Post-Quantum Signatures from Threshold-Computation-in-the-Head
Beschreibung
Threshold Computationin-the-Head [1] is a relatively new zero-knowledge proof technique that is built upon the MPC-in-the-Head concept. Using this technique, post-quantum secure signatures can be obtained.
In this work, the student should get an overview of the TCitH framework and explain it's basic concepts. Further, a systematic sutdy should analyse, which of the signature schemes in the on-ramp NIST competition [2] is built on that paradigm.
References:
- [1] https://link.springer.com/article/10.1007/s00145-025-09543-8
- [2] https://csrc.nist.gov/Projects/pqc-dig-sig/round-2-additional-signatures
Kontakt
Request topic: Patrick Karl
Betreuer:
CPU Prefetcher Side-Channel Attacks
Beschreibung
CPU prefetcher speculatively load data into CPU caches in advance, to prevent CPU stalls due to high memory access latencies. While they are a vital component for performace, they lately got into focus of IT security concerns: As some prefetchers reason about soon to be accessed data by past access patterns, they may leak information similar to cache side-channels.
In this work, we want to give an overview about the different proposed attacks, and what their work principle is. This includes a categorization which kind of prefetcher and which crypto-implementation they target. Finally we give an outlook what future research directions could be interesting.
Reference as a starting point: https://dl.acm.org/doi/10.1145/3575693.3575719
Remark: This topic is supervised by a colleague at Fraunhofer AISEC
Kontakt
Betreuer:
Speculative Execution Attack Overview
Beschreibung
Speculative execution attacks like Spectre and Meltdown are dangerous threats to security of modern systems. They exploit flaws in CPU microarchitecture to obtain secret data. Since publication in early 2018 further speculative execution attacks were discovered, like Foreshadow, Zombieload and many more.
In this work, we want to give an overview of some prominent speculative execution attacks and briefly describe their work principle. Most of the attacks were first demonstrated on x86. Hence, we also want to highlight whenever any of the attacks were demonstrated on ARM or RISC-V as well. Finally we also give a brief overview of some of the existing countermeasures. As there are quite a lot of different attacks and variants thereof, we limit ourself to a reasonable scope, covering only some of the exisitng attacks.
Reference as a starting point: https://meltdownattack.com/meltdown.pdf
Remark: This work is supervised by a colleague at Fraunhofer AISEC
Kontakt
Betreuer:
Neural Network Extraction Through Memory Access Patterns
Neural Network, Side Channel
Beschreibung
As the development of neural networks requires large amounts of data, expertise, and resources, they are considered valuable intellectual property. This necessitates research into possible attack vectors that could enable the extraction of neural network model parameters. One such attack vector are the memory access patterns of a neural network during inference.
The goal of this seminar is to provide an overview on memory access pattern side channel attacks against neural networks.
[1] X. Hu, L. Liang, S. Li, L. Deng, P. Zuo, Y. Ji, X. Xie, Y. Ding, C. Liu, T. Sherwood, et al. DeepSniffer: A DNN model extraction framework based on learning architectural hints. In ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2020.
Kontakt
Betreuer:
Chiplets - How secure is modularity?
Beschreibung
The idea of Chiplets has many benefits, like high modularity and smaller silicon sizes, resulting in better yields. However, what implications does the modularity of chiplets have for their security?
A good starting point is:
[1] On Hardware Security and Trust for Chiplet-Based 2.5D and 3D ICs: Challenges and Innovations
[2] Securing the New Frontier Chiplets & HW Security
Kontakt
Betreuer:
From S-Boxes to circuits
Beschreibung
The core of most ciphers and hash functions is a small substitution table, the S-Box, which provides the confusion and diffusion needed for a good cryptographic security. While such table look-ups are trivial in software, the efficient implementation in hordware modules is still and open question. Various heuristics have been proposed to minimize the area and latency of such almost random circuits.
The task of this seminar is to present and compare several such algorithms.
[1] Y. Jeon et al.: Framework for Generating S-Box Circuits with Boyar–Peralta Algorithm-Based Heuristics, https://tches.iacr.org/index.php/TCHES/article/view/11940/11800
Kontakt
Contact: niklas.stein@tum.de
Betreuer:
On the Impact of the Resolution on Side-Channel Attacks
Beschreibung
For power side channel attacks, it is common to capture traces with some kind of oscilloscope. Depeding on the model in use one has several degrees of freedom on the properties of such a measurement. This includes the sampling rate of the scope as well as the resolution of the ADC.
The goal of this seminar topic is to summarize findings on the impact of the resolution of an oscilloscope on the resulting side channel attack.
Reference:
Kontakt
Jonas Schupp (Jonas.Schupp@tum.de)
Betreuer:
On the Impact of the Sampling Rate on Side-Channel Attacks
Beschreibung
For power side channel attacks, it is common to capture traces with some kind of oscilloscope. Depeding on the model in use one has several degrees of freedom on the properties of such a measurement. This includes the sampling rate of the scope as well as the resolution of the ADC.
The goal of this seminar topic is to summarize findings on the impact of the sampling rate of an oscilloscope on the resulting side channel attack.
Reference:
Kontakt
Jonas Schupp (Jonas.Schupp@tum.de)
Betreuer:
NIST Randomness Tests for PUF Quality Assessment
Beschreibung
Physical Unclonable Functions (PUFs) offer a way to convert uncontrollable hardware manufacturing variations into digital secrets. When a use a cryptographic keys is targeted, the quality of this inherent randomness needs to be assessed. A number of metrics and statistical tests specific to PUFs emerged for this purpose.
Randomness tests are no less important in the domain of True Random Number Generators (TRNGs). Here, standardised test suites exist, e.g. NIST SP 800-22, BSI AIS 20, BSI AIS 31. Despite the underlying principles and the key metrics being quite different, many PUF publications simply apply TRNG randomness tests to their data without much consideration for the underlying assumptions of this methodology.
The aim of this work is a comprehensive literature search regarding
- adaptations of TRNG test frameworks to PUF quality assessment (e.g. [1]) and
- significance of the results when applying standard/adapted TRNG tests to PUFs.
[1] https://github.com/cryptoquantique/TuRiNG-A-PUF-randomness-test-suite
Kontakt
Betreuer:
Post-Quantum Signatures from VOLE-in-the-Head
Beschreibung
VOLE-in-the-Head [1] is a relatively new zero-knowledge proof technique that is built upon the MPC-in-the-Head concept. Using this technique, post-quantum secure signatures can be obtained. In the recently started on-ramp signature call by NIST, FAEST [2] is one candidate that uses the VOLE-in-the-Head concept.
In this work, the student should get an overview of the VOLE-in-the-Head framework and explain it's basic concepts and how the signature scheme FAEST is constructed from it.
References:
- [1] https://link.springer.com/chapter/10.1007/978-3-031-38554-4_19
- [2] https://faest.info/resources.html
Kontakt
Request topic: Patrick Karl
Betreuer:
Fault Analysis of Neural Networks
CNN, Machine Learning, Fault Attacks
There are various methods of Fault Analysis in Neural Networks. The goal of this seminar topic is to summarize state-of-the-art techniques and draw conclusions on promising methods.
Beschreibung
There are various methods of Fault Analysis in Neural Networks:
- L. M. Luza et al., “Emulating the effects of radiation-induced soft-errors for the reliability assessment of neural networks”
- E. Ozen and A. Orailoglu, “Sanity-check: Boosting the reliability of safety-critical deep neural network applications”
- Y. Luo et al., “Deepstrike: Remotely-guided fault injection attacks on dnn accelerator in cloud-fpga”
- and more
Fault attacks aim to change the classification outcome of a neural network or to get information on potentially secret input or secret network parameters.
The goal of this seminar topic is to summarize state-of-the-art techniques and draw conclusions on frequent attack goals, targeted parameters, and promising methods.
Betreuer:
Strategies for Caching
Beschreibung
This seminar topic aims to provide an overview of different caching strategies for data stored in DRAM.
A good starting point is:
[1]DRAM Aware Last-Level-Cache Policies
Kontakt
Betreuer:
Attacker Models for Memristor PUFs
Beschreibung
An often-cited advantage of key storage with physical unclonable functions (PUFs) is that protection mechanisms for stored cryptographic keys need only be active during runtime. Since the secret only exists while the device is active, expensive secure non-volatile storage is no longer needed.
A comprehensive evaluation of such claims however, needs a clearly defined attacker model. Especially in the domain of memristor-based PUFs, discussions of attacker capabilities have been far from commonplace. Some works (e.g. [1]) discuss measures to harden the PUF primitive against prospecitve attackers, some discuss specific attacks (e.g. [2]), while others use the memristors as non-volatile storage (e.g. [3]).
The aim of this work is a
- literature review of memristor-based PUFs with a
- focus on their explicit and implicit security assumptions,
- summarising the results into predominant categories for attacker models.
[1] https://www.science.org/doi/full/10.1126/sciadv.abn7753
[2] https://arxiv.org/abs/2307.01041
[3] https://ieeexplore.ieee.org/abstract/document/7001345