How Secure is Your Hardware?

Dr. Alric Althoff successfully defended his PhD thesis “Statistical Metrics of Hardware Security”, which helps answer a fundamental question: How secure is your hardware? This is a difficult task — defining what it means to be secure is something that the computer security field has grappled with for decades.

There has been a bevy of high profile attacks on hardware most famously Spectre and Meltdown. It is no longer a question of is your hardware secure (that is easy to answer — it is not), but rather how do we know whether a mitigation technique or run-time vulnerability detection mechanism is effective? Alric developed a set of metrics aimed at answering this question. These metrics enable you to rank when your design is most vulnerable to a power side channel attack, answer questions about the randomness of your random number generator, and determine how hardware optimizations and design decisions affect the leakage of secure information.

While we are on the topic of metrics and definitions, I do not yet know how to define “data science” (nor do I think that term will be properly defined for some time), but I do know that Alric is an exemplar of a data scientist. He is able to quickly understand a problem and come up with elegant solutions to those problems. Thus, it is not surprising that Alric has a been a tour de force for our research group playing prominent roles in almost all of our projects. One of my mantras for the past several years has been “You really should talk to Alric about this.”. His thesis is impressive, and yet this is only a small subset of his research during his PhD tenure.

Luckily (for us) Alric is not moving far; he took a position at Leidos just across the street from campus. Hopefully, we can continue to leverage his expertise going forward.

Congrats Dr. Althoff, best of luck in the future, and don’t be a stranger!

-Ryan

Localizing Underwater Vehicles Using Ambient Noise

Perry deploying a swarm of Autonomous Underwater Explorers.

Dr. Perry Naughton successfully defended his PhD titled “Self-localization of a mobile swarm of underwater vehicles using ambient acoustic noise”. His thesis developed a series of techniques that enabled swarms of underwater vehicles to determine their positions by only listening to the ambient ocean noise.

Underwater localization is an important yet difficult problem since water severely attenuates the GPS signals — it only propagates very short distances (tens of centimeters) and thus we typically rely on active acoustic solutions to localize underwater vehicles. These require extensive infrastructure (e.g., deploying buoys) or are costly (e.g., a Doppler velocity logger costs thousands of USD). Using ambient noise is attractive since it only requires the vehicles to have a microphone which simple and cheap (only tens of USD). Perry’s research showed that it is possible to estimate the geometry of a swarm of mobile, underwater vehicles with ambient acoustic noise.

Doing this work required a large network of collaborators. Perry worked closely with the Jaffe Lab to use their Autonomous Underwater Explorers to validate his ideas. And he spent a year in Grenoble working closely with Philippe Roux on some of the more theoretical aspects of his research. Additionally, he worked with a number of other scientists as part of Engineers for Exploration and CISA3. His “side projects” involved imaging shipwrecks, scanning archaeological sites, and creating large-scale 3D models of coral reefs.

Perry received a large number of fellowships and awards over the years including the NSF Graduate Research Fellowship, NSF Integrative Training and Research Award, NSF Graduate Opportunities World Wide, Chateaubriand STEM Scholarship (French Embassy), Friends of the International Center Scholarship, ARCS Foundation, and the Henry Booker Prize for Ethical Engineering.

Congrats Dr. Naughton! You’ve had an impressive UCSD career over the past decade (Perry was an undergrad here before doing his PhD). You will be missed, but we look forward to seeing the great things that you will do.

Doctoral Award in Excellence in Service/Leadership

Dustin Richmond (center with redish shirt) along with the other PhD award winners.

The Department of Computer Science and Engineering gave Dustin Richmond one of its annual awards for “Excellence in Service/Leadership”. Dustin has been a key leader in departmental activities since the day that he arrived N years ago. He has been an active community leader in our department, interacting with staff, students, and faculty to improve our community by organizing and motivating others to do the same. For example, he was the student chair of the department Graduate Community Council. As part of this, he proposed, designed, and oversaw the remodel of Chez Bob. These changes have transformed the lounge into a common meeting area. For several years he also managed the Graduate Student Association budget, allocating money to ideas and projects that improve the quality of life, evaluating and funding ideas that clearly benefit a broad swath of the department, and helping students make their ideas a reality. Dustin also organized an NSF Graduate Research Fellowship Panel, where current applicants can ask questions, and receive feedback about their essay writing service. He has mentored and encouraged other students in the community and recruited faculty with past NSF application experience to participate. This provides a valuable benefit to incoming graduate students and outgoing undergraduate students in our department. These are just some of the highlights; he has done so much more!

Thanks for all your efforts Dustin. Very often these sorts of things go unnoticed. I’m glad that was not the case here.

-Ryan

Blinking for Better Processor Security

Power side-channel attacks are a means to extract privileged information, such as secret cryptographic keys, from computational hardware by measuring the subtle variations in voltage drop during the times when the secret data is being computed upon. This is a remarkably simple and effective way to recover secret information using low-cost test equipment.

Our recent research with computer engineers at UW and architects at UCSB brought together hardware design, computer architecture, and statistics to identify and programmatically “blink” the processor when the most information leakage occurs. While blinking, the processor is disconnected from the main power supply and running from an internal capacitor, so that attackers cannot obtain information from measurements of voltage drop during those times. We also explore the trade-offs between area overhead and security, introduce a technique for determining if obvious information leakage exists at processor design time, and a statistical approach to localize this leakage.

These ideas are detailed in our paper, “Hiding Intermittent Information Leakage with Architectural Support for Blinking,” which is being presented at the International Symposium on Computer Architecture (ISCA) in June 2018. Have a look at our two-minute lightning talk to get a better idea of how employ hardware blinking to make it more secure against to side channel leakage.

 

 

Open-Source Book on Parallel Programming

“The best book is a finished book” – Anyone that has written a book

Stephen Neuendorffer (Xilinx), Janarbek Matai (Cognex), and I recently “published” the open-source book “Parallel Programming for FPGAs“, which describes how to effectively use high-level synthesis (HLS) tools to program field programmable gate arrays (FPGAs). High-level synthesis is the process of taking an application written in procedural code (e.g., written as C code) and translating it into a hardware design (e.g., like one written in Verilog). HLS tools are seeing a growing usage in the industry as commercial offerings like Xilinx Vivado HLS become more sophisticated. Yet, these tools require the user to understand parallel programming concepts like data partitioning, pipelining, and task level parallelism. These are non-trivial ideas that often are not covered in a programming course. The book aims to clearly explain these concepts while walking through the design and optimization of different applications.

Don’t understand this? Read our book!

The book is open-source with the hope that it will be a living book. We can quickly and easily fix typos, grammar, and poorly written sections. And we can add new materials. You can probably expect at least minor updates during the times when I’m using the book to teach 237C (typically Fall Quarter). We are very open to receiving contributions of new materials, e.g., additions to existing chapters, new chapters, projects, labs, slides, etc.. We would be happy to provide an appropriate level of attribution (e.g., as a chapter author?). Get in touch with me if you are interested in contributing.

Like anything worth doing, this took a lot longer than anticipated (like 5 years longer!), but I am happy to say that we finally got this manuscript into good enough shape to call it version 1.0. Thanks to Steve for making the final push earlier this year. Janarbek was instrumental in providing a lot of the code examples (certainly for all the chapters that I wrote). Much of this came from his PhD thesis and work as a TA for 237C. And a very special thanks to Xilinx for their funding and immense patience on this. They provided no strings attached funding to my lab to allow my PhD students to work on various aspects of this project. I was also able to leverage incredible support through the Wireless Embedded Systems Masters Program (to fund TAs to work specifically on developing the labs and other teaching materials). I know that everyone would have liked this a lot sooner, but I hope that you will agree that this is better late than never?

We have an associated set of projects that we developed alongside this book over the course of many years in my 237C classes. Cleaning up and releasing these projects will likely be the next major revision to the book. I hope to release them broadly this Fall (no promises especially given my track record on getting this book out in a timely manner!). In the meantime, feel free to get in touch with me if you want to have a look at them.

-Ryan

Related Press: Hackaday

National Geographic Chasing Genius Finalist

National Geographic announced the Chasing Genius Challenge Finalists which includes undergraduate researcher Nikko Dutra Bouck. Nikko is developing a system that will incentive trash cleanup. It uses low-cost drones to survey an area for trash. Then he plans to develop a Uber/Lyft-like app to pay local people to pick up the trash and deliver it to a landfill. Have a look at his short video for more information and give him a vote while you are there.

The picture shows a large-scale aerial image collected last summer of a mangrove forest in Bahia Magdelena, Mexico. We create this image by stitching together a bunch of pictures that we take from a low-cost drone. It gives us cm-scale resolution which is orders of magnitude better than satellite resolution (like you see on Google Earth). This allows us to zoom in and get fine-grained detail and easily pick out any trash. Even better, we are now working on using automated machine learning algorithms to automatically detect the trash.

Nikko has been working with our research group for more than a year through the Engineers for Exploration program which aims to develop technologies (like this) to aid in conservation, exploration, and cultural heritage. He was awarded an NSF REU scholarship last summer, he is a UCSD FISP awardee, and he leads our collaboration with Octavio Aburto’s group on the mangrove monitoring. He is an amazing person with big goals related to conservation.

Vote now and often and help him take another step towards using the latest technologies to clean up our oceans!

Lu Zhang Completes Visiting Graduate Scholarship

Perry (Lu’s surf instructor :), Ryan, Lu, and the UCSD Hawkinson Bear on Lu’s last day on campus.

Lu Zhang ended his two year stay at UCSD as a visiting graduate student in our group. This was funded by the China Scholarship Council scholarship. During his time at UCSD, he built a measurement system that captured the power consumption of an FPGA while computing different cryptographic operations. His research focused on how different hardware optimizations (e.g., pipelining and memory partitioning) can change the security of the cryptographic hardware. This initial work (“Examining the Consequences of High-Level Synthesis Optimizations on Power Side-Channel”) was accepted for publication in the Design, Automation and Test in Europe (DATE) conference. Lu will travel to Germany to present his work there in mid-March. Lu returns his home university Northwestern Polytechnical University in Xi’an, China to finish his PhD. We wish him the best and look forward to seeing him soon!

Tracking Underwater Robots Using Opportunistic Noise

University of California Division of War Research illustration of natural underwater sounds, including snapping shrimp, which cause interference with sonar and other underwater acoustic devices. 1944 Scripps Institution of Oceanography Photographs

Snapping shrimp are amazing creatures. They use their claw to create a powerful “sonic boom” that induces a cavitation bubble that stuns their prey. This tiny bubble reaches temperatures of up to 8,000 degrees Fahrenheit and 200 decibels. These little shrimp are so amazing that they were featured on a Radiolab episode.

These shrimp are so loud that they create large disturbances in acoustic field which negatively effects wireless underwater communication and robotic localization; this is illustrated by a 1944 UCSD Scripps Oceanographic cartoon from the UCSD Library Digital Collection). But what if we were able to utilize these snaps in a beneficial way to find the positions of a swarm of underwater vehicles?

Our recent work published in IEEE Access shows how to track a swarm of underwater vehicles using passive signals present in the ocean’s ambient soundscape. We demonstrate our method using noise from these “annoying” snapping shrimp on a swarm of underwater vehicles that was deployed off of San Diego’s coast. Our results show that this works amazingly well. This video shows the results of localization using our snapping shrimp derived localization scheme and the standard, infrastructure-heavy technique of deploying fixed buoys with active acoustic pingers. The latter is one of the most common techniques for localizing underwater systems. Our method is the first step towards an infrastructure free, low power, high endurance localization technique for underwater vehicle swarms.

Fixing Noisy Neuromorphic Vision Sensors

Neuromorphic vision sensors are uncommon and new(-ish) way to perform analog feature detection in an event-based manner. They employ a fundamentally different technique for sensing compared to “typical” cameras. This results in a more complex pixel detector architecture, and correspondingly means their noise differs from ordinary vision sensors. The picture show KRG PhD student Alireza Khodamoradi recently presented our research in this domain in a paper titled “O(N)-Space Spatiotemporal Filter for Reducing Noise in Neuromorphic Vision Sensors”. Here we analyzed this noise and introduced a novel filter with higher accuracy and minimal memory complexity compared to previous works. This paper was accepted to the IEEE International Conference on Computer Design (ICCD) and was invited to IEEE TETC. This is a special honor only extended to the best papers. We plan to have it published after journal reviews by early 2018.

2017 Research Group Retreat

Our research group made our annual pilgrimage to Mammoth Lakes, CA to kick off the beginning of the (academic) year. The evenings were filled with discussions on past, current, and future research and imbibing on delicious homemade food. The days were spent enjoying all the activities that the Eastern Sierras had to offer. The group hike this year was the Twenty Lakes Basin Loop Trail (though about half of us decided to only tackle the loop around Saddlebag Lake). But those that did the entire 10 mile route were rewarded with a snow cave unlike anything that I’ve ever seen. Quentin — our resident group photographer and videographer — created a wonderful video showing the epicness of the hike (the snow cave comes around 0:45).