With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on th...With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.展开更多
With the rapid development of information technology,data has become the cornerstone of digitalization,networking,and intelligence,profoundly impacting various sectors including production,distribution,circulation,con...With the rapid development of information technology,data has become the cornerstone of digitalization,networking,and intelligence,profoundly impacting various sectors including production,distribution,circulation,consumption,and social service management.As the core resource of the digital economy and information society,the economic and social value of big data is increasingly prominent,yet it has also become a prime target for cyberattacks.In the face of a complex and ever-changing data environment and advanced cyber threats,traditional big data security technologies such as Hadoop and other mainstream technologies are proving inadequate in ensuring data security and compliance.Consequently,cryptography-based technologies such as fully encrypted execution environments and efficient data encryption and decryption have emerged as new directions for security protection in the field of big data.This paper delves into the latest advancements and challenges in this area by exploring the current state of big data security,the principles of endogenous security technologies,practical applications,and future prospects.展开更多
基金This work was partially supported by the National Natural Science Foundation of China(Nos.61872243 and U1713212)Guangdong Basic and Applied Basic Research Foundation(No.2020A1515011489)+1 种基金the Natural Science Foundation of Guangdong Province-Outstanding Youth Program(No.2019B151502018)Shenzhen Science and Technology Innovation Commission(No.R2020A045).
文摘With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem today.IoT security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption key.To understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 certification.Our analysis shows that the chip leaks part of the encryption key and presents a considerable security risk.Specifically,we use commodity equipment to collect electromagnetic traces of the chip.Using a statistical T-test,we find that the target chip has physical leakage during the AES encryption process.We further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption operation.On the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption key.We repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption key.Therefore,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical leakage.Upper layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.
文摘With the rapid development of information technology,data has become the cornerstone of digitalization,networking,and intelligence,profoundly impacting various sectors including production,distribution,circulation,consumption,and social service management.As the core resource of the digital economy and information society,the economic and social value of big data is increasingly prominent,yet it has also become a prime target for cyberattacks.In the face of a complex and ever-changing data environment and advanced cyber threats,traditional big data security technologies such as Hadoop and other mainstream technologies are proving inadequate in ensuring data security and compliance.Consequently,cryptography-based technologies such as fully encrypted execution environments and efficient data encryption and decryption have emerged as new directions for security protection in the field of big data.This paper delves into the latest advancements and challenges in this area by exploring the current state of big data security,the principles of endogenous security technologies,practical applications,and future prospects.