1 Information Security – Theory vs. Reality 0368-4474-01, Winter 2013-2014 Lecture 7: Tamper Resilience, Cryptographic leakage Resilience Eran Tromer Slides.

Slides:



Advertisements
Similar presentations
18 July 2001 Work In Progress – Not for Publication 2001 ITRS Test Chapter ITRS Test ITWG Mike Rodgers Don Edenfeld.
Advertisements

FPGA (Field Programmable Gate Array)
Applications of PICs Advantages/disadvantages Digital and analogue control Loops, sub-routines, scanning, counting and feedback Interrupts Problems with.
Private Circuits Protecting Circuits Against Side-Channel Attacks Yuval Ishai Technion & UCLA Based on joint works with Manoj Prabhakaran, Amit Sahai,
10/14/2005Caltech1 Reliable State Machines Dr. Gary R Burke California Institute of Technology Jet Propulsion Laboratory.
1 SECURE-PARTIAL RECONFIGURATION OF FPGAs MSc.Fisnik KRAJA Computer Engineering Department, Faculty Of Information Technology, Polytechnic University of.
Physical Unclonable Functions and Applications
1 U NIVERSITY OF M ICHIGAN Reliable and Efficient PUF- Based Key Generation Using Pattern Matching Srini Devadas and Zdenek Paral (MIT), HOST 2011 Thomas.
Chapter 1 The 8051 Microcontroller
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Programmable Logic Devices
Protecting Circuits from Leakage the computationally bounded and noisy cases Sebastian Faust Eurocrypt 2010, Nice Joint work with KU Leuven Tal Rabin Leo.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
ENGIN112 L38: Programmable Logic December 5, 2003 ENGIN 112 Intro to Electrical and Computer Engineering Lecture 38 Programmable Logic.
Iron Key and Portable Drive Security Zakary Littlefield.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
The Spartan 3e FPGA. CS/EE 3710 The Spartan 3e FPGA  What’s inside the chip? How does it implement random logic? What other features can you use?  What.
Registers  Flip-flops are available in a variety of configurations. A simple one with two independent D flip-flops with clear and preset signals is illustrated.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
CS 151 Digital Systems Design Lecture 38 Programmable Logic.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
The 8051 Microcontroller Architecture
Microcontroller: Introduction
Digital Circuit Implementation. Wafers and Chips  Integrated circuit (IC) chips are manufactured on silicon wafers  Transistors are placed on the wafers.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
General FPGA Architecture Field Programmable Gate Array.
Programmable Logic- How do they do that? 1/16/2015 Warren Miller Class 5: Software Tools and More 1.
MCU – Microcontroller Unit – 1 MCU  1 cip or VLSI core – application-specific.
Group Members: Brad Cox Kevin Burkett Tera Cline Arthur Perkins CS10 Battery Management System.
EGRE 427 Advanced Digital Design Figures from Application-Specific Integrated Circuits, Michael John Sebastian Smith, Addison Wesley, 1997 Chapter 7 Programmable.
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
Power Reduction for FPGA using Multiple Vdd/Vth
Cryptography on Non-Trusted Machines Stefan Dziembowski.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
EGRE 427 Advanced Digital Design Figures from Application-Specific Integrated Circuits, Michael John Sebastian Smith, Addison Wesley, 1997 Chapter 4 Programmable.
1 The Chinese University of Hong Kong Faculty of Education Diploma in Education (Part-Time) Winter 1997 Educational Communications and Technology Assignment.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
Smart card security Nora Dabbous Security Technologies Department.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
J. Christiansen, CERN - EP/MIC
® SPARTAN Series High Volume System Solution. ® Spartan/XL Estimated design size (system gates) 30K 5K180K XC4000XL/A XC4000XV Virtex S05/XL.
Programmable Logic Devices
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Sept. 2005EE37E Adv. Digital Electronics Lesson 1 CPLDs and FPGAs: Technology and Design Features.
CS 8421 Computing Systems, Dr. Hoganson Copyright © 2004, 2006 Dr. Ken Hoganson CS Class Will Start Momentarily… CS8421 Computing Systems.
1 Information Security – Theory vs. Reality , Winter Lecture 10: Garbled circuits and obfuscation Eran Tromer Slides credit: Boaz.
EE3A1 Computer Hardware and Digital Design
Spring 2007 W. Rhett Davis with minor editing by J. Dean Brock UNCA ECE Slide 1 ECE 406 – Design of Complex Digital Systems Lecture 1: Introduction.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
PROJECT - ZYNQ Yakir Peretz Idan Homri Semester - winter 2014 Duration - one semester.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
1 Information Security – Theory vs. Reality , Winter Lecture 13: Cryptographic leakage resilience (cont.) Eran Tromer Slides credit:
Information Security – Theory vs
ITRS 2000 Update Work In Progress - Do Not Publish! 1 ITRS/ Design TWG Update 2000 System on Chip, Design Productivity, Low Power, Deep Submicron Design.
EE121 John Wakerly Lecture #15
Chapter 11 System-Level Verification Issues. The Importance of Verification Verifying at the system level is the last opportunity to find errors before.
1 Information Security – Theory vs. Reality , Winter Lecture 9: Leakage resilience (continued) Lecturer: Eran Tromer.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
FPGA Field Programmable Gate Arrays Shiraz University of shiraz spring 2012.
3-1 MKE1503/MEE10203 Programmable Electronics Computer Engineering Department Faculty of Electrical and Electronic Universiti Tun Hussein Onn Malaysia.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Programmable Hardware: Hardware or Software?
Arduino Based Industrial appliances control system by decoding dual tone multi frequency signals on GSM / CDMA network. Submitted by:
Overview on Hardware Security
Trusted Computing and the Trusted Platform Module
Maintaining Data Integrity in Programmable Logic in Atmospheric Environments through Error Detection Joel Seely Technical Marketing Manager Military &
Why microcontrollers in embedded systems?
Hardware Masking, Revisited
Protect Your Hardware from Hacking and Theft
Physical Unclonable Functions and Applications
Presentation transcript:

1 Information Security – Theory vs. Reality , Winter Lecture 7: Tamper Resilience, Cryptographic leakage Resilience Eran Tromer Slides credit: Sergei Skorobogatov, Yuval Ishai

2 Hardware tamper protection

3 Old devices –security fuse is placed separately from the memory array (easy to locate and defeat)‏ –security fuse is embedded into the program memory (hard to locate and defeat), similar approach is used in many smartcards in the form of password protection and encryption keys –moving away from building blocks which are easily identifiable and have easily traceable data paths Motorola MC68HC908AZ60A microcontrollerScenix SX28 microcontroller Defence technologies: tamper protection

4 Help came from chip fabrication technology –planarisation as a part of modern chip fabrication process (0.5 μm or smaller feature size)‏ –glue logic design makes reverse engineering much harder –multiple metal layers block any direct access –small size of transistors makes attacks less feasible –chips operate at higher frequency and consume less power –smaller and BGA packages scare off many attackers 0.9µm microcontroller0.5µm microcontroller0.13µm FPGA

5 Defence technologies: tamper protection Additional protections –top metal layers with sensors –voltage, frequency and temperature sensors –memory access protection, crypto-coprocessors –internal clocks, power supply pumps –asynchronous logic design, symmetric design, dual-rail logic –ASICs‏, secure FPGAs and custom-designed ICs –software countermeasures STMicroelectronics ST16 smartcardFujitsu secure microcontroller

Macro-scale defense Wire-in-epoxy wrappers Metal shield Switches Sensors Zero the memory (with batteries) Bus encryption (e.g., Dallas 5000) “Hunker down” to a single chip for critical portions (e.g., Intel SGX)

7 Security advertising without proof –no means of comparing security, lack of independent analysis –no guarantee and no responsibility from chip manufacturers –wide use of magic words: protection, encryption, authentication, unique, highly secure, strong defence, cannot be, unbreakable, impossible, uncompromising, buried under x metal layers Constant economics pressure on cost reduction –less investment, hence, cheaper solutions and outsourcing –security via obscurity approach Quicker turnaround –less testing, hence, more bugs What about back-doors? –access to the on-chip data for factory testing purposes –how reliably was this feature disabled? –how difficult is to attack the access port? –are there any trojans deliberately inserted by subcontractors? Defence technologies: caveats

8 Defence technologies: failure examples Microchip PIC microcontroller: security fuse bug –security fuse can be reset without erasing the code/data memory solution: fixed in newer devices Hitachi smartcard: information leakage on a products CD –full datasheet on a smartcard was placed by mistake on the CD Actel secure FPGA: programming software bug –devices were always programmed with a passkey solution: software update Xilinx secure CPLD: programming software bug –security fuse incorrectly programmed resulting in no protection solution: software update Dallas SHA-1 secure memory: factory initialisation bug –some security features were not activated resulting in no protection solution: recall of the batch Entropy deficiency in multiple embedded device models –RSA keys generated with common primes solution: ??? Other possible ways of security failures –insiders, datasheets of similar products, development tools, patents solution: test real devices and control the output

9 Conclusions There is no such a thing as absolute protection –given enough time and resources any protection can be broken Technical progress helps a lot, but has certain limits –do not overestimate capabilities of the silicon circuits –do not underestimate capabilities of the attackers Defence should be adequate to anticipated attacks –security hardware engineers must be familiar with attack technologies to develop adequate protection –choosing the correct protection saves money in development and manufacturing Attack technologies are constantly improving, so should the defence technologies Many vulnerabilities were found in various secure chips and more are to be found posing more challenges to hardware security engineers

10 Cryptographic leakage/tamper resilience

Circuit transformers 11 sisi xY Any boolean circuit Circuit transformation Transformed circuit YX C’C

Circuit transformers T=(T C,T s ), on inputs k,t, maps C to C’ and s 0 to s 0 ’. T may be randomized –(e.g., to handle probing) C’ can be either randomized or (better yet) deterministic. Functionally equivalent: C[s 0 ]  C’[s 0 ’] 12 sisi xY YX C’C

13 xY YX black-box indistinguishable Security [Ishai Sahai Wagner ’03] C’C admissible leakage sisi

INPUT OUTPUT CIRCUIT MEMORY Security definition T protects privacy:  circuit C  efficient Sim  admissible Adv  initial state s 0 : Sim Adv,C[s0]  view of Adv attacking C’[s 0 ’] (Even in case of tampering, only privacy is required) C INPUT OUTPUT CIRCUIT MEMORY T C’ s0s0 s0’s0’ 14

Simple/practical schemes I Sum-of-wires leakage –Dual-Rail Logic Proof sketch: simulator runs adversary and, when asked for the leakage value, answers with the constant (thus known) Hamming weight (to be continued.) 15