/
Information Security – Theory vs. Reality Information Security – Theory vs. Reality

Information Security – Theory vs. Reality - PowerPoint Presentation

lindy-dunigan
lindy-dunigan . @lindy-dunigan
Follow
346 views
Uploaded On 2019-06-19

Information Security – Theory vs. Reality - PPT Presentation

03684474 Winter 20152016 Lecture 7 Fault attacks Hardware security 12 Lecturer Eran Tromer Fault attacks Fault attacks on chips nonnominal channels Temperature Mechanical stress ID: 759077

invasive attacks security protection attacks invasive protection security attack secure cost fault power time analysis hardware data chips tamper levels access system

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Information Security – Theory vs. Real..." is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Information Security – Theory vs. Reality 0368-4474, Winter 2015-2016Lecture 7:Fault attacks,Hardware security (1/2)

Lecturer:Eran Tromer

Slide2

Fault attacks

Slide3

Fault attacks on chips: non-nominal channels

Temperature

Mechanical stress

Clock

Overlocking, unstable, spikes

Supply voltage / ground

Too low, too high, unstable, spikes

Electromagnetic

Strong electric/magnetic fields

Optical

Chemical

Inject signals into

non-

inpu

On non-input pins

Using probes within circuit

Slide4

Fault attacks: abusing nominal channels

Exploits using malformed inputs

Buffer overflow, SQL injection, …

Imperfect behavior and “unlikely” error conditions

Rowhammer

on DRAM

Corrupt communication on interfaces with peripherals and network

Slide5

Fault attacks: trojan horses in the “IT supply chain”

Hardware designHardware manufacturingSoftware designSoftware manufacturingStandardsNSA’s Dual_EC_DRBGDistributionTransportation

Slide6

Differential Fault Analysis of Arbitrary Decryption

Whiteboard discussion.

[

Biham

, Shamir,

Differential Fault Analysis of Secret Key Cryptosystems

, CRYPTO 1997 (section 3)]

Slide7

Fault Analysis of RSA-CRT signatures

Whiteboard

discussion:

Using

faulty+correct

signature

Using faulty signature and known message

[

DeMillo

, Lipton,

On the importance of eliminating errors in cryptographic

protocols

, Journal of Cryptology, 2001 (Section 2.2)]

Slide8

Hardware security(survey and additional vectors)

Including presentation material bySergei Skorobogatov, University of Cambridge

Slide9

Outline

IntroductionAttack awarenessTamper protection levelsAttack methodsNon-invasiveInvasiveSemi-invasiveProtection against attacksConclusions

9

Slide10

Physical security

Protection of systems and devices against physical attacksprotecting secrets from being stolenpreventing unauthorised accessprotecting intellectual property from piracypreventing fraudExampleslocks and sensors to prevent physical accesssmartcards to hold valuable data and secret keyselectronic keys, access cards and hardware dongleselectronic meters, SIM cards, PayTV smartcardscrypto-processors and crypto-modules for encryptionmobile phones, game consoles and many other devicesproduct identification for printer ink, perfume etc.

10

Slide11

Why do we need hardware security?

Theft of serviceattacks on service providers (satellite TV, electronic meters, access cards, software protection dongles)‏Access to informationinformation recovery and extraction gaining trade secrets (IP piracy)‏ID theftCloning and overbuildingcopying for making profit without investment in developmentlow-cost mass production by subcontractorsDenial of servicedishonest competitionelectronic warfare

11

Slide12

Who need secure chips?

There is growing demand for secure chipscar industry, service providers, manufacturers of various devicesbanking industry and military applicationsTechnical progress pushed secure semiconductor chips towards ubiquityconsumer electronics (authentication, copy protection)‏aftermarket control (spare parts, accessories)‏access control (RF tags, cards, tokens and protection dongles)‏service control (mobile phones, satellite TV, license dongles)‏intellectual property (IP) protection (software, algorithms, design)‏ChallengesHow to design secure system? (hardware security engineering)‏How to evaluate protection? (estimate cost of breaking)‏How to find the best solution? (minimum time and money)‏

12

Slide13

How to design a secure system?

What is the reason to attack your system?attack scenarios and motivations: theft, access, cloning or DoSWho is likely to attacks your system?classes of attackers: outsiders, insiders or funded organisationsWhat tools would they use for the attacks?attack categories: side-channel, fault, probing, reverse engineeringattack methods: non-invasive, invasive, semi-invasiveHow to protect against these attacks?estimate the threat: understand motivation, cost and probabilitydevelop adequate protection by locating weak pointsperform security evaluationchoose secure components for your system (blocks and chips)‏

13

Slide14

Choosing secure components

What has changed in the past?too many designs and devices on the marketvast majority of devices are claimed to be securesecurity started to be used for marketing purposesvirtually impossible to test everythingWhat are the problems?certification does not provide guarantee against attacksmanufacturers do not carry any obligations or legal responsibilityno such thing as security benchmarkno ways of comparing devices from different manufacturersno chip manufacturer will tell you the truth about securityNeed for security educated system engineers

14

Slide15

Attack categories

Side-channel attackstechniques that allows the attacker to monitor the analog characteristics of supply and interface connections and any electromagnetic radiationSoftware attacksuse the normal communication interface and exploit security vulnerabilities found in the protocols, cryptographic algorithms, or their implementationFault generationuse abnormal environmental conditions to generate malfunctions in the system that provide additional accessMicroprobingcan be used to access the chip surface directly, so we can observe, manipulate, and interfere with the deviceReverse engineeringused to understand the inner structure of the device and learn or emulate its functionality; requires the use of the same technology available to semiconductor manufacturers and gives similar capabilities to the attacker

15

Slide16

Attack methods

Non-invasive attacks (low-cost)‏observe or manipulate with the device without physical harm to itrequire only moderately sophisticated equipment and knowledge to implementInvasive attacks (expensive)‏almost unlimited capabilities to extract information from chips and understand their functionalitynormally require expensive equipment, knowledgeable attackers and timeSemi-invasive attacks (affordable)‏semiconductor chip is depackaged but the internal structure of it remains intactfill the gap between non-invasive and invasive types, being both inexpensive and easily repeatable

16

Slide17

Tamper protection levels

Level ZERO (no special protection)‏microcontroller or FPGA with external ROMno special security features are used. All parts have free access and can be easily investigatedvery low cost, attack time: minutes to hours

17

D.G.Abraham et al. (IBM), 1991

Slide18

Tamper protection levels

Level LOWmicrocontrollers with proprietary access algorithm, remarked ICssome security features are used but they can be relatively easy defeated with minimum tools requiredlow cost, attack time: hours to days

18

Slide19

Tamper protection levels

Level MODLmicrocontrollers with security protection, low-cost hardware donglesprotection against many low-cost attacks; relatively inexpensive tools are required for attack, but some knowledge is necessarymoderate cost, attack time: days to weeks

19

Slide20

Tamper protection levels

Level MODsmartcards, high-security microcontrollers, ASICs, CPLDs, hardware dongles, i-Buttons, secure memory chipsspecial tools and equipment are required for successful attack as well as some special skills and knowledgehigh cost, attack time: weeks to months

20

Slide21

Tamper protection levels

Level MODHsecure i-Buttons, secure FPGAs, high-end smartcards, ASICs, custom secure ICsspecial attention is paid to design of the security protection; equipment is available but is expensive to buy and operatevery high cost, attack time: months to years

21

Picture courtesy of Dr Markus Kuhn

Slide22

Tamper protection levels

Level HIGHPrimary example: Hardware Security Modules (HSMs)military, banks, ATM, certificate authoritiesall known attacks are defeated. Some research by a team of specialists is necessary to find a new attackextremely high cost, attack time: years

22

Picture courtesy of Dr Markus Kuhn

Slide23

Tamper protection levels

Division into levels from ZERO to HIGH is relativesome products designed to be very secure might have flawssome products not designed to be secure might still end up being very difficult to attacktechnological progress opens doors to less expensive attacks, thus reducing the protection level of some productsProper security evaluation must be carried out to estimate whether products comply with all the requirementsdesign overview for any possible security flawstest products against known attacks

23

Slide24

Non-invasive attacks

Slide25

Non-invasive attacks

Non-penetrative to the attacked devicenormally do not leave tamper evidence of the attackToolsdigital multimeterIC soldering/desoldering stationuniversal programmer and IC testeroscilloscope, logic analyser, signal generatorprogrammable power suppliesPC with data acquisition board, FPGA board, prototyping boardsTypes of non-invasive attacks: passive and activeside-channel attacks: timing, power, electromagnetic, acoustic, thermal, …data remanencefault injection: glitching, bumpingbrute forcing

25

Slide26

Non-invasive attacks: side-channel

(discussed previously)

26

Slide27

Non-invasive attacks: side-channel

Timing attacks aimed at different computation timeincorrect password verification: termination on incorrect byte, different computation length for incorrect bytesincorrect implementation of encryption algorithms: performance optimisation, cache memory usage, non-fixed time operationsPower analysis: measuring power consumption in timevery simple set of equipment – a PC with an oscilloscope and a small resistor in power supply line; very effective against many cryptographic algorithms and password verification schemessome knowledge in electrical engineering and digital signal processing is requiredtwo basic methods: simple (SPA) and differential (DPA)‏Electro-magnetic analysis (EMA): measuring emissionsimilar to power analysis, but instead of resistor, a small magnetic coil is used allowing precise positioning over the chip

27

Slide28

28

Non-invasive attacks: power analysis

Simple power analysis (SPA): difference in instruction flow8-byte password check in Freescale MC908AZ60A microcontroller1 byte at a time, 1 of 256 attempts leads to distinctive power tracefull password recovery in 2048 attempts (less than 10 minutes)‏

loop: CBEQX #$FE, ptr3 ;check for end

JSR sub_recv ;receive byte

CBEQ X+, ptr2 ;compare byte

CLR adr_50 ;clear status

ptr1: BRA loop ;loop

ptr2: BRA ptr1 ;time alignment

ptr3: LDX #$FF ;set address

LDA adr_50 ;check status

BEQ cont ;skip flash enable

STX , X ;flash enable

cont: … … …

Slide29

29

Non-invasive attacks: power analysis

Differential power analysis (DPA): correlation with secretAES decryption in asynchronous ASIC (130 nm, 1.5V), 128-bit keyfirst round of decryption starts with XORing the input data with round key, the difference is only in the input data and the resultfull key recovery in 256 attempts with each attempt requiring average of 4096 traces (~2 minutes per attempt, total 8 hours)‏

Slide30

Non-invasive attacks: fault injection

Glitch attacksclock glitchespower supply glitchesdata corruptionSecurity fuse verification in the Mask ROM bootloader of the Motorola MC68HC05B6 microcontrollerdouble frequency clock glitch causes incorrect instruction fetchlow-voltage power glitch results in corrupted EEPROM data read

30

LDA #01h ;load content of EEPROM byte

AND $0100 ;check a flag bit

loop: BEQ loop ;endless loop if the bit is zero

BRCLR 4, $0003,

cont

;test mode of operation

JMP $0000 ;direct jump to the

preset

address

cont

: … … …

Slide31

Non-invasive attacks: fault injection

Bumping and selective bumping attacksaimed at internal integrity check procedure on a chip (verification and authentication using encryption or hash functions)‏aimed at blocks of data down to bus width or at individual bits within the busPower supply glitching attack on secure microcontrollerexhaustive search: 2127 attempts per 128-bit AES key  >trillion yearsbumping: 215 attempts per 16-bit word, 100ms cycle, 8 hours for AES keyselective bumping: 27 attempts per 16-bit word, 2 minutes for AES key

31

Slide32

Non-invasive attacks: brute forcing

Brute force attackssearching for keys and passwords, exploiting inefficient selection of keys and passwordsrecovering design from CPLDs, FPGAs and ASICseavesdropping on communication to find hidden functionsapplying random signals and commands to find hidden functionalityModern chips deter most brute force attackslonger keys make searching infeasiblemoving from 8-bit base to 32-bit base means longer searchCPLDs, FPGAs and ASICs became too complex to analysetoo large search field for finding hidden functionality

32

Slide33

Non-invasive attacks: data remanence

(discussed in previous lecture)

33

Slide34

Invasive attacks

Slide35

Invasive attacks

Penetrative attacksleave tamper evidence of the attack or even destroy the deviceToolsIC soldering/desoldering stationsimple chemical labhigh-resolution optical microscopewire bonding machine, laser cutting system, microprobing stationoscilloscope, logic analyser, signal generatorscanning electron microscope and focused ion beam workstationTypes of invasive attacks: passive and activedecapsulation, optical imaging, reverse engineeringmicroprobing and internal fault injectionchip modification

35

Slide36

Invasive attacks: sample preparation

Decapsulationmanual with fuming nitric acid (HNO3) and acetone at 60ºCautomatic using mixture of HNO3 and H2SO4full or partialfrom front side and from rear sideChallenging process for small and BGA packages

36

Slide37

Invasive attacks: imaging

Optical imagingresolution is limited by optics and wavelength of a light: R = 0.61 λ / NA = 0.61 λ / n sin(μ)‏reduce wavelength of the light using UV sourcesincreasing the angular aperture, e.g. dry objectives have NA = 0.95increase refraction index of the media using immersion oil (n = 1.5)‏

37

Bausch&Lomb MicroZoom, 50×2×, NA = 0.45

Leitz Ergolux AMC, 100×, NA = 0.9

Slide38

Invasive attacks: imaging

Optical imagingimage quality depends on microscope opticsdepth of focus helps in separating the layersgeometric distortions pose problem for later post-processing

38

Slide39

Invasive attacks: reverse engineering

Reverse engineering – understanding the structure of a semiconductor device and its functionsoptical, using a confocal microscope (for > 0.5 μm chips)‏deprocessing is necessary for chips with smaller technology

39

Picture courtesy of Dr Markus Kuhn

Slide40

Invasive attacks: reverse engineering

Removing top metal layer using wet chemical etchinggood uniformity over the surface, but works reliably only for chips fabricated with 0.8 μm or larger process (without polished layers)‏

40

Motorola MC68HC705C9A microcontroller1.0 μm

Microchip PIC16F76 microcontroller

0.5

μ

m

Slide41

Invasive attacks: reverse engineering

Memory extraction from Mask ROMsremoving top metal layers for direct optical observation of data in NOR ROMs (bits programmed by presence of transistors)‏not suitable for VTROM (ion implanted) used in smartcards – selective (dash) etchants are required to expose the ROM bits

41

NEC μPD78F9116 microcontroller0.35 μm

Motorola MC68HC05SC27 smartcard

1.0

μmPicture courtesy of Dr Markus Kuhn