Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas

Slides:



Advertisements
Similar presentations
Made Harta Dwijaksara Park, Yi Jae
Advertisements

Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Physical Unclonable Functions and Applications
Differential Power Analysis of Smartcards How secure is your private information? Author: Ryan Junee Supervisor: Matt Barrie.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Trustworthy Services from Untrustworthy Components: Overview Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Chapter 10: Authentication Guide to Computer Network Security.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 Presented by July-2013, IIM Indore. 2  RFID = Radio Frequency IDentification.  RFID is ADC (Automated Data Collection) technology that:-  uses radio-frequency.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
SEC835 Practical aspects of security implementation Part 1.
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Physically Unclonable Function– Based Security and Privacy in RFID Systems Leonid Bolotnyy and Gabriel Robins Dept. of Computer Science University of Virginia.
Broadening Expertise in Critical Infrastructure Protection Mobile Devices Module Funded through NSF Grant Award # DUE Any opinions, findings, conclusions.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
APPLICATION PENETRATION TESTING Author: Herbert H. Thompson Presentation by: Nancy Cohen.
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Cut Saturation for p-cycle Design Khalid Al-Snaie Electronics Dept., College of Technology Riyadh, Saudi Arabia Dale R. Thompson* Department of Computer.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 14 October 5, 2004.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Module 2: Designing Network Security
Authentication What you know? What you have? What you are?
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
1 Information Security – Theory vs. Reality , Winter Lecture 3: Power analysis, correlation power analysis Lecturer: Eran Tromer.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 RFID Security Nicholas Alteen Computer Science Program Florida Gulf.
CSCE 201 Identification and Authentication Fall 2015.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Tag Layer CSCE 4013 RFID INFOSEC Instructor: Dr. Jia Di JBHT 523
Threat Modeling for Cloud Computing
Computer-User-Input Behavioral Biometrics The Biometrics we focus on at Pace University Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University.
Training Arkansas Computing Teachers (TACT)
Discussion and Conclusion
Lesson Title: Reader Architecture and Antenna Configurations
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Physical Unclonable Functions and Applications
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson and Jia Di

Tag Layer 2

Tag Threats STRIDE Category Threat Spoofing Identity - Tag counterfeiting/cloning - Tag emulation Tampering with data - Add, modify, rearrange or delete data Repudiation None Information disclosure - Probing tag - Side-channel attacks - Tracking - Tracing Denial of service - Shielding - Coupling Elevation of privilege None 3

Tag Counterfeiting/Cloning (Spoofing Identity) 4

Counterfeiting Mitigation Tag Authentication – Store secrets on the tag that can be verified – Secret keys, symmetric key and public key cryptography Physical unclonable functions (PUFs) Electronic fingerprint (E-Fingerprint) 5

Tag Authentication Protocol (Challenge/Response) 6

Physical Unclonable Function (PUF) A function that can be read but not copied – One is logic that has multiple race conditions PUF added to a tag General Steps – Enrollment Responses to several challenges are recorded. The responses are unique to this PUF – Verification Challenge PUF and determine if correct response 7

E-Fingerprint Approach Identification becomes a function of what the device “is” instead of a secret it “knows.” 8

Minimum power response at multiple frequencies (MPRMF) Five same-model tags from the same roll 9

Tampering with Data Mitigation in Gen-2 Lock: make memory unreadable and unchangeable unless 32-bit password is provided Permalock: make memory unchangeable Tag identification (TID) memory: encodes chip manufacturer and model. Some have suggested putting a serial number in TID memory that cannot be changed to identify tag. 10

Side-Channel Attacks (Information Disclosure threat) Secret information is leaked through an unexpected channel (side-channel) Safecracker listens to tumblers to open safe Attackers measure power and timing differences of tag to determine secret key – Circuits may use different amount of power when processing a data-1 or data-0 – A circuit’s timing delays may be different for data-1 or data

Side-Channel Attacks Power-based attacks (SPA, DPA, HO-DPA) Timing-based attacks Electromagnetic-based attacks Fault-injection attacks 12

CMOS Circuit Power and Delay Power consumption and timing delay are highly correlated to switching activities

Synchronous Circuit Power Fluctuation Simulation 14 Boolean circuits are vulnerable to side-channel attacks

Power Side-Channel Mitigation Randomize power consumption – add noise to reader/tag  Use random initial point  Random power management  Random code injection De-correlate power consumption from internal data pattern being processed  New transistor-level gate designs (SABL, DyCML, SDDL, WDDL, etc.)  Current compensation  Execute both nominal and complementary data  Dual-rail asynchronous logic 15

Balancing the Switching Activities between Two Rails Dual-spacer Dual-rail Delay-insensitive Logic (D 3 L) StateRail 1Rail 0 All-zero spacer00 DATA 001 DATA 110 All-one spacer11 Rail 1 Rail 0 AZS DATA1AOSDATA0AZSDATA1

D3L vs NCL Simulations 17

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008, 2009 by Dale R. Thompson and Jia Di. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 19