hardware security - indian institute of technology madraschester/courses/17o_sse/slides/7... ·...

71
Hardware Security 1 Chester Rebeiro IIT Madras

Upload: others

Post on 25-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareSecurity

1

ChesterRebeiroIITMadras

Page 2: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Physically Unclonable Functions

PhysicalUnclonableFunc1onsandApplica1ons:ATutorialh8p://ieeexplore.ieee.org/document/6823677/

Page 3: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

EdgeDevices

3

1000softhemexpectedtobedeployedLowpower(solarorba8erypowered)SmallfootprintConnectedtosensorsandactuatorsExpectedtooperate24x7almostunmanned24x7thesedeviceswillbecon1nuouslypumpingdataintothesystem,whichmayinfluencethewayci1esoperateWillaffectusinmulRpleways,andwemaynotevenknowthattheyexist.

Page 4: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

AuthenRcaRngEdgeDevices•  Storedkeys

–  EEPROMmanufactureisanoverhead–  Publickeycryptographyisheavy–  Canbeeasilycopied/cloned

4

EncrypRondoneinedgedevicePublickeysstoredinserver

Privatekeys

Page 5: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PhysicallyUnclonableFuncRons•  Nostoredkeys•  Nopublickeycryptography•  Cannotbecloned/copied•  Usesnano-scalevariaRonsinmanufacture.NotwodevicesareexactlyidenRcal

5

EncrypRondoneinedgedevicePublickeysstoredinserver

challenge/response

DigitalFingerprints

Page 6: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFs

6

AfuncRonwhoseoutputdependsontheinputaswellasthedeviceexecuRngit.

Page 7: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

WhatisExpectedofaPUF?(InterandIntraDifferences)

7

challenge

response

response

challenge

Response

Response

(Reliable)SameChallengetoSamePUFDifferencebetweenresponsesmustbesmallonexpectaRonIrrespecRveoftemperature,noise,aging,etc.

(Unique)SameChallengetodifferentPUFDifferencebetweenresponsesmustbelargeonexpectaRonSignificantvariaRonduetomanufacture

Page 8: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

WhatisExpectedofaPUF?(Unpredictability)

8

challenge

response

response

DifficulttopredicttheoutputofaPUFtoarandomlychosenchallengewhenonedoesnothaveaccesstothedevice

Page 9: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

IntrinsicPUFs•  Completelywithinthechip

–  PUF–  Measurementcircuit–  Post-processing

•  Nofancyprocessingsteps!–  eg.MostSiliconbasedPUFs

9

Page 10: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SiliconPUFseg.RingOscillatorPUF

10

f = 12nt

FrequencyofringoscillatorNumberofstagesDelayofeachstage

fnt

RingOscillatorwithoddnumberofgates

FrequencyaffectedbyprocessvariaRon.

Page 11: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

WhyvariaRonoccurs?

11

Whengate voltage is less than threshold no current flows When gate voltate is greater than threshold current flows from source to drain Threshold voltage is a function of doping concentration, oxide thickness

Delaydependsoncapacitance

ProcessVaria1ons•  Oxidethickness•  DopingconcentraRon•  Capacitance

MOSTransistor CMOSInverter

Page 12: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SiliconPUFseg.RingOscillatorPUF

12

>enable

counter

counter

Nbitchallenge

1

2

3

N

N-1

N-2

1bitresponse

RA

RB

response = 10

fA > fBfA ≤ fB

⎧⎨⎪

⎩⎪

Page 13: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ResultsofaROPUF15Xilinx,Virtex4FPGAs;1024ROsineachFPGA;EachROhad5inverterstagesand1ANDgate

13

Physical Unclonable Functions for Device Authentication and Secret Key Generation https://people.csail.mit.edu/devadas/pubs/puf-dac07.pdf

InterChipVaria1ons(Uniquenessmeasurement)

challenge

response

responseWhen128bitsareproduced,

Avg59.1bitsoutof128bitsdifferent

Page 14: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ResultsofaROPUF15Xilinx,Virtex4FPGAs;1024ROsineachFPGA;EachROhad5inverterstagesand1ANDgate

14

Physical Unclonable Functions for Device Authentication and Secret Key Generation https://people.csail.mit.edu/devadas/pubs/puf-dac07.pdf

IntraChipVaria1ons(Reproducabilitymeasurement)

challenge

response

response0.61bitsonaverageoutof128bitsdiffer

120oC1.08V

20oC;1.2V

Page 15: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ArbiterPUF

15

0

0

1

1

0

0

1

1

01

IdeallydelaydifferencebetweenRedandBluelinesshouldbe0iftheyaresymmetricallylaidout.InpracRcevariaRoninmanufacturingprocesswillintroducerandomdelaysbetweenthetwopaths

Switch

Page 16: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Arbiter

16

DFF

D

clk

Q ?

IfthesignalatDreachesfirstthenQwillbesetto1IfthesignalatclkreachesfirstthenQwillbesetto0

DFF

Page 17: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ArbiterPUF

17

challenge

rising Edge

1 if toppath is faster,else 0

D Q1

1

0

0

1

1

0

0

1

1

0

0

1 0 10 0 1

01

G

13.56MHzChipForISO14443Aspec.

Page 18: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ResultsforROPUF

18DesignandImplementa1onofPUF-Based“Unclonable”RFIDICsforAn1-Counterfei1ngandSecurityApplica1onsIEEEInt.Conf.onRFID,2008,S.Devdaset.Al.

Page 19: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ComparingROandArbiterPUF

19

NumberofChallenge:ResponsePairs:

NumberofChallenge:ResponsePairs:

N2

⎝⎜

⎠⎟ 2N

#CRPslinearlyrelatedtothenumberofcomponents

#CRPsexponenRallyrelatedtothenumberofcomponents

WEAKPUF STRONGPUF

Page 20: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

WeakPUFvsStrongPUF

20

•  ComparaRvelyfewnumberofChallengeResponsePairs(CRPs)

•  HugenumberofChallengeResponsePairs(CRPs)

•  CRPsmustbekeptsecret,becauseana8ackermaybeabletoenumerateallpossibleCRPs

•  WeakPUFsusefulforcreaRngcryptographickeys

•  Itisassumedthatana8ackercannotEnumerateallCRPswithinafixedRmeinterval.ThereforeCRPscanbemadepublic

•  Formally,anadversarygivenapoly-sizedsampleofadapRvelychosenCRPscannotpredictthe

Responsetoanewrandomlychosenchallenge.

•  Typicallyusedalongwithacryptographicscheme(likeencrypRon/HMACetc)tohidetheCRP(sincetheCRPsmustbekeptsecret)

•  Doesnotrequireanycryptographicscheme,sinceCRPscanbepublic.

WeakPUF StrongPUF

•  VeryGoodInterandIntradifferences

Page 21: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFBasedAuthenRcaRon(withStrongPUF)

21

CRPs

challenge

response

Bootstrapping:Atmanufacture,serverbuildsadatabaseofCRPsforeachdevice.Atdeployment,serverpicksarandomchallengefromthedatabase,queriesthedeviceandvalidatestheresponse

Page 22: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFBasedAuthenRcaRonManintheMiddle

22

CRPs

challenge

response

ManinthemiddlemaybeabletobuildadatabaseofCRPsTopreventthis,CRPsarenotusedmorethanonce

Page 23: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFBasedAuthenRcaRonCRPTables

23

CRPs

challenge

response

EachdevicewouldrequireitsownCRPtableandsecurelystoredinatrustedserverTablesmustbelargeenoughtocatertotheenRrelifeRmeofthedeviceorneedtoberechargedperiodically(scalabilityissues)

CRPs

Page 24: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFbasedAuthenRcaRon(AlleviaRngCRPProblem)

SecretModelofPUF

24

GateDelaysofPUFcomponents Bootstrapping:Atmanufacture,serverbuildsa

databaseofgatedelaysofeachcomponentinthePUF.Atdeployment,serverpicksarandomchallengeconstructsitsexpectedresponsefromsecretmodel,queriesthedeviceandvalidatestheresponse

SRllRequiresSecureBootstrapping

andSecureStorage

Page 25: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFbasedAuthenRcaRon(AlleviaRngCRPProblem)

•  PPUF:PublicModelPUF

25

GateDelaysofPUFComponents(Public)

Trustedserver(PKI)

Bootstrapping:DownloadthepublicmodelofPUFfromthetrustedserver.Atdeployment,serverpicksarandomchallengeconstructsexpectedresponsefrompublicmodel,queriesthedeviceandvalidatestheresponse.IfRmeforresponseislessthanathresholdacceptresponseelserejects.

AssumpRon:AdevicetakesmuchlessRmetocomputeaPUFresponsethanana8ackerwhomodelsthePUF.

T<T0?

Page 26: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

PUFbasedAuthenRcaRon(AlleviaRngCRPProblem)

HomomorphicEncryp1on

26

EncryptedCRPs

UntrustedCloud

Response

Page 27: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Conclusions•  DifferenttypesofPUFsbeingexplored

–  AnalogPUFs,SensorPUFsetc.

•  CRPissuesRllabigproblem

•  Severala8acksfeasibleonPUFs.–  Modelbuildinga8acks(SVMs)–  TamperingwithPUFcomputaRon(eg.Forcingasine-waveontheground

plane,canaltertheresultsofthePUF)

•  PUFsareaverypromisingwayforlightweightauthenRcaRonofedgedevices.

27

Page 28: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareTrojans

Hardware Security: Design, Threats, and Safeguards; D. Mukhopadhyay and R.S. Chakraborty

Page 29: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

29

h8ps://www.theguardian.com/technology/2012/may/29/cyber-a8ack-concerns-boeing-chiph8ps://techcrunch.com/2013/09/05/nsa-subverts-most-encrypRon-works-with-tech-companies-for-back-door-access-report-says/h8ps://www.theregister.co.uk/2013/07/29/lenovo_accused_backdoors_intel_ban/h8ps://www.technologyreview.com/s/519661/nsas-own-hardware-backdoors-may-sRll-be-a-problem-from-hell/

Page 30: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ICLifeCycle(VulnerableSteps)

30

IP ToolsStd. Cells Models

DesignSpecifications Fab Interface Mask Fab

WaferProbe

Dice and Package

PackageTest

Deploy and

Monitor

Trusted

Either

Untrusted

Wafer

*hbp://www.darpa.mil/MTO/solicita1ons/baa07-24/index.html

Offshore

Third-party

Page 31: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

MalwareinThirdPartyIPs

•  ThirdpartyIPs–  Cantheybetrusted?– Willtheycontainmaliciousbackdoors

•  Developersdon’t/can’t

search1000soflinesofcodelookingoutfortrojans.

31

Page 32: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

FANCI:IdenRficaRonofStealthyMaliciousLogic

•  FANCI:evaluatehardwaredesignsautomaRcallytodetermineifthereisanypossiblebackdoorshidden

•  ThegoalistopointouttotestersofpossibletrojanlocaRonsinahugepieceofcode

32

h8p://www.cs.columbia.edu/~simha/preprint_ccs13.pdf(someofthefollowingslidesareborrowedfromWaksman’sCCStalk)

Page 33: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareTrojanStructure

33

PayloadTriggerCircuit

TriggerCircuit:Basedonaseldomoccurringevent.Forexample,•  whenaddressonaddressbusis

0xdeadbeef.•  AparRcularlyrarepacketarriveson

network•  SomeRmehaselapsed

Payload:Dosomethingnefarious:•  Makeapageinmemory(un)privileged•  LeakinformaRontotheoutsideworld

throughnetwork,covertchannels,etc•  Causethesystemtofail

Trojancanbeinsertedanywhereinduringthemanufacturingprocess(eg.InthirdpartyIPcorespurchased,byfabricaRonplant,etc.)

Page 34: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Trojan=Trigger+Payload

34

Page 35: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Trojan=Trigger+Payload

35

Page 36: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

BackdoorsareStealthy

•  Small–  Typicallyafewlinesofcode/area

•  Stealth–  CannotbedetectedbyregulartesRngmethodologies(raretriggers)

–  Passivewhennottriggered

36

Page 37: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Unfortunately…

WithsomuchofcodeitishighlylikelythatstealthyporRonsofthecodearemissedornottestedproperly.

37

FANCI:willdetectthesestealthycircuits.Thesepartsaremostlikelyto

haveTrojans.TheaimistohavenofalsenegaRves.AfewfalseposiRvesareacceptable

Page 38: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ControlValues

A B C O

0 0 0 0

0 0 1 1

0 1 0 1

0 1 1 0

1 0 0 1

1 0 1 1

1 1 0 0

1 1 1 038

ByhowmuchdoesaninputinfluencetheoutputO?

A

B

C

O

Page 39: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ControlValues

A B C O

0 0 0 0

1 0 0 1

0 0 1 1

1 0 1 1

0 1 0 1

1 1 0 0

0 1 1 0

1 1 1 039

Byhowmuchdoesainputinfluencetheoutput0?

A:hasacontrolof0.5ontheoutput(Ama8ersinthisfuncRon)1 1 0 0A B C 0

A

B

C

O

Page 40: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ControlValues

A B C O

0 0 0 0

1 0 0 0

0 0 1 1

1 0 1 1

0 1 0 0

1 1 0 0

0 1 1 0

1 1 1 040

Byhowmuchdoesainputinfluencetheoutput0?

A:hasacontrolof0ontheoutput(Adoesnotma8erinthisfuncRon)(AiscalledunaffecRng)

1 1 0 0A B C 0

A

B

C

O

Page 41: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ControlValuesforaTriggerinaTrojan

41

if (addr == 0xdeadbeee) then{ trigger = 1 }

A31 A30 A2 A1 A0 trigger

0 0 … 0 0 0 0

0 0 … 0 0 1 0

0 0 … 0 1 0 0

0 0 … 0 1 1 0

: : : : : :

1 1 1 1 0 1

: : : : : :

1 1 1 1 1 1 0

A31hasacontrolvalue1/232

EasiertohideatrojanwhenlargerinputsetsareconsideredAlowchanceofaffecRngtheoutputLendsitselftostealthinessàeasiertohideamaliciouscode

Page 42: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

AnExampleofaMux

42

<A,B,C,D,S1,S2>=<0.25,0.25,0.25,0.25,0.5,0.5>Notrojanpresenthere(intuRvely):*Allmuxinputshaveacontrolvaluearoundmidrange(nottoocloseto0)

Page 43: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

AnExampleofaMaliciousMux

43

66extraselectlineswhichareonlymodifyMwhenwheyaresettoaparRcularvalue

M

ThecontrolvaluesEandS3toS66aresuspiciousbecausetheyrarelyInfluencethevalueofM.Perfectfordisguisingmaliciousbackdoors

JustsearchingforMINvaluesisowennotenough.Be8ermetricsAreneeded.

Page 44: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

CompuRngStealthfromControl

44

Page 45: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

CompuRngStealthfromControl

45

Page 46: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

FANCI:TheCompleteAlgorithm

46

Page 47: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

ICLifeCycle(TheFab)

47

IP ToolsStd. Cells Models

DesignSpecifications Fab Interface Mask Fab

WaferProbe

Dice and Package

PackageTest

Deploy and

Monitor

Trusted

Either

Untrusted

Wafer

*hbp://www.darpa.mil/MTO/solicita1ons/baa07-24/index.html

Offshore

Third-party

Page 48: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DetecRngTrojansinICs•  OpRcalInspecRonbasedtechniques

ScanningOpRcalMicroscopy(SOM),ScanningElectronMicroscopy(SEM),andpico-secondimagingcircuitanalysis(PICA)

–  Drawbacks:CostandTime!

•  TesRngtechniques–  Notaverypowerfultechnique

•  Sidechannelbasedtechniques–  Nonintrusivetechnique–  Compareside-channelswithagoldenmodel

48

ASurveyonHardwareTrojanDetecRonTechniquesh8p://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7169073

Page 49: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SideChannelBasedTrojanDetecRon

49

LightweightPRESENTImplementaRonPowerTraces

Hardwaretrojandesignanddetec1on:aprac1calevalua1onh8ps://dl.acm.org/citaRon.cfm?id=2527318

Page 50: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SideChannelBasedTrojanDetecRon(ICwithTrojan)

50

Page 51: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DifferenceofDistribuRons

51

Page 52: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareTrojanPrevenRon(Ifyoucan’tdetectthenprevent)

52

SilencingHardwareBackdoorswww.cs.columbia.edu/~simha/preprint_oakland11.pdfSlidestakenfromAdamWaksman’sOaklandtalk

Page 53: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareTrojanPrevenRon

53

EnsurethatahardwareTrojanisneverdeliveredthecorrectTrigger

Page 54: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Example(A5stageprocessor)

54

Page 55: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

Example(A5stageprocessor)

55

Page 56: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

TypesofTrojans

56

Page 57: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

TickingTimebomb

57

Page 58: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

TickingTimebomb

58

Page 59: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

CheatCodes

59

Page 60: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

CheatCodes

60

Page 61: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SequenceCheatCodes

61

Page 62: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

HardwareTrojanSilencing(withObfuscaRon)

62

Page 63: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SilencingTickingTimebombs•  PowerResets:flushpipeline,writecurrentIPandregistersto

memory,savebranchhistorytargets

63

Page 64: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SilencingTickingTimebombs•  Cantriggerbestoredtoarchitecturalstateandrestoredlater

–  No.UnitvalidaRontestspreventthis–  ReasonfortrusRngvalidaRonepoch

LargevalidaRonteamsOrganizedhierarchically

•  Cantriggersbestoredinnon-volaRlestateinternaltotheunit?–  Eg.Malwareconfiguresahiddennon-volaRlememory

•  UnmaskableInterrupts?–  UseaFIFOtostoreunmaskableinterrupts

•  PerformanceCountersarehiddenRmebombs

64

Page 65: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DataObfuscaRon

65

HomomorphicEncrypRon(Gentry2009)IdealsoluRonButpracRcalhurdles

Page 66: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DataObfuscaRon

66

Page 67: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DataObfuscaRon

67

StoreData5toAddress7

Page 68: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

DataObfuscaRon(ComputaRonalCase)

68

Page 69: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SequenceBreaking(Reordering)

69

EnsurefuncRonalityismaintained

Page 70: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

SequenceBreaking(InserRngevents)

70

Insertarbitraryeventswhenreorderingisdifficult

Page 71: Hardware Security - Indian Institute of Technology Madraschester/courses/17o_sse/slides/7... · 2017. 10. 20. · Chester Rebeiro IIT Madras Physically Unclonable Functions Physical

CatchAll(DuplicaRon)

71

Expensive:Non-recurring:design;verificaRoncostsduetoduplicaRonRecurring:Powerandenergycosts