOS Reading 11:
Maji, Saurav, Utsav Banerjee, and Anantha P. Chandrakasan. “Leaky nets: Recovering embedded neural network models and inputs through simple power and timing side-channels—Attacks and defenses.” IEEE Internet of Things Journal 8, no. 15 (2021): 12079-12092. (URL)
4/14/22 Presentation 11 – Maji 2021
Finish Lecture 10
4/19/22 Final Project Day
4/21/22 Presentation 12
4/26/22 Final Project Day
4/28/22 Presentation 13
5/3/22 Presentation 14
5/5/22 Final Project Day

Assignments

All dates are tentative and subject to change.

Date Assigned

Date Due

Assignment

Info

2/17/2022 2/25/2022 Assignment 1
3/1/2022 4/1/2022 Assignment 2
4/21/2022 5/5/2022 Assignment 3

 

Resources

Type

Links

Course Textbook (Optional) The Hardware Hacking Handbook:

Breaking Embedded Security with Hardware Attacks

by Colin O’Flynn and Jasper van Woudenberg

ISBN-13: 9781593278748
Chipwhisperer GitHub https://github.com/newaetech/chipwhisperer
Class Discord Invite Link