|
|
1 | (4) |
|
|
|
|
|
|
1 | (1) |
|
2 Applications and Requirements of Fingerprints |
|
|
2 | (1) |
|
|
2 | (3) |
|
Types and Origins of Fingerprints |
|
|
5 | (26) |
|
|
|
|
|
5 | (1) |
|
2 Physical-Layer Device Identification |
|
|
6 | (11) |
|
|
6 | (2) |
|
2.2 Device Under Identification |
|
|
8 | (1) |
|
2.3 Identification Signals |
|
|
9 | (1) |
|
|
9 | (3) |
|
|
12 | (1) |
|
2.6 Physical-Layer Identification System |
|
|
13 | (1) |
|
2.7 System Performance and Design Issues |
|
|
14 | (1) |
|
2.8 Improving Physical-Layer Identification Systems |
|
|
15 | (2) |
|
|
17 | (8) |
|
3.1 Transient-Based Approaches |
|
|
17 | (4) |
|
3.2 Modulation-Based Approaches |
|
|
21 | (1) |
|
|
22 | (1) |
|
3.4 Attacking Physical-Layer Device Identification |
|
|
23 | (1) |
|
3.5 Summary and Conclusion |
|
|
24 | (1) |
|
4 Future Research Directions |
|
|
25 | (1) |
|
|
26 | (5) |
|
|
27 | (4) |
|
Device Measurement and Origin of Variation |
|
|
31 | (8) |
|
|
|
|
|
31 | (3) |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (2) |
|
3 Determining Component Significance |
|
|
36 | (2) |
|
3.1 Constructing Model Input |
|
|
36 | (1) |
|
3.2 Producing Model Output |
|
|
36 | (1) |
|
3.3 Evaluating Model Output |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
Crytpo-Based Methods and Fingerprints |
|
|
39 | (30) |
|
|
|
|
|
39 | (2) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (23) |
|
2.1 Physical Unclonable Functions |
|
|
41 | (8) |
|
2.2 Controlled Physical Unclonable Functions |
|
|
49 | (3) |
|
|
52 | (6) |
|
|
58 | (3) |
|
|
61 | (2) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (4) |
|
|
66 | (3) |
|
Fingerprinting by Design: Embedding and Authentication |
|
|
69 | (20) |
|
|
|
|
|
|
69 | (3) |
|
1.1 Intrinsic Fingerprints |
|
|
69 | (1) |
|
1.2 Fingerprint Embedding |
|
|
70 | (1) |
|
1.3 Fingerprinting and Communications |
|
|
71 | (1) |
|
2 Introduction to Embedded Authentication |
|
|
72 | (1) |
|
3 Framework for Embedded Authentication |
|
|
72 | (5) |
|
3.1 Authentication System---Transmitter |
|
|
73 | (1) |
|
3.2 Authentication System---Receiver |
|
|
74 | (3) |
|
3.3 Authentication Performance |
|
|
77 | (1) |
|
4 Metrics for Embedded Fingerprint Authentication |
|
|
77 | (5) |
|
|
77 | (1) |
|
4.2 Authentication Performance |
|
|
78 | (1) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
82 | (3) |
|
5.1 Authentication Performance |
|
|
82 | (1) |
|
|
82 | (2) |
|
|
84 | (1) |
|
|
85 | (4) |
|
Appendix: Precoding and Power-Allocation with CSI |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
Digital Fingerprint: A Practical Hardware Security Primitive |
|
|
89 | (26) |
|
|
|
|
|
|
89 | (4) |
|
2 Digital Fingerprinting for IP Protection |
|
|
93 | (7) |
|
2.1 Background on Fingerprinting |
|
|
93 | (1) |
|
2.2 The Need and Challenge of Digital Fingerprinting IPs |
|
|
94 | (1) |
|
2.3 Requirements of Digital Fingerprinting |
|
|
94 | (1) |
|
2.4 Iterative Fingerprinting Techniques |
|
|
95 | (3) |
|
2.5 Fingerprinting with Constraint-Addition |
|
|
98 | (2) |
|
3 Observability Don't Care Fingerprinting |
|
|
100 | (4) |
|
|
100 | (1) |
|
3.2 Observability Don't Care Conditions |
|
|
101 | (1) |
|
3.3 Finding Locations for Circuit Modification Based on ODCs |
|
|
101 | (1) |
|
3.4 Determining Potential Fingerprinting Modifications |
|
|
102 | (1) |
|
3.5 Maintaining Overhead Constraints |
|
|
103 | (1) |
|
|
103 | (1) |
|
4 Satisfiability Don't Care Fingerprinting |
|
|
104 | (5) |
|
4.1 Satisfiability Don't Care and Illustrative Example |
|
|
104 | (1) |
|
4.2 Assumptions for SDC Based Fingerprinting |
|
|
105 | (1) |
|
4.3 SDC Based Fingerprinting Technique |
|
|
106 | (1) |
|
4.4 Fingerprint Embedding Scheme |
|
|
107 | (1) |
|
|
108 | (1) |
|
5 Scan Chain Fingerprinting |
|
|
109 | (4) |
|
|
109 | (1) |
|
5.2 Basics on Scan Chain Design |
|
|
110 | (1) |
|
5.3 Scan Chain Fingerprinting |
|
|
111 | (1) |
|
|
111 | (2) |
|
|
113 | (2) |
|
|
113 | (2) |
|
Operating System Fingerprinting |
|
|
115 | (26) |
|
|
|
|
|
1 Overview of Operating System Fingerprinting |
|
|
115 | (1) |
|
2 Major Operating System Fingerprinting Techniques |
|
|
116 | (8) |
|
|
116 | (6) |
|
2.2 Reconnaissance Through Packet-Content Agnostic Traffic Analysis |
|
|
122 | (1) |
|
2.3 Analysis of Smartphone Traffic |
|
|
123 | (1) |
|
2.4 Analysis of Encrypted Traffic |
|
|
124 | (1) |
|
3 Case Study: Smartphone OS Reconnaissance |
|
|
124 | (11) |
|
3.1 System and Threat Model |
|
|
127 | (1) |
|
3.2 Identifying Smartphone Operating Systems |
|
|
128 | (4) |
|
|
132 | (3) |
|
4 Summary and Future Directions |
|
|
135 | (6) |
|
Appendix A Detailed Descriptions of Algorithms |
|
|
136 | (1) |
|
|
137 | (4) |
|
Secure and Trustworthy Provenance Collection for Digital Forensics |
|
|
141 | (36) |
|
|
|
|
|
141 | (1) |
|
2 Provenance-Aware Systems |
|
|
142 | (5) |
|
2.1 Disclosed Provenance-Aware Systems |
|
|
143 | (1) |
|
2.2 Automatic Provenance-Aware Systems |
|
|
144 | (3) |
|
3 Ensuring the Trustworthiness of Provenance |
|
|
147 | (3) |
|
3.1 Security Challenges to Provenance Collection |
|
|
147 | (2) |
|
3.2 The Provenance Monitor Concept |
|
|
149 | (1) |
|
4 High-Fidelity Whole Systems Provenance |
|
|
150 | (9) |
|
|
150 | (1) |
|
4.2 Handling of System-Level Objects |
|
|
151 | (3) |
|
|
154 | (4) |
|
|
158 | (1) |
|
5 Linux Provenance Modules |
|
|
159 | (6) |
|
5.1 Augmenting Whole-System Provenance |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (3) |
|
|
164 | (1) |
|
6 Analyzing the Security of Provenance Monitors |
|
|
165 | (6) |
|
6.1 Completeness Analysis of Hi-Fi |
|
|
165 | (4) |
|
6.2 Security Analysis of LPM |
|
|
169 | (2) |
|
7 Current and Future Challenges to Provenance for Forensics |
|
|
171 | (6) |
|
|
173 | (4) |
|
|
177 | (6) |
|
|
|
|
|
|
177 | (1) |
|
2 Measurements of Fingerprints |
|
|
178 | (1) |
|
3 Fingerprints and Crypto-Based Methods |
|
|
179 | (1) |
|
4 Science of Fingerprints |
|
|
179 | (1) |
|
5 Security of Fingerprints |
|
|
180 | (3) |
Index |
|
183 | |