1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06.

Slides:



Advertisements
Similar presentations
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
Advertisements

Distance Bounding Protocols with Void Challenges for RFID Jorge Munilla Fajardo Dpto. Ingeniería de Comunicaciones. E.T.S.I.Telecomunicación. Universidad.
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
G53SEC 1 Hardware Security The (slightly) more tactile side of security.
Storey: Electrical & Electronic Systems © Pearson Education Limited 2004 OHT 10.1 Sequential Logic  Introduction  Bistables  Memory Registers  Shift.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Yossef Oren, Dvir Schirman, and Avishai Wool: Tel Aviv University ESORICS 2013.
Amplifier in Wireless World Prepared by :Reem R. Hussein Prof. Issam Rashid Ashqer An-Najah National university Faculty of science Physics department.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
RADIO FREQUENCY MODULE. Introduction  An RF module is a small electronic circuit used to transmit and receive radio signals.  As the name suggests,
ESE – Andrew Rusek Applications of Computer Modeling in Electromagnetic Compatibility (EMC) Tests (Part1) P8. Field Pattern of Three Radiating.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
1 Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, and Tzachy Reinman.
1 Introduction to Communications Professor R. C. T. Lee Dept. of Information Management Dept. of Computer Science Department of Communications Department.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
IR SWITCH & REMOTE CONTROL
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Lecture Notes #7 Radio Frequency Identification (RFID)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
SIDE CHANNEL ATTACKS Presented by: Vishwanath Patil Abhay Jalisatgi.
上海交通大学 自动化系 FROZEN FOOD Case : Cool-Chain of RFID.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
The physics of RFID Matt Reynolds Founding Partner ThingMagic LLC.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Korea University Ubiquitous LAB. Chapter 5. Characteristics of tags Ph.D Chang-Duk Jung.
RFID II Inductive and Microwave Systems
NFC - Near Field Communication Technology
National University of Ireland, Galway RFID Patient Tagging and Database System Student: Martin O’Halloran Supervisor: Martin Galvin.
Clockless Chips Date: October 26, Presented by:
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Smart card security Nora Dabbous Security Technologies Department.
Submitted By: PVS Soumya [2/4] Sai Nandini T [2/4] GNITS GNITS
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Ignite Presentation: Near Field Communication Harry Yang.
Security Analysis of a Cryptographically- Enabled RFID Device Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Avi Rubin, Michael Szydlo Usenix.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Security in Near Field Communication Strengths and Weaknesses
Programmable Logic Controllers
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Presented By: Justin Rilling Written By: Martin Vuagnoux and Sylvain Pasini.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RSA Key Extraction via Low- Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer.
Lecture7 –More on Attacks Rice ELEC 528/ COMP 538 Farinaz Koushanfar Spring 2009.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Antenna Arrays and Automotive Applications
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
English for Advance Learners I
Overview on Hardware Security
Operating Mode 1 – Peer-Peer
SHORT DISTANCE WIRELESS COMMUNICATION
Radio Frequency Identification (RFID)
RF430CL330H Wake from Field Detection
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

1 Remote Power Analysis of RFID Tags Joint work with Adi Shamir yossi.oren[at]weizmann.ac.il 28/Aug/06

2 Abstract The RF power reflected by an RFID tag is dependent on its internal power consumption This property allows power analysis attacks to be performed over a distance In the short term, it can be used to extract the kill password of EPC tags

3 Talk Structure Introduction to passive RFID Introduction to power analysis Our attack Countermeasures

4 A Taxonomy of RFID Tags An RFID tag is a very simple computer, usually associated with a physical object Tags communicate with a powerful reader over a wireless link Tags can be active or passive … can be inductively or radiatively coupled, and work in a variety of operating frequencies Have various levels of computing power EPC tags: passive tags, radiatively coupled, 900MHz, read/write memory

5 Components of the EPC RFID System Tag The reader has a powerful antenna and an external power supply The reader surrounds itself with an electromagnetic field The tag is illuminated by this field Reader

6 Reader  Tag Data Exchange Tag The reader sends commands to the tag via pulse amplitude modulation The tag sends responses to the reader via backscatter modulation Reader

7 Reader  Tag Data Exchange Tag The reader sends commands to the tag via pulse amplitude modulation The tag sends responses to the reader via backscatter modulation Reader

8 Do Tags Have Secrets? Most of the payload of today’s RFID tags is public – that’s what they’re for However, tags still have secrets! Today – EPC tags have secret access and kill passwords Tomorrow – cryptographic keys?

9 An Introduction to power analysis Toggle Flip-flop VCC A OUT Key observation – modern ICs consume more power when they switch between states Used by [Kocher et al. ‘99], others to attack cryptographic smart cards 5V

10 Cracking passwords with power analysis We send the password to a secure device bit by bit The first wrong bit is very “exciting” Allows password to be recoverable in linear time Was used in practice to crack PIN codes on smart cards

11 Previous work EM attacks ([van Eck ‘85], [Mangard ‘03]) Attacks on RFID –Zapping [“Minime” et al. ‘05] –Jamming [Juels et al. ‘03], [Bolan ‘06] –Skimming [Kirschenbaum et al. ‘06]

12 Our attack

13 A Closer Look at Backscatter Modulation Tag Reader The current flowing through the tag antenna results in an electromagnetic field Busy tag = More current = stronger field We call this effect parasitic backscatter

14 Lab setup – physical

15 Lab setup – logical

16 Overview of results Existence of parasitic backscatter Effect of power consumption on backscatter Full power analysis attack from backscatter

17 Existence of parasitic backscatter (1) Trace shows the signal reflected from a Generation 1 tag during a kill command Tag is supposed to be completely silent Is it? Let’s zoom in… Power Time

18 Existence of parasitic backscatter (2) The distinctive saw-tooth pattern is added by the tag to the clean reader signal Probably caused by tag’s power extraction circuit We can show that “thirsty” tags reflect more power Reflection from tagOriginal signal from reader Power Time

19 Full power analysis attack from parasitic backscatter Recap: The first bad password bit is “very exciting” Experiment was done with one tag at a fixed location Tag was programmed with kill password “ ”, then “ ” In both cases we tried to kill it with the wrong password “ ”

20 Extracting one password bit Here, the tag is expecting “ ” Here, it is expecting “ ” In both cases, tag gets “ ” Power Time

21 Power analysis countermeasures Two main approaches: –Mitigation: Lower the signal-to- noise ratio of the power trace –Prevention: Completely decorrelate power consumption from internal state

22 Mitigation countermeasures Common approach: add noise to power consumption Problematic to add to tag Problematic to add to reader

23 Prevention countermeasures Common approach: consume the same amount of power every clock cycle Problem: Power consumption is always worst case Increases tag cost, reduces its usable range

24 Double-buffering power supply Tag Logic Tag Logic Power Extraction Decouple power supply from consumers Compatible with current RF front ends Requires no modifications to tag’s control circuit Power Extraction

25 Closing Remarks Power analysis attacks come from the world of smart cards The rules of the market for RFID tags are not the same as the one for smart cards Power analysis threat should be understood and publicized, or nobody will do anything about it

26 The authors wish to thank Mickey Cohen, Ari Juels, Simon Krausz, Oded Smikt, Eran Tromer, Amir Yakoby, Oren Zarchin and the many other people who shared their knowledge, time and equipment and helped this research take shape.

27 It’s all scratch slides from here on You really want to exit the slide show…

28 TU Graz site, August 2005: Almost previous work?

29 Double-buffering power supply Decouple power supply from consumers Compatible with current RF front ends Requires no modifications to tag’s control circuit Power Extraction Tag Logic Tag Logic Power Extraction

30 Double-buffering power supply Decouples power supply from consumers Compatible with current RF front ends Requires no modifications to tag’s control circuit Tag Logic Power Extraction

31 Double-buffering power supply Decouple power supply from consumers Compatible with current RF front ends Requires no modifications to tag’s control circuit Power Extraction Tag Logic

32 Double-buffering power supply Decouple power supply from consumers Compatible with current RF front ends Requires no modifications to tag’s control circuit Power Extraction Tag Logic

33 Scratch Tag Reader

34 Scratch 2 Tag Reader

35 Scratch 3 Tag The reader has a powerful antenna and a power supply The reader surrounds itself with an electromagnetic field The tag is illuminated by the field, providing it with power Reader

36 Scratch 4