• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of constitution method for instruction sequence against cyber-physical cooperative attacks on embedded systems

Research Project

Project/Area Number 16K12436
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionTohoku University

Principal Investigator

Homma Naofumi  東北大学, 電気通信研究所, 教授 (00343062)

Project Period (FY) 2016-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥3,380,000 (Direct Cost: ¥2,600,000、Indirect Cost: ¥780,000)
Fiscal Year 2017: ¥2,210,000 (Direct Cost: ¥1,700,000、Indirect Cost: ¥510,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Keywords計算機システム / 組込みセキュリティ
Outline of Final Research Achievements

This research clarified the threat of cyber-physical cooperative attacks on embedded systems and developed effective countermeasure techniques for this kind of attack. We first survey and classify cyber-physical cooperative attacks that can pose a threat to embedded systems equipped with general cyber attack countermeasures in a systematic manner. In particular, we focused on buffer overflow (BOF) attack and fault injection attack as a cyber attack and a physical attack, respectively. We have developed an efficient software countermeasure method against their cooperative attacks. In addition, we built an evaluation / analysis system that can reproduce typical cyber-physical cooperative attacks and demonstrated the security and efficiency of the developed countermeasure method.

Report

(3 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • Research Products

    (13 results)

All 2017 2016 Other

All Journal Article (4 results) (of which Peer Reviewed: 4 results) Presentation (7 results) (of which Invited: 1 results) Book (1 results) Remarks (1 results)

  • [Journal Article] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure2017

    • Author(s)
      Kazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma
    • Journal Title

      2017 IEEE International Conference on Trust, Security and Privacy in Computing and Communications

      Volume: 1 Pages: 1032-1037

    • DOI

      10.1109/trustcom/bigdatase/icess.2017.348

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers2017

    • Author(s)
      Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto
    • Journal Title

      IEEE EuroS&P Workshops on Security for Embedded and Mobile Systems

      Volume: - Pages: 131-121

    • DOI

      10.1109/eurospw.2017.60

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Buffer overflow attack with multiple fault injection and a proven countermeasure2017

    • Author(s)
      Shoei Nashimoto, Naofumi Homma, Yu-ichi Hayashi, Junko Takahashi, Hitoshi Fuji, Takafumi Aoki
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: 7 Issue: 1 Pages: 35-46

    • DOI

      10.1007/s13389-016-0136-3

    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Journal Article] Side channel Security Evaluation for KCipher‐2 Software on Smart Cards2016

    • Author(s)
      Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, and Shinsaku Kiyomoto
    • Journal Title

      25th International Workshop on Post-Binary ULSI Systems

      Volume: - Pages: 9-12

    • Related Report
      2016 Research-status Report
    • Peer Reviewed
  • [Presentation] Salsa20/ChaChaに対する故障利用攻撃とその対策2017

    • Author(s)
      福島和英,許 瑞,清本晋作,本間尚文
    • Organizer
      2017年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ロワジールホテル那覇(那覇市)
    • Year and Date
      2017-01-25
    • Related Report
      2016 Research-status Report
  • [Presentation] 乗算アルゴリズムに対するハードウェアトロイ挿入可能性の評価2017

    • Author(s)
      伊東 燦
    • Organizer
      平成29年度電気関係学会東北支部連合大会
    • Related Report
      2017 Annual Research Report
  • [Presentation] 数論変換に基づく秘匿計算向け暗号の高効率実装2017

    • Author(s)
      遠藤 空
    • Organizer
      平成29年度電気関係学会東北支部連合大会
    • Related Report
      2017 Annual Research Report
  • [Presentation] 算術演算ハードウェアアルゴリズムの改変検知に関する検討2017

    • Author(s)
      伊東 燦
    • Organizer
      第40回多値論理フォーラム
    • Related Report
      2017 Annual Research Report
  • [Presentation] 剰余演算に基づく秘匿計算向け暗号の高効率実装2017

    • Author(s)
      遠藤 空
    • Organizer
      第40回多値論理フォーラム
    • Related Report
      2017 Annual Research Report
  • [Presentation] ハードウェアトロイ挿入が困難な公開鍵暗号データパスに関する検討2017

    • Author(s)
      伊東 燦
    • Organizer
      ハードウェアセキュリティフォーラム
    • Related Report
      2017 Annual Research Report
  • [Presentation] IoTセキュリティを支える暗号技術の最新動向2017

    • Author(s)
      本間 尚文
    • Organizer
      IEEE SSCS Kansai Chapter 技術セミナー
    • Related Report
      2017 Annual Research Report
    • Invited
  • [Book] Special Section on PROOFS 2016, Journal of Cryptographic Engineering2017

    • Author(s)
      Naofumi Homma
    • Total Pages
      54
    • Publisher
      Springer
    • Related Report
      2017 Annual Research Report
  • [Remarks] 東北大学電気通信研究所環境調和型セキュア情報システム研究分野

    • URL

      http://www.ecsis.riec.tohoku.ac.jp/

    • Related Report
      2017 Annual Research Report 2016 Research-status Report

URL: 

Published: 2016-04-21   Modified: 2019-03-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi