Chapter 14 Physical Tamper Resistance Hack a lock:

Slides:



Advertisements
Similar presentations
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Advertisements

Smart Card Security Xufen Gao CS 265 Spring, 2004 San Jose State University.
Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Smart Card Syed Jabbar Computer Science Course:
Lecture 6 User Authentication (cont)
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Low Cost Attack on Tamper Resistant Devices Ross Anderson, Markus Kuhn Songpol Manoonpong.
CNS2009handout 19: hardware security computer and network security matt barrie.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
CHAPTER REPORT BY EUSTACE ASANGHANWA PHYSICAL TAMPER RESISTANCE Physical Tamper ResistanceEustace Asanghanwa 1.
Chapter 1: Computers and Digital Basics 1 Computers and Digital Basics Chapter 1.
1Copyright © 2005 InfoGard Laboratories Proprietary 2005 Physical Security Conference Physical Security 101 Tom Caddy September 26, 2005.
CIT In this chapter you will learn how to:  Explain the threats to your computers and data  Describe key security concepts and technologies.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Networks: LANs File Server : Runs software, stores files. Terminals : Workstations that give network access. Print Server : Queues up all print jobs from.
MEMORY ORGANIZATION Memory Hierarchy Main Memory Auxiliary Memory
Chapter 10  ATM 1 Automatic Teller Machines. Chapter 10  ATM 2 Automatic Teller Machines  “…one of the most influential technological innovations of.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Trusted Computing Initiative Beyond trustworthy. Trusted Computing  Five Key Concepts >Endorsement Key >Secure Input and Output >Memory Curtain / Protected.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Iron Key and Portable Drive Security Zakary Littlefield.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
SMARTCARDS. What we’ll cover: How does the Smart Card work (layout and operating system)? Security issues for the card holder The present and future of.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
CPU The CPU is a microchip that is installed on a motherboard and acts as the computer’s brain - performing calculations and coordinating the hardware.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Secure MCU REA FAE Training – June A Rev
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
BUSINESS B1 Information Security.
Parts Of Computer Networks What makes them work!.
Smart Card 李開振, 許家碩 Department of Computer Science National Chiao Tung University.
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Protecting Data on Smartphones and Tablets from Memory Attacks
1 Architectural Support for Copy and Tamper Resistant Software David Lie, Chandu Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and.
Smart card security Nora Dabbous Security Technologies Department.
Smart Card Technology & Features
1 Hardware Security AbdelRahman abu_absah Teacher: Dr. Sanaa al_sayegh.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
A smart card is a credit-card sized plastic card embedded with an integrated circuit chip that makes it "smart". This marriage between a convenient plastic.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 11: Security.
Smart Cards by Mahadev Karadigudda. * Introduction * How smart cards assist in enhancing security * Security vulnerabilities * Conclusion.
Computer organization Practical 1. Administrative Issues The course requirements are: –To be nice and open minded –To pass the exam (there is a boolean.
R ECONFIGURABLE SECURITY SUPPORT FOR EMBEDDED SYSTEMS 1 AKSHATA VARDHARAJ.
CIS 325: Data Communications1 Chapter Seventeen Network Security.
Introduction Architecture Hardware Software Application Security Logical Attack Physical Attack Side channel Attack.
DES: Data Encryption Standard
Study on Cryptographic Application for Smart Card Course Title : Computer Security & E-Payment System Faculty : 김 광 조 김 종 승
HOME AUTOMATION USING PC DONE BY RAJESHKUMAR S SRI HARSHA D.
e-Wallet – THE FUTURE OF CARDS
Twesige Richard.  Advanced RISC Machines.  Set of instruction set architectures related to programing registers, CPU’s also I/O devices.  RISC acronym.
Software Security Seminar - 1 Chapter 10. Using Algorithms 발표자 : 이장원 Applied Cryptography.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
Securing Information Systems
Security of Digital Signatures
Gas Pump Credit Card Fraud Identification & Prevention
Processor/Memory Chapter 3
ABYSS : An Architecture for Software Protection
Hardware Cryptographic Coprocessor
Wow... that's a lot of dust!:**
How Things Work: Smart Cards Ian McConkey November 2, 2017
Securing Information Systems
User-mode Secret Protection (SP) architecture
By: Matthew Harris and brendan salvas
Guide to Computer Forensics and Investigations Fourth Edition
Presentation transcript:

Chapter 14 Physical Tamper Resistance Hack a lock:

Physically secure processors Portable tamper resistant IBM 4758 processors rated at governments highest level of security Was found to be breakable see above. Need: To house crypto material is a secure housing

Crypto Processors Attack key entry Attack casing Attack potting material Memory remanence Cold enhances remanence

Classes of attackers Class 1 clever outsiders Class 2 knowledgeable insiders Class 3 funded organizations 4758 aimed at funded organizations

Medium Security Processors iButton Building access Computer access A “what you have” Dallas 5002 Uses bus encryption Clipper chip Encryption with way for government to decrypt all messages

Smart Cards Mobile phones Build “generic phones” Smart card contains user specific data Used by T-mobile Pay-TV subscriber cards, hotel door locks, telephone cards…

Architecture Most 8-bit processor ROM for program and other non changing data EEPROM for customer specific data RAM registers for processing data

Attacks on Smartcards Protocols Slow cards execution Physical tampering DirectTV attacks back

Smartcards Not feasible for total protection Defense in depth Tamper resistance versus tamper evidence Stop loss Recent articles Kinko Fedex cards not SmartCard, but can recharge at Kiosk:

Magnetic stripe Current fraud: _someone.html _someone.html This site has know how for many types of programming:

What goes wrong Architectural errors Protecting the wrong thing Protocol failure Function creep

Discussion articles iButton actual uses What to protect with secure devices (ie 14.8 What should be protected)

Links to material Hardware Hacking chapter: Tamper resistance: Case Study Hack-a-Bike Data remanence

Links to material Tamper resistance evaluation criteria Ibutton Clipper chip

Links to Material Smart Card Security DirectTV fights back Tools