NoisFre: Noise-Tolerant Memory Fingerprints from Commodity Devices for Security Functions

09/07/2021
by   Yansong Gao, et al.
0

Given the ubiquity of memory in commodity electronic devices, fingerprinting memory is a compelling proposition, especially for low-end Internet of Things (IoT) devices where cryptographic modules are often unavailable. However, the use of fingerprints in security functions is challenged by the inexact reproductions of fingerprints from the same device at different time instances due to various noise sources causing, small, but unpredictable variations in fingerprint measurements. Our study formulates a novel and pragmatic approach to achieve the elusive goal of affording highly reliable fingerprints from device memories. We investigate the transformation of raw fingerprints into a noise-tolerant space where the generation of fingerprints from memory biometrics is intrinsically highly reliable. Further, we derive formal performance bounds to support practitioners to adopt our methods for practical applications. Subsequently, we demonstrate the expressive power of our formalization by using it to investigate the practicability of extracting noise-tolerant fingerprints from commodity devices. We have employed a set of 38 memory chips including SRAM (69,206,016 cells), Flash (3,902,976 cells) and EEPROM (32,768 cells) ubiquitously embedded in low-end commodity devices from 6 different manufacturers for extensive experimental validations. Our results demonstrate that noise-tolerant fingerprints – achieving a key failure rate less than 10^-6 – can always be efficiently afforded from tested memories with a solely fingerprint snap-shot enrollment. Further, we employ a low-cost wearable Bluetooth inertial sensor and demonstrate a practical, end-to-end implementation of a remote attestation security function built upon a root key from noise-tolerant SRAM fingerprints generated on demand and at run-time.

READ FULL TEXT

page 4

page 11

page 15

research
01/17/2023

PUF for the Commons: Enhancing Embedded Security on the OS Level

Security is essential for the Internet of Things (IoT). Cryptographic op...
research
09/19/2023

Poster: Control-Flow Integrity in Low-end Embedded Devices

Embedded, smart, and IoT devices are increasingly popular in numerous ev...
research
02/15/2023

An Efficient B-tree Implementation for Memory-Constrained Embedded Systems

Embedded devices collect and process significant amounts of data in a va...
research
04/10/2023

A Deep Analysis of Hybrid-Multikey-PUF

Unique key generation is essential for encryption purposes between Inter...
research
07/28/2019

A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices

This paper provides a proof of concept for using SRAM based Physically U...
research
06/30/2023

Centauri: Practical Rowhammer Fingerprinting

Fingerprinters leverage the heterogeneity in hardware and software confi...
research
04/05/2022

Watermarked ReRAM: A Technique to Prevent Counterfeit Memory Chips

Electronic counterfeiting is a longstanding problem with adverse long-te...

Please sign up or login with your details

Forgot password? Click here to reset