embedded security october 2015
play

embedded security October 2015 The Old Model (simplified view) - PDF document

embedded security October 2015 The Old Model (simplified view) Embedded Security Benedikt Gierlichs KU Leuven, COSIC IACR Summer school 2015 Chia Laguna, Italy Attack on channel between communicating parties Encryption and


  1. embedded security October 2015 The Old Model (simplified view) Embedded Security Benedikt Gierlichs KU Leuven, COSIC IACR Summer school 2015 Chia Laguna, Italy – Attack on channel between communicating parties – Encryption and cryptographic operations in black boxes – Protection by strong mathematic algorithms and protocols Acknowledgements: – Computationally secure Ingrid Verbauwhede, Patrick Schaumont, Kris Tiri, Bart Preneel, Helena Handschuh October 2015 Summer school @ Sardinia 2 Or so you think... Screen reading from distance • Tempest: refers to investigations and studies of compromising emanations – Primarily: Electromagnetic radiation – Exploitation of signals and prevention – Term coined in the late 1960s (NSA) 25 meter – Documents remain secret until today – Basic and redacted versions publicly available in the late 1990s • Public research: – Van Eck phreaking (1985): reading computer screens from a "large" distance (also electronic voting machines) – Vuagnoux, Pasini (2009): keystroke logging from a distance (up to 20 meters), works on wireless and wired keyboards http://www.lightbluetouchpaper.org/2006/03/09/v ideo-eavesdropping-demo-at-cebit-2006/ October 2015 Summer school @ Sardinia 3 October 2015 Summer school @ Sardinia 4 Portable setup for EM display stealing Tablet keystroke detection Hayashi et al. ACM CCS 2014 Hayashi et al. ACM CCS 2014 October 2015 Summer school @ Sardinia 5 October 2015 Summer school @ Sardinia 6 Benedikt Gierlichs, KU Leuven COSIC 1

  2. embedded security October 2015 Embedded Cryptographic Devices How is Embedded Security affected? Firewall • • A cryptographic device is an electronic device that New Model (also simplified view): implements a cryptographic algorithm and stores a – Attack on channel and endpoints cryptographic key. It is capable of performing cryptographic – Encryption and cryptographic operations in gray boxes – Protection by strong mathematic algorithms and protocols operations using that key. – Protection by secure implementation • Embedded: it is exposed to adversaries in a hostile • Need secure implementations not only algorithms environment; full physical access, no time constraints – Note: the adversary might be a legitimate user! October 2015 Summer school @ Sardinia 7 October 2015 Summer school @ Sardinia 8 Internet of Things Cyber physical systems “A system of collaborating computational elements controlling physical entities” [1] “Networked embedded systems interacting with the environment” [2] [1] wikipedia [2] Ed Lee, after H. Gill NSF Network: controller area network (CAN) [Source photograph: J. Rabaey: A Brand New Wireless Day] October 2015 Summer school @ Sardinia 9 October 2015 Summer school @ Sardinia 10 Medical devices, typical scenario Interacting with the environment • Small embedded devices communicate over wireless Embedded cryptography? link for sensing and actuation • Goal: low energy (battery powered, temperature) • Security goal: attack resistant IMEC: NERF - brain stimulant Deep Brain stimulation [Sources: J. Rabaey, National Institutes of Health, Neurology journal] IMEC: Human++ project October 2015 Summer school @ Sardinia 11 October 2015 Summer school @ Sardinia 12 Benedikt Gierlichs, KU Leuven COSIC 2

  3. embedded security October 2015 Always keep in mind Your system is as secure as its weakest link Your system is as secure as its weakest link Unknown source: seen on schneier.com October 2015 Summer school @ Sardinia 13 October 2015 Summer school @ Sardinia 14 Your system is as secure as its weakest link Your system is as secure as its weakest link • The adversary will go for the weakest entry point – Disable or go around security mechanisms – Guess / spy on passwords – Bribe the security guard • If you use good crypto, he will try to go around it – System designer: thinks of the "right" way to use the system – Adversary: does not play by the rules – Designer has to think like the adversary, anticipate attacks, protect against them – There is no way to protect against all attacks • Do you know all attacks? Source: P. Kocher October 2015 Summer school @ Sardinia 15 October 2015 Summer school @ Sardinia 16 Security for Embedded Systems Security for Embedded Systems “Researcher has a new attack for embedded devices • SecuStick: Vulnerability lies in ARM and XScale microprocessors” Computerworld – security – On plug-in: Windows program pops up and asks for password April 4, 2007 – Self-destructs if wrong password entered n-many times How: Use JTAG interface “Secustick gives false sense of security” April 12, 2007 http://tweakers.net/reviews/683 – Attempt counter stored in flash memory chip Security completely broken – Write-enable pin connected to GND: infinite number of attempts to guess the password  – Password is checked in software routine on PC: changing return value from "0" to "1" gives full access  April 12, 2007: http://tweakers.net/reviews/683 October 2015 Summer school @ Sardinia 17 October 2015 Summer school @ Sardinia 18 Benedikt Gierlichs, KU Leuven COSIC 3

  4. embedded security October 2015 Physical security of Classification of Physical Attacks embedded cryptographic devices • Non-Invasive Active versus passive • Let us assume that the system is well designed – Active: Perturbate and conclude – Adversary cannot go around / disable security features – Passive: Observe and infer – Good cryptography is used • Invasive versus non-invasive active passive – Invasive: open package and contact chip • Embedded context, physical access – Semi-invasive: open package, no contact – Non-invasive: no modification • Invasive Side channel: passive and non-invasive – Adversary can "look" at the device under attack – • Measure physical quantities Very difficult to detect – Often cheap to set-up – Often: need lots of measurements  automating – Adversary can manipulate the device under attack • • Expose it to physical stress and "see" how it behaves Circuit modification: active and invasive – Expensive to detect invasion (chip might be without power) – Very expensive equipment and expertise required October 2015 Summer school @ Sardinia 19 October 2015 Summer school @ Sardinia 20 Side-Channel Leakage Some Side-Channels (not exhaustive) • Physical attacks ≠ Cryptanalysis • Timing execution time – Overall or "local" execution time (gray box, physics) (black box, maths) time • Does not tackle the algorithm's math. security • Power, Electromagnetic radiation – Predominant: CMOS technology Input Output – Consumes power when it does something, transistors switch – Electric current induces and EM field Leakage • More exotic but shown to be practical – Light, Sound, Temperature • Observe physical quantities in the device's vincinity and use additional information during cryptanalysis October 2015 Summer school @ Sardinia 21 October 2015 Summer school @ Sardinia 22 Examples: measurement setups Side-Channel leakage • • Smart cards Side-channel leakage – Is not intended • FPGA, ASIC – Information leakage was not considered at design time • Phone, tablet – Leaked information is not supposed to be known • Set-top boxes – Can enable new kind of attack • Etc. • Often, optimizations enable leakage • source: langer-emv.de Device under attack is operated in normal conditions – Adversary is passive an solely observes October 2015 Summer school @ Sardinia 23 October 2015 Summer school @ Sardinia 24 Benedikt Gierlichs, KU Leuven COSIC 4

Recommend


More recommend