Font Size: a A A

Attacking and Defending Emerging Computer Systems Using the Memory Remanence Effec

Posted on:2018-06-21Degree:Ph.DType:Dissertation
University:University of MichiganCandidate:Rahmati, AmirFull Text:PDF
GTID:1448390005951539Subject:Computer Science
Abstract/Summary:
In computer systems, manufacturing variances and hardware effects are typically abstracted away by the software layer. This dissertation explores how these effects, specifically memory remanence, can be used both as an attack vector and a tool to defend emerging computing systems. To achieve this, we show how time-keeping, anonymity, and authenticity can be affected by memory remanence. In terms of attacks, we explore the deanonymizing effect of approximate computing in the context of approximate memory in Probable Cause. We show how data passing through an approximate memory is watermarked with a device specific tag that points the attacker back to the device. In terms of defenses, we first present TARDIS: an approach to provide a notion of time for transiently powered embedded devices without requiring any hardware modification using remanence effect of SRAM. TARDIS allows these devices to keep a coarse-grained notion of time without the need for a running clock. Second, we propose data retention voltage of memory cells as a new type of physical unclonable function that allows for low-cost authentication and counterfeit resistance in computer systems.
Keywords/Search Tags:Computer systems, Memory remanence
Related items