Home
Fault attacks on secure chips: from glitch to flash
Contents
1. selective bumping is aimed at individual bits within the bus oa TNT TNT TT TT TAT TMT TT TM IT etl lM li ll po T Address net X n X net X mA Data ma n m naz Latch i iji Data Bus nat x n X wT Xz Verify m En Bumping Selective Rise ft bumping pan N ZZ not sensitive to timing f sensitive to timing at Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 New challenge 90nm Secure ARM microcontroller with AES crypto engine secure memory for AES 128 key storage permanent JTAG disable fuse code is executed from the internal SRAM that can be loaded from AES encrypted external NAND SD or SPI Flash memory once activated the AES key is read protected and cannot be altered other security measures are also in place 32 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results Analysis of the selective bumping phenomenon using the secure microcontroller with AES authentication hardware setup was built based on evaluation kit and JTAG debugging chip was supplied pre programmed with a test AES key by industrial sponsor Non invasive power supply glitching attack was found glit
2. narrow data bus Fel dedicated control logic Meee BID Bi B2 B3 BIS a e en kar H Cele saree OL oir i ss F w coven iE Cortral i rr Taiches o0o000000 Read Sense Amplifiers me Foiysiieon 29 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Bumping attacks Bumping is a certain type of physical attack on door locks Memory Bumping attacks is a new class of fault injection attacks aimed at the internal integrity check procedure on chip vee ia of cuk bo TTI i eee oT TM CLK vo T T yo Shifting new data e a Internal verification Respond from previous block Respond from verification current block verification 30 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Bumping attacks simple bumping is aimed at blocks of data down to bus width
3. 29 May 3 June 2011 Results for selective bumping Using SPA results as a time reference block verification 40us 26 of 32 bit words per block 1 5us word Laser switching time was adjusted in 25ns steps searching for single 0 bit then two 0 and so on until passed Data extraction time 30 minutes per block 50 days chip 2 attempts per word 26 words per block 10ms per cycle 41 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Limitations Slow process depends on the implementation of data verification or authentication Precision timing is not necessary slowly increase the delay until the effect is observed Selective bumping attacks have partial repeatability individual bits within a memory row have different path lengths slight variation between memory rows due to transistors parameters e Fault attacks can be carried out with glitching or optically optical attacks on modern chips require backside approach Precise positioning for optical attacks is not necessary but a stable optical bench is required for a long run attack Security with no readback is not the only one in ProASIC3 passkey access protection AES encryption security fuses 42 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Improvements e Moving away from semi inv
4. memory access via JTAG for Erase Program and Verify operations there is NO readback mechanism on PA3 devices the secret JTAG registers set V close to V of the Flash cells the test board is glitching V to influence V of the Flash cells 53 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results for bumping e Using SPA results as a time reference Verification result is available after each block of 832 bits 2300 blocks per array 26 of 32 bit words per block Two ways of approaching set Vz_ lt min V to flip all bits to 1 set Vz_ gt max V to flip all bits to 0 e Power glitching of Vec for the duration of N words and search for matching value e Change V and repeat Vec glitching until all bits are found Number of bits changed at a time from 1 to 4 Data extraction time 5 days per block 30 years chip 2 attempts per word 26 words per block 10ms per cycle Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results for selective bumping e Using SPA results as a time reference block verification 40us 26 of 32 bit words per block 1 5us word e Set Vae lt min V to flip all bits to 1 Glitching V o at the time when the word value is latched into internal register and adjusting the timing in 25ns steps searching for single
5. 0 bit then two 0 and so on until passed Data extraction time 20 minutes per block 30 days chip 2 attempts per word 26 words per block 10ms per cycle Simpler and faster than semi invasive optical bumping no need for expensive hardware maximum attack complexity is for power analysis twice as fast 55 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Countermeasures Encryption and redundancy check make analysis harder but not impossible Asynchronous circuits could make the attack more problematic as bumping requires predictable timing Dummy cycles will pose certain challenges to the attacker To develop adequate protection you must know how your device was attacked and compromised Never use your factory secret master key for authentication Never use the same master key in all of your products Use strong enough keys as passwords be creative some devices have HEXspeak as a part of the key password DEADBEEF BABE BAD 999 BEEF A11 e Understanding the core of a problem is vital key handling 56 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Defence technologies tamper protection Old devices security fuse is placed separately from the memory array easy to locate and defeat security fuse is embedded into the program memory hard to locate a
6. chips with smaller technology voc AaB AaB B B AaB Confocal microscopes represent the different Chip layers in different colors In the right image the metal interconnects have been removed with hydrotiuoric acid Both images together can be read almost as easily as a circuit diagram 13 Picture courtesy of Dr Markus Kuhn Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks microprobing Microprobing with fine electrodes eavesdropping on signals inside a chip injection of test signals and observing the reaction can be used for extraction of secret keys and memory contents limited use for 0 35um and smaller chips 14 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks microprobing Laser cutting systems removing polymer layer from a chip surface local removing of a passivation layer for microprobing attacks cutting metal wires inside a chip maximum can access the second metal layer taser ks stabllzes contact Picture courtesy of Dr Markus Kuhn aoN Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks chip modification Today Focused lon Beam workstation chip level surgery with 10nm precision create probing points insi
7. Albena Bulgaria 29 May 3 June 2011 Experimental setup Sample preparation for modern chips lt 0 5um and gt 2M only backside approach is effective itis very simple and inexpensive no chemicals are required Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks imaging Backside infrared imaging microscopes with IR optics give better quality of image IR enhanced CCD cameras or special cameras must be used resolution is limited to 0 6um by the wavelength of used light view is not obstructed by multiple metal layers Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks imaging Backside infrared imaging Mask ROM extraction without chemical etching Today the main option for 0 35um and smaller chips multiple metal wires do not block the optical path Texas Instruments MSP430F112 microcontroler 035pm Motorola MCOBHCTOSPA microcontroller 124m 21 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks laser imaging OBIC imaging techniques active photon probing photons ionize IC s regions which results in a photocurrent flow used for localisation of active areas LIVA imaging active photon probing on powered up chi
8. Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Fault attacks on secure chips from glitch to flash Dr Sergei Skorobogatov http www cl cam ac uk sps32 email sps32 cam ac uk EH UNIVERSITY OF LP CAMBRIDGE Computer Laboratory Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Introduction Attack scenarios on secure systems theft of service attacks on service providers satellite TV electronic meters access cards software protection dongles access to information information recovery and extraction gaining trade secrets IP piracy ID theft cloning and overbuilding copying for making profit without investment in development low cost mass production by subcontractors denial of service dishonest competition electronic warfare Attack technologies are being constantly improved There is growing demand for secure chips Who needs secure chips car industry service providers manufacturers of various devices banking industry and military applications 2 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Attack categories Side channel attacks techniques that allow the attacker to monitor the analog characteristics of power supply and interface connections and any electromagnetic radiation
9. Non invasive attacks fault injection e Glitch attacks clock glitches power supply glitches corrupting data Security fuse verification in the Mask ROM bootloader of the Motorola MC68HCO5B6 microcontroller double frequency clock glitch causes incorrect instruction fetch low voltage power glitch results in corrupted EEPROM data read LDA 01h AND 0100 ithe contents of the EEPROM byte is checked loop BEQ loop endless loop if bit 0 is zero BRCLR 4 0003 cont itest mode of operation JMP 0000 direct jump to the preset address cont Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Response from chip manufacturers Additional tamper protections voltage frequency and temperature sensors memory access protection crypto coprocessors asynchronous logic design symmetric design dual rail logic internal clock sources clock conditioning and PLL circuits internal charge pumps and voltage regulators software countermeasures Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks e Penetrative attacks leave tamper evidence of the attack or even destroy the device Tools IC soldering desoldering station simple chemical lab high resolution optical microscope wire bonding machine laser cutting system microprobing st
10. Software attacks use the normal communication interface and exploit security vulnerabilities found in the protocols cryptographic algorithms or their implementation Fault generation use abnormal environmental conditions to generate malfunctions in the system that provide additional access Microprobing can be used to access the chip surface directly so we can observe manipulate and interfere with the device Reverse engineering used to understand the inner structure of the device and learn or emulate its functionality requires the use of the same technology available to semiconductor manufacturers and gives similar capabilities to the attacker 3 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Attack methods Non invasive attacks low cost observe or manipulate the device without physical harm to it require only moderately sophisticated equipment and knowledge to implement Invasive attacks expensive almost unlimited capabilities to extract information from chips and understand their functionality normally require expensive equipment knowledgeable attackers and time Semi invasive attacks affordable semiconductor chip is depackaged but the internal structure of it remains intact fill the gap between non invasive and invasive types being both inexpensive and easily repeatable 4 Design and Security of C
11. asive attacks toward using non invasive attacks like in the example with AES key extraction from the secure microcontroller easier to setup for deep submicron chips faster to get the result pose larger threat to the hardware security One approach is to use data remanence effect to help with bumping through threshold voltage adjustment S Skorobogatov Data Remanence in Flash Memory Devices CHES 2005 LNCS 3659 pp 339 353 In Actel ProASIC3 FPGAs V core supply voltage does not have enough influence on V_ of the Flash cells hence need to somehow influence the read sense amplifiers 43 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 New challenge e Non invasive attack on Actel ProASIC3 Flash FPGA unique in being reprogrammable and highly resistant to both invasive and noninvasive attacks on board security mechanisms prevent access to the programming information from noninvasive attacks special security keys are hidden throughout the fabric of the device preventing internal probing and overwriting They are located such that they cannot be accessed or bypassed without destroying the rest of the device making both invasive and more subtle noninvasive attacks ineffective other security measures voltage monitors internal charge pumps asynchronous internal clock and lack of information about JTAG Miss
12. ation oscilloscope and logic analyser signal generator scanning electron microscope focused ion beam workstation 10 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks sample preparation Decapsulation manual with fuming nitric acid HNO and acetone at 60 C automatic using mixture of HNO and H SO full or partial from front side and from rear side Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks imaging Optical imaging resolution is limited by optics and wavelength of a light R 0 61 A NA 0 61 A nsin y best is 0 18um technology reduce wavelength of the light using UV sources increasing the angular aperture e g dry objectives have NA 0 95 increase refraction index of the media using immersion oil n 1 5 Today optical imaging is replaced by electron microscopy E L R U os eS BauschSLomb MicroZoom 502x NA 0 45 Letz Ergolux AMC 100 NA 0 9 12 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Invasive attacks reverse engineering Reverse engineering understanding the structure of a semiconductor device and its functions optical using a confocal microscope for gt 0 5um chips deprocessing is necessary for
13. bena Bulgaria 29 May 3 June 2011 Experimental setup Actel ProASIC3 Flash based A3P250 FPGA limited information is available but designs are loaded via JTAG memory access via JTAG for Erase Program and Verify operations there is NO readback mechanism on PA3 devices soon after introduction of optical fault attacks warned Actel about possible outcomes for Flash technology but they showed no interest Backside optical fault injection attack setup chip on a test board under microscope with 20x and 1065nm laser Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results Locating Flash and active areas is easy via laser scanning JTAG interface was used for communication in Verify mode Sensitive locations were found with exhaustive search 20um grid black data corrupted white matching all 1 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results for bumping e Using SPA for timing analysis cannot detect data timing Verification result is available after each block of 832 bits 2300 blocks per array 26 of 32 bit words per block Data extraction time 18 years per block 40000 years chip 25 attempts per word 26 words per block 10ms per cycle 40 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria
14. ching time was adjusted in 25ns steps bumping 2 5 attempts per 16 bit word 100ms cycle 8 hours for AES key selective bumping 2 attempts per 16 bit word 2 minutes for AES key Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Attack time on 128 bit block e Without any improvements brute force search requires on average 217 attempts Bumping down to bus width 8 bit bus 27 x 16 2 attempts 16 bit bus 2 5 x 8 2 8 attempts 32 bit bus 2 x 4 2 attempts Selective bumping down to single bit in limited steps 8 bit bus 1 8 7 6 5 4 3 2 1 x 2x16 2 attempts 16 bit bus 1 16 15 2 1 x2x8 2 attempts 32 bit bus 1 32 31 2 1 x x4 2 attempts In areal attack the complexity could be higher due to the granularity of the delay time and timing jitter 32 bit bus 1 32 31 2 1 xx4x8x4 2 5 attempts Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 New challenge Embedded memory bus width really matters CPU from 8 bit to 32 bit FPGA from 32 bit to 2048 bit and more Actele ProASIC3 0 13um 7 metal layers Flash FPGA live at power up low power highly secure impossible to copy offer one of the highest levels of design security in the industry unique in b
15. croelectronics ST16 smartcard Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Defence technologies what goes wrong Security advertising without proof no means of comparing security lack of independent analysis no guarantee and no responsibility from chip manufacturers wide use of magic words protection encryption authentication unique highly secure strong defence unbreakable impossible cannot be attacked uncompromising buried under metal layers Constant economics pressure on cost reduction less investment hence cheaper solutions and outsourcing security via obscurity approach Quicker turnaround less testing hence more bugs What about back doors access to the on chip data for factory testing purposes how reliably was the factory testing feature disabled how difficult is to attack the access port 60 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Defence technologies how it fails Microchip PIC microcontrollers security fuse bug command security fuse can be reset without erasing the code data memory Atmel AVR microcontrollers security fuse bug glitch attack security fuse can be reset without erasing the code data memory Hitachi smartcard information leakage on a products CD full datasheet on a smartcard was placed by mista
16. de smartcard chips read the memory modern FIBs allow backside access but require special chip preparation techniques to reduce the thickness of silicon Picture Olver K mmerling sog B EEPROM 16 2X old comaston oponas winissar amer lt pow oonneaion astebtanag wm Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks Filling the gap between non invasive and invasive attacks less damaging to target device decapsulation without penetration less expensive and easier to setup and repeat than invasive attacks Tools IC soldering desoldering station simple chemical lab high resolution optical microscope UV light sources lasers oscilloscope and logic analyser signal generator PC with data acquisition board FPGA board prototyping boards special microscopes laser scanning infrared etc 17 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks sample preparation Decapsulation manual with fuming nitric acid HNO and acetone at 60 C automatic using mixture of HNO and H SO full or partial from front side and from rear side Design and Security of Cryptographic Algorithms and Devices ECRYPT Il
17. e 72 devenan 00 00 eer LGU ERATE EN OOTO NCAPOOE anasan THEW GOTO RESO alt Eagentheieneaivet Authentication passed for core enabled device bagel hesa gt normal device has K 2 PEt gs fete zp HEN BOTO Lab AES key extraction sc ET yg ESSE 77 Se ec cg aS EN EEA 51 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Results What can be done if the factory secret master key is known turn some ROM areas into reprogrammable Flash areas reprogram low level features access shadow areas access hidden JTAG registers find the JTAG registers responsible for controlling read sense amplifiers such that V can be adjusted Actel s big security mistake all Actel 3 generation Flash FPGA devices ProASIC3 ProASIC3L ProASIC3 nano Igloo Igloo plus Igloo nano Fusion SmartFusion share the same factory secret master key thanks to irresponsible corporate security strategy many Flash FPGA devices can now be manipulated Do we really have to go that long way to find the factory key YES because it is somewhat million times harder to break the factory key than the AES key thanks to side channel leakages 52 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Experimental setup Non invasive bumping attack on Actel ProASIC3 Flash based A3P250 FPGA
18. eing reprogrammable and highly resistant to both invasive and noninvasive attacks even without any security measures such as FlashLock with AES it is not possible to read back the programming data from a programmed device Upon programming completion the programming algorithm will reload the programming data into the device The device will then use built in circuitry to determine if it was programmed correctly other security measures voltage monitors internal charge pumps asynchronous internal clock lack of information about JTAG etc 35 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Experimental setup Sample preparation of ProASIC3 FPGA front and rear the surface is covered with sticky polymer which needs to be removed for physical access to the surface gt 99 of the surface is covered with supply grid or dummy fillers backside low cost approach used without any special treatment Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Experimental setup Sample preparation front only three top metal layers are visible at a most full imaging will require de layering and scanning electron microscopy any invasive attacks will require sophisticated and expensive equipment Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Al
19. el language is used which is self explanatory Company website and distributors for clues on the security release notes and product descriptions mention dual key security board with a dual key M1AFS600 device Why is the dual key security is not mentioned in any Actel datasheets press releases and white papers 46 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Secure AES 128 update in Actel FPGA Designed to prevent IP theft cloning and overbuilding A3P600 vs M1A3P600 ProASIC3 FPGA family if certain vendor IP cores are used Cortex M1 no user protection user AES DMK is used for Actel IP core protection DMK M1 key User Design tool i ae i FPGA verilog b eer project data IP cores waveform AES key security encrypted settings bitstream file file blank chips security settings secure in house programming encrypted bitstream untrusted factory 4 chips device 47 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Dual key security in Actel FPGA What problem does the dual key security solve IP cores loyalty control without compromising user security The system enables application development with the ARM Cortex M1 and or with your own optional AES key owing to dual key feature in mixed signal M1 enabled Fusion devic
20. es AFS600 vs M1AFS600 Fusion mixed signal FPGA family user AES DMK protects user s IP and 2 key is for the vendor IP when protection for both user IP and vendor IP are required then AES Key H user key vendor key H secure hash function in M1AFS600 the 2 key M1 key what is the 2 key in AFS600 48 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 How the AES key can be attacked Invasive attacks expensive partial reverse engineering followed by microprobing Semi invasive attacks affordable optical fault injection attack Skorobogatov Anderson CHES2002 optical emission analysis Skorobogatov FDTC2009 e Non invasive attacks simple side channel attacks such as SPA DPA CPA EMA DEMA poor signal to noise ratio of about 15dB due to low power operation and multiple sources of noise clocks pumps acquisition What can be done if AES key is known decrypt bitstream configuration and clone the design decrypt internal Flash ROM configuration authenticate the device and gain access to reconfiguration features 49 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 How long does it take to get the AES key Initial evaluation time for all attacks from 1 week 1 month Invasive attacks microprobing 1 day with FIB and probing s
21. extraction Readback access controlled by security fuse AES key cheat stag AES koy Cheat eal a L f ICSP ro Ii ec L r No Readback access only secure verification 27 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Where is the key Flash memory prevails usually stores IP sensitive data passwords and encryption keys widely used in microcontrollers smartcards and some FPGAs non volatile live at power up and reprogrammable it can be OTP low power longer battery life How secure is Flash memory storage used in smartcards and secure memory chips so it has to be secure used in secure FPGAs by Actel marketed as virtually unbreakable Vulnerabilities of Flash memory found during my research power glitching influence on data read from memory Web2000 optical fault injection changes data values CHES2002 laser scanning techniques reveal memory contents PhD2004 data remanence allows recovery of erased data CHES2005 optical emission analysis allows direct data recovery FDTC2009 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Attacking Flash memory Flash memory structure high voltages required for operation PAPE
22. ion Impossible 1 bypass multiple security protection gain low level control over the internal Flash hardware control logic and interfere with read sense amplifiers to influence V Vpe 44 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Ways to approach Ask Actel if the chip has any backdoors or special features even under the most strict NDA Actel would not admit the device has any backdoor access even if there were such Straightforward invasive reverse engineering 40k gates open up the chip and remove layer by layer using deprocessing technique take high resolution digital photos and combine them into the layout map create transistor level netlist of the device and convert it into gates level organise gates into functional units and groups simulate the whole system and find hidden functions and bugs 6 to 12 months to extract the design with 300k to 2M EUR cost 3 to 12 months to analyse the data Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Ways to approach Do a bit of research Google it for code examples disclosed information patents programming files with security settings hint on V compensation for RT devices Use development tools to generate programming files use them and eavesdrop on JTAG communication it is simpler STAPL high lev
23. ke on the CD Actel secure FPGA programming software bug devices were always programmed with a 00 00 passkey Xilinx secure CPLD programming software bug security fuse incorrectly programmed resulting in no protection Maxim Dallas SHA 1 secure memory factory setting bug some security features were not activated resulting in no protection Other examples insiders datasheets of similar products development tools solution test real devices and control the output 61 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Future work Data remanence analysis of embedded Flash in chips Testing other chips for strength against firmware and secret key extraction beyond 90nm technology Improving fault attacks with new techniques e Mission Impossible 2 recover the erased data according to Actel it is virtually impossible to extract the information from Actel ProASIC3 Flash based FPGA how about recovering the information after it has been erased quite common situation if you have overproduction of your highly secure designs and then decide to switch to another product if you have pre programmed secure chips left you might erase them into the initial state and sell on the market that means those chips will no longer have any security fuses activated but just No readback feature and data remanence within the Flash memory 62 De
24. nd defeat similar approach is used in many smartcards in the form of password protection and encryption keys moving away from building blocks which are easily identifiable and have easily traceable data paths YSN Mtg tina pea HOPAN Motorola MCSSHCA0BAZ60A microcontroler Scenix SX28 microcontroller 57 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Defence technologies tamper protection Help came from chip fabrication technology planarisation as a part of modern chip fabrication process 0 5 um or smaller feature size glue logic design makes reverse engineering much harder multiple metal layers block any direct access small size of transistors makes attacks less feasible chips operate at higher frequency and consume less power smaller and BGA packages scare off many attackers 0 9m microcontroller 0 5 microcontroler 0 13pm FPGA Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Defence technologies tamper protection Additional protections top metal layers with sensors voltage frequency and temperature sensors memory access protection crypto coprocessors internal clocks power supply pumps asynchronous logic design symmetric design dual rail logic ASICs secure FPGAs and custom designed ICs software countermeasures 59 STMi
25. p photon induced photocurrent is dependable on the transistor state reading logic state of CMOS transistors inside a powered up chip Requires backside approach for 0 35um and smaller chips multiple metal wires do not block the optical path OBIC laser image of fuse LIVA laser image of SRAM Microchip PIC16FB4A microcontroler Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks fault injection Optical fault injection attacks optical fault injection was observed in my experiments with microprobing attacks in early 2001 introduced as a new method in 2002 lead to new powerful attack techniques and forced chip manufacturers to rethink their design and bring better protection original setup involved optical microscope with a photoflash and Microchip PIC16F84 microcontroller programmed to monitor its SRAM 23 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks fault injection Optical fault injection attacks the chip was decapsulated and placed under a microscope light from the photoflash was shaped with aluminium foil aperture physical location of each memory address by modifying memory contents the setup was later improved with various lasers and a better microscope Today backside approach for 0 35um and smaller chips s
26. ryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Targets of fault attacks Common components CPU Memory V0 AID and D A Embedded memory SRAM EEPROM Flash ROM CPU instructions data result jumps Security I reset fuse force debug access Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Embedded memory EEPROM and Flash access one row ata time read sense amplifiers bottleneck 4 high voltage operation SRAM access with data bus width oe read sense amplifiers bottleneck suo d of A J BENNEN mi pim sell d afl o i ve sae oll pe Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Non invasive attacks Non penetrative to the attacked device normally do not leave tamper evidence of the attack Tools digital multimeter IC soldering desoldering station universal programmer and IC tester oscilloscope and logic analyser signal generator programmable power supplies PC with data acquisition board FPGA board prototyping boards Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011
27. sign and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Conclusions Fault injection attacks are dangerous and can compromise the security in chips evaluation and protection is necessary Backside approach helps in modern chips it is simple to do and does not require expensive optics and precise positioning Embedded memory is more secure than encrypted external memory storage and encrypted bitstream is even less secure Attack technologies are constantly improving so should the defence technologies There is no such a thing as absolute protection given enough time and resources any protection can be broken Defence should be adequate to anticipated attacks security hardware engineers must be familiar with attack technologies to develop adequate protection many vulnerabilities were found in secure chips and more are to be found posing challenges to hardware security engineers 63 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 References Slides http www cl cam ac uk sps32 ECRYPT2011_1 pdf Literature http www cl cam ac uk sps32 http www cl cam ac uk sps32 Publications
28. tation Semi invasive attacks side channel and fault attacks 1 week 1 hour with optical emission analysis FDTC2009 1 hour with optical fault injection attack CHES2002 Non invasive attacks side channel attacks 1 day with low cost DPA setup resistor in V core supply line oscilloscope with active probe and PC with MatLab software 1 hour 10 minutes with commercial DPA tools DPA Workstation from Cryptography Research Inc or Inspector SCA from Riscure 1 second with QVL E board using special SCA sensor from QVL 0 01 second with QVL Espial tester using breakthrough approach to power analysis technique from QVL a Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Quest for the factory secret master key Reverse engineering of the STAPL file for M1AFS600 source Google search that revealed Cortex M1 Fusion Kit soft CD gam aa teva a ee Select AES mode 0 user key 1 IP core key 2 dual key EEA coco naion ee T psemrmrrons Authenticate M7 device as 00 00 uy E EU EAA EN ENAERE woeace Tuen ROTO MADDR SOME I Hau etern treo a Authenticate M1 device as 00 00 1 YAT Bie sr usee pels Her rete cere suroan cenne cere TM go VEREONE ct one enesurra ig euman 1 terrae Eon eM BOO econ Felt MlEeicaoesee Authentication passed for Mt device DOLA Le hres rencot FEB nernurnersesmas utentet
29. uccessfully tested on chips down to 90nm Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 Semi invasive attacks fault injection Localised heating using cw lasers test board with PIC16F628 and PC software for analysis permanent change of a single memory cell on a 0 9um chip Today influence is limited for modern chips lt 0 5um adjacent cells are affected as well 25 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 New fault injection attacks Data protection with integrity check verify memory integrity without compromising confidentiality How secure is the No Readback solution Readback access controlled by security fuse ESF Security UART Security Status Memory gt circuit STAG Memory Circuit Register 7 F TEST t Tes Security UART ory Fuse zru JTAG TEST No Readback access only secure verification 26 Design and Security of Cryptographic Algorithms and Devices ECRYPT Il Albena Bulgaria 29 May 3 June 2011 New fault injection attacks e Authentication using encryption verify if a user knows the secret key by asking him to encrypt a message with his key How secure is the No Readback scheme against key
Download Pdf Manuals
Related Search
Related Contents
DHC-IM2 2007.03A Genesis Parent Access Manual Manuel - Amazon Web Services Husqvarna CR 2002 Motorcycle User Manual Analog Devices QFX402 User's Manual Renesas Debugger HMon User`s Manual Unidad de grabación de disco duro - Sonypro Dialplate Receptionist Console Naza for Multi-Rotor User Manual VET 10 PLUS VET 10 PLUS Copyright © All rights reserved.
Failed to retrieve file