toward threat estimation of system memory hardware trojans
play

Toward threat estimation of system memory Hardware Trojans John - PowerPoint PPT Presentation

UNCLASSIFIED Toward threat estimation of system memory Hardware Trojans John Shield, Brad Hopkins, Chris North Redefining R&D Needs for Australian Cyber Security UNSW ACCS at ADFA, November 16 th 2015 1 UNCLASSIFIED The Australian


  1. UNCLASSIFIED Toward threat estimation of system memory Hardware Trojans John Shield, Brad Hopkins, Chris North Redefining R&D Needs for Australian Cyber Security UNSW ACCS at ADFA, November 16 th 2015 1

  2. UNCLASSIFIED The Australian Perspective  Australia sources all integrated circuits from overseas  Lack of resources for: – designing – fabricating – testing chips  Majority of supply is from non-allied nations Gartner report "Market Share: Semiconductor Foundry, Worldwide, 2014." Vendor Foundry Location 2014 2014 Market Revenue Share (%) TSMC Taiwan 25,175 53.7 UMC Taiwan 4,621 9.9 Globalfoundries U.S. 4,400 9.4 Samsung 1 South Korea 2,412 5.1 SMIC China 1,970 4.2 2

  3. Hardware Trojans  Modifications to Circuit Boards or Integrated Circuits  We Focus on Integrated Circuits – Harder to verify post-production  Modifications Possible – Functional – Parametric  Outcomes – Leak or Modify Information – Reduce Effectiveness • Denial of service, degradation of service, integrity attacks, etc. 3

  4. Memory Protection  Memory Protection is Key to Software Security – Privilege Levels and Data Isolation DRAM MEMORY CPU HARDWARE Redirected Blocked Memory Hardware Trojan access to Access blocked region Software MMU Valid Memory Access Normal Access Memory DRAM Mapping Mapping 4

  5. Memory Trojan – Exemplar Hardware  Interposer Card  Redirects memory accesses 5

  6. Case Study: Cloud Computing  Breaking: Memory Isolation between Virtual Machines  Description: Data modification of corporate email in a corporate VM using an public VM 6

  7. Case Study: Guest Accounts  Breaking: Privileged (kernel) Mode and User Mode  Description: Overwriting a root executable by a guest user to gain root access 7

  8. System Memory Trojan Threat  Threat Level – High Threat: Software security hinges on memory protection  Securing Procurement – Not viable  Defence Mechanisms – None Commercially Available 8

  9. Threat Mitigation Strategy  DST Group – Trustworthy Systems Research – Research: Trustworthy circuit design using untrusted components – Provides Australian defence context and applications – Collaboration: Integrate external S&T and Industry  Academia – Research: Trustworthy software (eg seL4) – Research: Security primitives for hardware & processors  Industry - Partner early for – Technology insertion – Transition into capability 9

Recommend


More recommend