With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th...With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.展开更多
This study was conducted to examine the pol-lination characteristics of Eremurus anisopterus,an ephe-meroid plant in the Gurbantunggut Desert in Xinjiang,China.An integrative approach combining field studies with lab ...This study was conducted to examine the pol-lination characteristics of Eremurus anisopterus,an ephe-meroid plant in the Gurbantunggut Desert in Xinjiang,China.An integrative approach combining field studies with lab analysis was adopted.Pollen traps were used to measure air-borne pollen loads and artificial isolation experiments were applied to test the potentiality of cross-pollination or apomixes.Results show that the duration of the flowering of Eremurus anisopterus varied from late April to mid-May.Anthesis of a single flower often lasted for 1 d.However,if the daily maximum air temperature was under 20℃,the anthesis of a single flower could be prolonged up to 2 d.The pollen dispersion period of the single flower could last for 4 to 5 h,from 10:30 to 15:00 local time,with the duration of pollen dispersion for a single anther lasting approximately 40 min.The heterotypical maturation of the stigma could significantly prolong the pollen dispersion period of the single flower suggesting an adaptation to the habitat of E.anisopterus in the desert where the pollinators were not reliable.The timing of the blossoms of the ephemeroid plant show close correlations with the wind velocity and the habit and characteristics of the pollinators in the desert.Plant pollens may be spread to over 70 m by wind with approximately 60%of the pollens falling within 20 m away from the plant.Insects,especially bees,hover flies,flesh flies,mason bees and Halictus sp.were very important pollinators.Bees and hover flies usually landed on the yellowish green spot on the tepal and then entered the flower along the purple vein on the pink tepals.The yellowish green spot might be a mimetic structure of nectar that could attract insects to visit.This was also an adaptation of the plant to the sandy desert environment.A higher visiting frequency was reached between 10:30 and 13:30.The pollen-ovule ratio(P/O)of E.anisopterus(6164)suggested that the species was from cross-pollination according to Cruden’s criterion.However,the arti-ficial isolation experiment shows that E.anisopterus is self-compatible which might act as a compensation mechanism for the inadequate opportunities for breeding in the desert environment.Since there was no seed set in the bagged emasculated flowers,apomixes did not occur.In conclusion,E.anisopterus might adapt to the unreliable pollinator habits by self-pollination and by lengthening the pollen dispersion period of a single flower.展开更多
基金This work was partially supported by the National Natural Science Foundation of China(Nos.61872243 and U1713212)Guangdong Basic and Applied Basic Research Foundation(No.2020A1515011489)+1 种基金the Natural Science Foundation of Guangdong Province-Outstanding Youth Program(No.2019B151502018)Shenzhen Science and Technology Innovation Commission(No.R2020A045).
文摘With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.
文摘This study was conducted to examine the pol-lination characteristics of Eremurus anisopterus,an ephe-meroid plant in the Gurbantunggut Desert in Xinjiang,China.An integrative approach combining field studies with lab analysis was adopted.Pollen traps were used to measure air-borne pollen loads and artificial isolation experiments were applied to test the potentiality of cross-pollination or apomixes.Results show that the duration of the flowering of Eremurus anisopterus varied from late April to mid-May.Anthesis of a single flower often lasted for 1 d.However,if the daily maximum air temperature was under 20℃,the anthesis of a single flower could be prolonged up to 2 d.The pollen dispersion period of the single flower could last for 4 to 5 h,from 10:30 to 15:00 local time,with the duration of pollen dispersion for a single anther lasting approximately 40 min.The heterotypical maturation of the stigma could significantly prolong the pollen dispersion period of the single flower suggesting an adaptation to the habitat of E.anisopterus in the desert where the pollinators were not reliable.The timing of the blossoms of the ephemeroid plant show close correlations with the wind velocity and the habit and characteristics of the pollinators in the desert.Plant pollens may be spread to over 70 m by wind with approximately 60%of the pollens falling within 20 m away from the plant.Insects,especially bees,hover flies,flesh flies,mason bees and Halictus sp.were very important pollinators.Bees and hover flies usually landed on the yellowish green spot on the tepal and then entered the flower along the purple vein on the pink tepals.The yellowish green spot might be a mimetic structure of nectar that could attract insects to visit.This was also an adaptation of the plant to the sandy desert environment.A higher visiting frequency was reached between 10:30 and 13:30.The pollen-ovule ratio(P/O)of E.anisopterus(6164)suggested that the species was from cross-pollination according to Cruden’s criterion.However,the arti-ficial isolation experiment shows that E.anisopterus is self-compatible which might act as a compensation mechanism for the inadequate opportunities for breeding in the desert environment.Since there was no seed set in the bagged emasculated flowers,apomixes did not occur.In conclusion,E.anisopterus might adapt to the unreliable pollinator habits by self-pollination and by lengthening the pollen dispersion period of a single flower.