Skip to main content

Showing 1–7 of 7 results for author: Arul, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.04848  [pdf, other

    cs.ET cond-mat.mes-hall

    Nonlinear behavior of memristive devices for hardware security primitives and neuromorphic computing systems

    Authors: Sahitya Yarragolla, Torben Hemke, Fares Jalled, Tobias Gergs, Jan Trieschmann, Tolga Arul, Thomas Mussenbrock

    Abstract: Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. The main feature of all memristive devices is this nonlinear behavior observed in their current-voltage characteristics. To comprehend the nonlinear behavior, we have to understand the coexistence of resistive, capacitive, and inertia (virtual inductive) effects in these device… ▽ More

    Submitted 27 March, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  2. arXiv:2307.01041  [pdf, other

    cs.CR cs.ET

    Practical Non-Invasive Probing Attacks Against Novel Carbon-Nanotube-Based Physical Unclonable Functions

    Authors: Nikolaos Athanasios Anagnostopoulos, Alexander Braml, Nico Mexis, Florian Frank, Simon Böttger, Martin Hartmann, Sascha Hermann, Elif Bilge Kavun, Stefan Katzenbeisser, Tolga Arul

    Abstract: As the number of devices being interconnected increases, so does also the demand for (lightweight) security. To this end, Physical Unclonable Functions (PUFs) have been proposed as hardware primitives that can act as roots of trust and security. Recently, a new type of PUF based on Carbon NanoTubes (CNTs) has been proposed. At the same time, attacks and testing based on direct electrical probing a… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  3. arXiv:2210.11299  [pdf, other

    cs.CR

    Real-World Chaos-Based Cryptography Using Synchronised Chua Chaotic Circuits

    Authors: Emiliia Nazarenko, Nikolaos Athanasios Anagnostopoulos, Stavros G. Stavrinides, Nico Mexis, Florian Frank, Tolga Arul, Stefan Katzenbeisser

    Abstract: This work presents the hardware demonstrator of a secure encryption system based on synchronised Chua chaotic circuits. In particular, the presented encryption system comprises two Chua circuits that are synchronised using a dedicated bidirectional synchronisation line. One of them forms part of the transmitter, while the other of the receiver. Both circuits are tuned to operate in a chaotic mode.… ▽ More

    Submitted 13 July, 2023; v1 submitted 11 August, 2022; originally announced October 2022.

    Comments: This work was accepted for and presented as a hardware demo at the 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2022), held from 27 to 30 June 2022, in Washington, DC, USA

    MSC Class: 94A60 (Primary) 34C28; 34H10; 37D45; 68M10; 68P25 (Secondary)

  4. arXiv:2208.02125  [pdf, other

    cs.CR

    Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

    Authors: Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Ruhrmair, Jakub Szefer

    Abstract: The ubiquity and pervasiveness of modern Internet of Things (IoT) devices opens up vast possibilities for novel applications, but simultaneously also allows spying on, and collecting data from, unsuspecting users to a previously unseen extent. This paper details a new attack form in this vein, in which the decay properties of widespread, off-the-shelf DRAM modules are exploited to accurately sense… ▽ More

    Submitted 3 August, 2022; originally announced August 2022.

    Comments: Submitted to IEEE TIFS and currently under review

  5. arXiv:2204.02498  [pdf, other

    cs.CR

    On the Sustainability of Lightweight Cryptography Based on PUFs Implemented on NAND Flash Memories Using Programming Disturbances

    Authors: Nikolaos Athanasios Anagnostopoulos, Yufan Fan, Muhammad Umair Saleem, Nico Mexis, Florian Frank, Tolga Arul, Stefan Katzenbeisser

    Abstract: In this work, we examine the potential of Physical Unclonable Functions (PUFs) that have been implemented on NAND Flash memories using programming disturbances to act as sustainable primitives for the purposes of lightweight cryptography. In particular, we investigate the ability of such PUFs to tolerate temperature and voltage variations, and examine the current shortcomings of existing NAND-Flas… ▽ More

    Submitted 11 June, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: This work was accepted for and presented at the Workshop on Sustainability in Security, Security for Sustainability, which took place on 18 March 2022 and was co-located with the 25th Design, Automation and Test in Europe Conference & Exhibition (DATE 2022)

  6. arXiv:2008.05241  [pdf, other

    cs.CR cs.NI

    Rule-based Anomaly Detection for Railway Signalling Networks

    Authors: Markus Heinrich, Arwed Gölz, Tolga Arul, Stefan Katzenbeisser

    Abstract: We propose a rule-based anomaly detection system for railway signalling that mitigates attacks by a Dolev-Yao attacker who is able to inject control commands and to perform semantic attacks. The system as well mitigates the effects of a compromised signal box that an attacker uses to issue licit but mistimed control messages. We consider an attacker that could cause train derailments and collision… ▽ More

    Submitted 12 August, 2020; originally announced August 2020.

  7. MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting

    Authors: Nikolay Matyunin, Yujue Wang, Tolga Arul, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser

    Abstract: Recent studies have shown that aggregate CPU usage and power consumption traces on smartphones can leak information about applications running on the system or websites visited. In response, access to such data has been blocked for mobile applications starting from Android 8. In this work, we explore a new source of side-channel leakage for this class of attacks. Our method is based on the fact th… ▽ More

    Submitted 7 September, 2019; v1 submitted 26 June, 2019; originally announced June 2019.

    Comments: Accepted at the Workshop on Privacy in the Electronic Society (WPES), 2019