physical security attacks and defenses for computing
play

Physical Security Attacks and Defenses for Computing Systems - PDF document

Physical Security Attacks and Defenses for Computing Systems Steve Weingart Senior Engineer c1shw@us.ibm.com (561) 392 6100 Secure Systems and Smart Cards IBM T.J. Watson Research Center Hawthorne, NY Physical Security Attacks &


  1. Physical Security Attacks and Defenses for Computing Systems Steve Weingart Senior Engineer c1shw@us.ibm.com (561) 392 6100 Secure Systems and Smart Cards IBM T.J. Watson Research Center Hawthorne, NY

  2. Physical Security Attacks & Defenses Outline • Definition • Attacks • Defenses • Standards Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 2 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  3. Physical Security Attacks & Defenses Definition: Physical Security, A barrier placed around a computing system to deter unauthorized physical access to that computing system. In the event of an attack, there should be a low probability of success; and a high probability of the attack being detected either during the attack, or subsequent to penetration. Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 3 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  4. Physical Security Attacks & Defenses Attacks • Low Tech • Theft • Mis-use • High Tech • Machining • Mechanical • Water • Laser • Chemical • Shaped Charge • Probes • Passive/Active • Mechanical • Energy • E-beam/Ion Beam • X-Ray • IR Laser • Energy • Imprinting • Temperature • Voltage • Radiation • Disruption • Tempest • EM Emanations • Power/Current Profile Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 4 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  5. Physical Security Attacks & Defenses Defenses (High & Low Tech) • Tamper Resistance • Guards • Weight, Size, Material • Complexity • Inaccessibility • Chip Coatings • Substrates • Tamper Evidence • Holographic Seals • ‘Bleeding’ Paint • Crazed Materials • Tamper Detection • Membranes • Metallic • Organic • Other • Sensors • Temperature • Radiation • Voltage • Tamper Response • Zeroization Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 5 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  6. Physical Security Attacks & Defenses The Operating Envelope The range of all conditions that are required for correct operation of all components. Note: For Tamper Responding systems that use erasure as a means of protecting secret data, correct operation includes the ability to guarantee the removal of memory contents when desired. • Voltage • Temperature • Radiation Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 6 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  7. Physical Security Attacks & Defenses Standards • Not Many! • In commercial sector • FIPS 140-1 • Seems to be the emerging commercial standard • Reasonable, but needs updating now • ANSI 9.66 • Had been different than FIPS 140-1 • Probably will not be in the future • TNO (Delft Holland) • Not really a standard, an Authority • ITSEC • Not Really Focused on Hardware • Common Criteria • Not Really Focused on Hardware Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 7 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  8. Physical Security Attacks & Defenses An Example of a Physically Secure Coprocessor Metal Shield Tamper Detecting Membrane Crypto Card Inner Cover Potting Shielded Base Card Flexible Data/Power Cable Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 8 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

Recommend


More recommend