Jennifer Dworak Southern Methodist University Al Crouch ASSET InterTech Presented at the 2011 Board Test Workshop, October 25-27, 2011.

Slides:



Advertisements
Similar presentations
An advanced weapon and space systems company 1 23 rd ISSC/NWSSS Conference 23 rd ISSC/NWSSS Conference C. Forni, B. Blake – Remote Controlled.
Advertisements

Digital Integrated Circuits© Prentice Hall 1995 Design Methodologies Design for Test.
Use of COTS Drop-in Replacement Designs to Solve Obsolescence of Electronic Components in Military Systems Willow Ridge Loop Orlando, FL
Slides created by: Professor Ian G. Harris Method of Attack, Physical Access Attacker has physical possession of the device  Many devices are small and.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Physical Unclonable Functions and Applications
Trusted Design In FPGAs Steve Trimberger Xilinx Research Labs.
Advanced Manufacturing Technologies for Extending Microprocessor Availability Proactive Solution to Military Microprocessor Availability and Affordability.
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
1 An Overview of Computer Security computer security.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
1 HW/SW Partitioning Embedded Systems Design. 2 Hardware/Software Codesign “Exploration of the system design space formed by combinations of hardware.
CS 300 – Lecture 22 Intro to Computer Architecture / Assembly Language Virtual Memory.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SM3121 Software Technology Mark Green School of Creative Media.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
May 8, Peripheral Design Options For USB 2.0 Solutions Dave Thompson Manager of High Speed I/O Development Agere Systems,
Software Reengineering 2003 년 12 월 2 일 최창익, 고광 원.
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 27 Slide 1 Quality Management 1.
Presentation Title Subtitle Author Copyright © 2002 OPNET Technologies, Inc. TM Introduction to IP and Routing.
Configuration Overview The BIOS (basic input/output system) is an important motherboard component. The BIOS has the following functions: Holds and executes.
WAO 2007 Andrej Košiček Dealing with the Obsolescence in state-of- the-art Electronic Components 27 September 2007.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
1 UCR Firmware Attacks and Security introduction.
CCSDS Security Working Group Spring 2014 Meeting 10 November – 14 November 2014 London, England Charles Sheehe NASA/Glenn.
Why do so many chips fail? Ira Chayut, Verification Architect (opinions are my own and do not necessarily represent the opinion of my employer)
1 Supply Chain Security & Brand Protection AAFA Knock It Off Conference Long Beach, CA November 7, 2007.
ASIC/FPGA design flow. FPGA Design Flow Detailed (RTL) Design Detailed (RTL) Design Ideas (Specifications) Design Ideas (Specifications) Device Programming.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
J. Christiansen, CERN - EP/MIC
Reminder Lab 0 Xilinx ISE tutorial Research Send me an if interested Looking for those interested in RC with skills in compilers/languages/synthesis,
An Unobtrusive Debugging Methodology for Actel AX and RTAX-S FPGAs Jonathan Alexander Applications Consulting Manager Actel Corporation MAPLD 2004.
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Rinoy Pazhekattu. Introduction  Most IPs today are designed using component-based design  Each component is its own IP that can be switched out for.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
CHAPTER 8 Developing Hard Macros The topics are: Overview Hard macro design issues Hard macro design process Physical design for hard macros Block integration.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Modular Telephony Hardware Design How separating interfaces improves reliability and reduces costs.
Chap1: Is there a Security Problem in Computing?.
This material exempt per Department of Commerce license exception TSU Xilinx On-Chip Debug.
Contract Termination/ Save the Customer Accountability Black Belt-G.K. McCown Service Division BU – Dallas, TX.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Hardware Trojan (HT) Detection in 3-D IC Wafi Danesh Instructor: Dr. Christopher Allen EECS 713 High-Speed Digital Circuit Design Final Project Presentation.
Troubleshooting Equipment Containing Integrated Circuits Jimmie Fouts Houston County Career Academy.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
Prepared for BTW’2014 Trojans In SRAM Circuits Senwen Kan - AMD/SMU Jennifer Dworak - SMU.
Detecting Hardware Trojans in Unspecified Functionality Using Mutation Testing Nicole Fern K.-T. Tim Cheng UC Santa Barbara 1.
Network Security Celia Li Computer Science and Engineering York University.
K. Salah1 Security Protocols in the Internet IPSec.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Security and Trust Issues in 3D ICs Soha Alhelaly Advisor Prof. Jennifer Dworak
Failure Modes, Effects and Criticality Analysis
TE-MPE-CP, RD, 28-Sep Problems with QPS DAQ Systems During LHC Operation, 1 st Results from 2010 CNRAD Tests R. Denz TE-MPE-CP.
Protect Your Hardware from Hacking and Theft
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Hardware Trojans: The Hidden Malicious Insider
Protect Your Hardware from Hacking and Theft
Topic 5: Communication and the Internet
Physical Unclonable Functions and Applications
Presentation transcript:

Jennifer Dworak Southern Methodist University Al Crouch ASSET InterTech Presented at the 2011 Board Test Workshop, October 25-27, 2011

Overview: Security needs to be considered in design and test of 3D ICs Security is a already significant concern for 2D Trojans and Counterfeits Measures exist to expose both Security and Trust is much more complex in 3D Lack of access to each die Complexity of developing functional tests Individual die are hidden between other die Vertical routes are more difficult to “virtually probe” for illicit connections

Types of Counterfeits in 2D Reverse engineer, design, and manufacture chips to be functionally similar to the original Salvage old chips from boards and sell them as new chips Re-label low-performing die as high-performing Sell defective parts as working chips

Impact of counterfeits Less reliable than valid die Harms the reputation of the real chip provider Denies revenue to original chip provider Increases support costs – the counterfeit die may require support or may be returned May contain malicious functionality

Selected Counterfeit Incidents Between 2007 and 2010 over 5.6 million counterfeit semiconductor devices were seized by Customs and Border Patrol (CBP) and ICE (Immigrations and Custom Enforcement) In 2009, a NASA probe project was delayed nine months and went 20% over-budget due partly to counterfeit parts. Entire NEC product line was counterfeited in across multiple factories in China and Taiwan Company called VisionTech imported more than 3200 identified or suspected shipments of counterfeit microelectronics to the U.S. Sold to military for use in missile targeting systems, identification friend-or-foe systems, among others Thousands of parts may still be in the supply chain

VisionTech’s Cost to Companies AMD$34.9KNational Semiconductor$5.9K Altera$7.6KNEC$24.8K Analog Devices$75.6KPeregrine Semiconductor$2.6K Cypress Semiconductor$33.4KPhillips Electronics$1.6K Freescale$40KRenesas$2.4K Infineon Technologies$10KSamsung Elect. America$77.2K Intel$100.9KSTMicroelectronics$18.6K Intersil$1.9KTexas Instruments$92.9K Linear Technology$32KToshiba$2.4K Maxim$1.6KXilinx$22.2K Mitel$2.6KTotal$591.4K

Detecting/Avoiding Counterfeits Buying from authorized suppliers Inspection of packaging Incoming test Device authentication (e.g. with die ID and a trusted database.) Reporting suspected or discovered counterfeit incidents to an anti-counterfeiting clearinghouse

Hardware Trojans Malicious changes to a design intentionally inserted by an attacker May be inserted at any stage of the design and manufacturing process: specification, RTL, manufacturing, supply chain Most attention has focused on manufacturing Inserted with the intention of being stealthy Two components: Trigger Payload

2D Circuit with Combinational Trojan Trigger should be stealthy B=0, C=0 should be rare during functional operation B=0, C=0 should not be targeted during structural test. Trigger Payload Payload should affect something of functional importance to attacker Leak Data Cause Errors Reduce Performance Destroy the chip

Sequential 2D Trojan TriggerCounter 0 1 Encryption circuit ciphertext key Data to broadcast plaintext

How can we detect Trojans inserted at manufacturing? Logic testing is generally ineffective Too hard to activate Side channels affected by even inactive Trojans Delay Power Obtain “fingerprints” of chips verified as Trojan-free Process variations make comparison difficult Difference between Trojan and non-Trojan containing circuits is very small. Only works if Trojan is inserted at mask Chip ID Delay Fingerprint good bad

Real Life Trojans….  On September 6, 2007, the Israeli Air Force carried out an airstrike on a Syrian nuclear reactor in Operation Orchard. Hidden back door in microprocessors used in radar may have allowed them to be disabled remotely. beforeafter  French microprocessors used in military applications have remote “kill switches” to allow them to be disabled.  During the Cold War, secret cameras were inserted inside Xerox 914 copy machines in the Soviet embassy to record copied documents.

So what changes in 3D?

Where can Trojans and Counterfeits be inserted? Manufacturing SpecSupply ChainDesign 3 rd Party Assembler

Die Access and Observability So what does this mean for security? Die in 3D IC’s are less observable. An entire board in a package Access to all die comes only through the base die Can’t visually inspect die once assembled Can’t remove and analyze die once assembled. Overall variability is likely to increase. It’s easier to hide things and harder to find them!!

Potential 3D Security Issues

Issue 1: 2D Trojan in a Die Potential Actions: Data Collection and Transmission (e.g. encryption codes) Denial of Service or Early Reliability Failures (such as generating a high temp spot) Chip/Die Destruction (e.g. on-demand kill-switch)

Detecting a 2D Trojan in a 3D Stack Variations increase in 3D Relative size of Trojan effect is miniscule May need to shut off power to all but one die Need ability to obtain accurate delay measurements to flops and TSV’s Verify design and 3 rd party IP at RTL

Issue 2: Counterfeit Die or Interposer Same as 2D: Less reliable and may contain Trojans Buy from trusted sources & perform incoming test Authenticate on-die device ID with a trusted database New Problems Poor copying of packages no longer helps with detection Need to access device ID securely through stack Can no longer replace by desoldering from board.

Issue 3: Extra Die in Stack Original Die Stack Extra Die in stack can cause complex Trojans If TSV information is standardized or published, that info can be used by Trojan designer to access desired info. RF Antenna could be added with an extra die on top of the stack and broadcast the data on the bus RF TX die Extra memory and controller die Out of band TSV’s Extra memory and controller die can save selected data for later extraction.

Detecting Extra Die in Stack Depends on where in the stack extra die are located: top of stack is harder: Strategies: Voltage drop Temperature Profile Side Channel Analysis (Power and Delay) X-rays or other imaging approaches Extra processor Extra processor die can drive data bus with opposite values when triggered—shorting power and ground.

Issue 4: Evil FPGA’s in Stack FPGA’s likely to be included for valid reasons: Replace ASICs Built-in Self Repair Test other parts of stack Security Concerns: Firmware Corruption Extra FPGA in stack Trojan can be inserted in the field Hot Spot on FPGA die created by significant switching when Trojan die is triggered. Very complex Trojans are possible

Issue 5: Trojan Interposers Upper Die Lower Die Interposer Silicon Interposers may be needed to align TSV’s on adjacent die—including TSV’s for power and ground. Upper Die Lower Die Trojan Interposer Trojan Logic Trojan Logic in the Interposer (or in one of the die in the stack) could be used to shut off power or data to all upper die In 2D, this is like shutting off power or data to most of the chips on the board!!! If the Trojan is in an interposer, it would not be visible to JTAG or any other DFT hardware by design.

Issue 6: Incorrect Die Ordering Processor Memory ASIC 1 ASIC 2 RF Transceiver Original ordering Processor Memory ASIC 1 ASIC 2 RF Transceiver Trojan ordering Especially if standard interposers are available, an attacker could reorder the die. Causes loss of reliability and performance. Detection Methods: Testing and Die IDs (JTAG, INTEST, etc.)

Issue 7: Protecting IP Today, defective chips can be de-soldered and sent back to the manufacturer for FA. In 3D entire stack will need to be spent. Need to be able to access individual die for debug. Need to protect the IP of each die provider. AMD Processor TI Analog Die Memory ARM Core

Outlook Some of these issues are likely easier to solve than others. Even the easy ones won’t be detected if you aren’t looking! When 3D assembly issues are solved and 3D becomes commonplace, really evil counterfeits are possible. Easy to manufacture with standard, interchangeable die Hard to detect in package Incoming Test is Mandatory!

Conclusions 3D Security and Trust must be addressed at both design and test. Research is needed to mitigate these issues now. Waiting may make solutions much more expensive or impossible to implement If we don’t look for these issues, they will happen, and the consequences could be disastrous.

The End….