ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015
|
|
|
- Susan Cameron
- 9 years ago
- Views:
Transcription
1 ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD Olivier THOMAS <[email protected]> Blackhat USA 2015
2 About Texplained Texplained [Technology Explained] refers to the skill of making sense out of any IC in a black box situation Invasive attacks Invasive attacks are left out of evaluation and certification mainly because of the extensive resources needed Whereas Invasive attacks are a major threat as: Piracy and counterfeiting have merged Hackers groups are getting professional Texplained focuses on performing invasive analysis using the technologies developed in house to perform complicated analysis in a short amount of time Expertise in Texplained comes from 10 years of active R&D experience for an independent security research laboratory focused on demanding pay-tv security 2
3 Overview Approach Results Background Conclusion 3
4 Overview Background 4
5 Background Secure Microcontrollers This talk will focus on secure microcontrollers. A secure microcontroller is an Integrated Circuit (IC) with an integrated CPU, program memory and storage for sensitive data. Secure microcontrollers are available in different form-factors: Smartcards, biometric passports and ID cards SMD packages for TPMs, usd, UMMC Members of a particular product family will share device characteristics. 5
6 Background Evaluation When it comes to invasive attacks, one can argue that the attack is time and ressource consuming. BUT equipment can be rented and / or service labs can provide support There is no clearly defined process to study one IC in a reasonable time Invasive Attacks are under evaluated 6
7 Background Pay Tv Pay Tv has been the first market to suffer from heavy piracy Satellite Broadcaster Customer Smartcard 7
8 Background Pay Tv The problem A clone of a PayTV subscriber card will have the same level of access as the genuine subscriber card. Pirates can buy a single subscription with access to all the paid content and then produce copies of this card. Pirate Card ca
9 Evolution Pay Tv actors always pushed to get the best security possible at a time ~1995 No shield No scrambling Unencrypted ~2000 Passive shield Bus scrambling Encrypted ~2005 Internal Oscillator Active shield Bus scrambling Encrypted Attack Sensors Hardware redundancy Custom hardware function 9
10 Threat globalisation Piracy is not the only threat anymore Supply chain security is of concern for fabless manufacturers (backdoors) IP theft could be a critical issue Counterfeiting has become a bigger market Mass selling products are the new targets Consumables (Ink cartridges for printers, ) Accessories (game console controllers, ) Internet Of Things will create a global security need 10
11 Overview Approach 11
12 Approach Research Project about new analysis methods - work in progress Time and ressource limited project (one person - one month). The Target : State Of The Art Secure Smart Card shield (mesh) memory encryption internal oscillator... Analysis methods professional deprocessing high resolution imagery (Scanning Electron Microscope) Labless analysis through custom tools 12
13 Process Choices IC Material Mixed deprocessing Secure IC SEM imagery Assisted 13
14 DeProcessing Card Material Mixed deprocessing Chip is Aluminium based This means : Lines are made of Aluminium Vias are made of Tungsten Therefore, it is possible to : remove lines keep the vias 14
15 Imagery Secure IC SEM imagery Optical pictures are not usable SEM brings high resolution Optical Picture SEM Picture 15
16 Imagery Secure IC SEM imagery 5 layers have been imaged (4 interconnect layers + active layer 1500 pictures per layer Metal 4 Poly Metal 1 Metal 2 Metal 3 16
17 Analysis Secure IC Assisted SEM pictures are distorted Issue for correlating and stitching large scans Issue for aligning layers Tracing signal inside the core is mandatory for secure ICs Thousands of gates to reverse and link together 17
18 Analysis CHIP PICTURES FEATURE EXTRACTION ANALYSIS Extract lines, vias and standard cells Correlate images and features together Stitch images and features together align layers together DISPLAY 18
19 Feature Extraction Feature extraction Source Picture Extracted Lines and Vias 19
20 Feature Extraction Feature extraction Metal 1 Poly Extracted Standard Cells 20
21 Overview Results 21
22 Results 2 blocs of RAM ROM Flash Analog blocs Core Backside Picture 22
23 Results Core will be analyzed Lines and Vias are extracted Extracted Interconnect 23
24 Results Standard Cell Library is reconstructed NAND Gate Extracted Standard Cells 24
25 Reading The Flash Flash is easy to spot : Charge pump used to erase it relies on big capacitors Charge pump can be disabled to prevent a flash erase in case of security interrupt. Flash Memory 25
26 Reading The Flash Flash output buffers are directly visible from the backside Output lines get separated in 2 groups that travel along the flash to the core. Flash Output Buffer Flash Memory 26
27 Reading The Flash Only one of the flash output could be traced to the core. Position of the other output is approximative. Flash output going inside the core 27
28 Reading The Flash Tracing the known flash output leads to 2 multiplexers. Flash output x MUX MUX Flash output going inside the core 28
29 Reading The Flash Tracing the selection signal of the multiplexer shows that the bus must be multiplexed. Selection Flash output x MUX MUX MUX MUX Traced signals and their connected standard cells 29
30 Reading The Flash Tracing back from the multiplexers confirms the position of the other flash outputs. It also shows that bytes can be handled in different orders (endianness ) Flash output b10 Flash output b00 Flash output b11 Flash output b01 MUX MUX MUX MUX Selection 6 flash outputs 30
31 Reading The Flash Next step is finding the Instruction Register 2 data paths. Flash Outputs MUX?? FF MUX ARES net tracing visualization. MUX FF 31
32 Reading The Flash Flash Outputs First group of Flip-Flops found. MUX It could be the Instruction Register?? FF Following bloc would be the Instruction Decoder then. MUX MUX FF Group bits inside the presumed Instruction Decoder Compare with the instruction set Instruction Registers Match between the 2 : IR found Flash bus schematic 32
33 Attack Strategy For Reading The Flash Instruction register is made of Flip-Flops that have 2 interesting signals: clk / read signal that can be used to synchronize data as some clk cycles may be suppressed by embedded counter-measures Enable signal that disconnect the input from the Flip-Flop. Redundancy can be obtained by probing 2 data lines at a time (one needle will stay on its line for all the acquisition). 4 needles Linear Code Extraction 33
34 Comparison with old ICs Linear Code Extraction is still a valid attack scenario. Old chips had no protection against it. The target hides its bus logic inside a dense core This obfuscation does not help when the attacker can fully reverse the core. External Flash Buffers 34
35 Attack Strategy For Reading The Flash Performing the attack can be tricky depending on : shield technology Position of the interesting nets inside the chip (frontside or backside edit) Planarization Having all features extracted, a gds2 file has been created. It can be loaded in the FIB for assisted navigation. GDS2 active layer example Core GDS2 for FIB NAVIGATION 35
36 Reading The ROM Getting the «raw» bits is feasible. Is the ROM encrypted? Dopant etch Bits before wet chemical dopant etch Bits revealed by etching 36
37 Reading The ROM ROM Outputs ROM data bus goes to an encryption bloc Having Muxes and Flip-Flops on the same path may indicate that decryption operation can take several clk cycles. This path has not been completely reversed ROM can be read after studying the encryption without any Focused Ion Beam edit. MUX ROM Data Path FF 37
38 2 Blocs of RAM RAM 1 RAM 2 Both RAM are encrypted RAM and ROM are on the same clk domain FF FF Shared RAM with the crypto accelerator? MUX RAMs Data Path 38
39 Overview Conclusion 39
40 Timing : generation benchmark The first Linear Code Extractions did not require expensive equipments such as FIB and SEM. The main memory was not scrambled neither encrypted. Buffers were easily accessible. Extracting such a chip would require very little effort nowadays. Unprotected Bus 40
41 Timing : generation benchmark To avoid easy access to the logic, multiplexers and buffers have been hidden inside the core. Scrambling 8 bits processor 32 bits FLASH output going to the core Manual Tracing 41
42 Timing : generation benchmark Step by step 32 ROM Outputs Lines have to be traced inside the core The core contains a multiplexer for the 32-bit lines Identify the 8 output bits of the multiplexers 32:8 MUX 8 Instruction Registers Manual Tracing inside the core 42
43 Timing : generation benchmark Step by step 3 paths can be followed 2 of them can not be exploited 43
44 Timing : generation benchmark Step by step Multiplexers were hidden Data was not encrypted Finding the correct spot took some time : ~ 2 months. 44
45 Timing : generation benchmark Flash Outputs New methodology is already successful Time of this particular study is short Deprocessing and imagery can be performed in less than 2 weeks. Interconnects are extracted and the result checked in another 2 weeks. The tools used for that study were in a mode used when picture quality is low or when feature extraction has not been verified. Standard Cell Library has been extracted while tracing signals, leading to extracted instances inside the core. Tracing RAM, ROM and Flash to the Instruction Register and verifying its location with an overview of the Instruction decoder took 1,5 week. MUX MUX MUX Instruction Registers?? FF FF Flash bus schematic 45
46 Conclusion The target IC has the characteristics of a secure chip. Shield Internal Oscillator Memory encryption Obfuscation of the different parts inside a single core Linear Code Extraction would be the best method to read the main memory ROM could be read by a deep Hardware Reverse Engineering 46
47 Conclusion Time necessary to perform the study was 2 weeks of feature extraction related work and an extra week and a half to find where and how to perform a Linear Code Extraction. This methods speeds up the regular process by a significant factor. It also opens doors for semi-invasive attacks where the position of important standard cells could be used to narrow down one study. Hardware custom implementation are questionable. 47
48 CONTACT Olivier Thomas Chief Executive Officer [email protected] Clarisse Ginet Head of Business Development [email protected]
Reviving smart card analysis
Reviving smart card analysis Christopher Tarnovsky Karsten Nohl [email protected] [email protected] Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for
Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov
Local Heating Attacks on Flash Memory Devices Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Introduction Semi-invasive attacks were introduced in 2002 ( Optical fault induction
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Low- Cost Chip Microprobing
Low- Cost Chip Microprobing Philipp Maier Karsten Nohl SRLabs Template v11 A few smart cards chips cover numerous security domains Security chip applica.ons Payment
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
Smart Card Security How Can We Be So Sure?
Smart Card Security How Can We Be So Sure? Ernst Bovelander TNO Centre for Evaluation of Instrumentation and Security Techniques PO Box 5013 2600 GA Delft, The Netherlands [email protected] 1. Introduction
Software Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
Data remanence in Flash Memory Devices
Data remanence in Flash Memory Devices Sergei Skorobogatov 1 Data remanence Residual representation of data after erasure Magnetic media SRAM and DRAM Low-temperature data remanence Long-term retention
CHASE Survey on 6 Most Important Topics in Hardware Security
University of Connecticut CHASE Survey on 6 Most Important Topics in Hardware Security Prepared By Prof. M. Tehranipoor Charles H. Knapp Associate Professor in Engineering Innovation Topics! Counterfeit
Broadcasting encryption or systematic #FAIL? Phil
WE 201 EK 2 42 Broadcasting encryption or systematic #FAIL? SUMMARY Intro : Broadcasting something... 1984 : Discret 11 1995 : Syster 1996 2002 : Seca 1 2002 2008 : Seca 2 Conclusion 2/49 Broadcasting
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Reverse engineering hardware for software reversers: studying an encrypted external HDD
Reverse engineering hardware for software reversers: studying an encrypted external HDD Joffrey Czarny & Raphaël Rigo / AGI / TX5IT 2015-10-02 / Hardwear.io 2015-10-02 / Hardwear.io 2 Introduction Why
Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
MULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill
Digital Systems Based on Principles and Applications of Electrical Engineering/Rizzoni (McGraw Hill Objectives: Analyze the operation of sequential logic circuits. Understand the operation of digital counters.
ZigBee Technology Overview
ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification
Testing of Digital System-on- Chip (SoC)
Testing of Digital System-on- Chip (SoC) 1 Outline of the Talk Introduction to system-on-chip (SoC) design Approaches to SoC design SoC test requirements and challenges Core test wrapper P1500 core test
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Hardware Trojans Detection Methods Julien FRANCQ
DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 /
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
CryptoFirewall Technology Introduction
CryptoFirewall Technology Introduction Cryptography Research, Inc. www.cryptography.com 575 Market St., 21 st Floor, San Francisco, CA 94105 1998-2007 Cryptography Research, Inc. Protected under issued
Secure egovernment Where convenience meets security. www.infineon.com/ccs
Secure egovernment Where convenience meets security www.infineon.com/ccs Gaining transparency Electronic ID documents replace and enhance conventional ID documents that governments have been issuing for
To design digital counter circuits using JK-Flip-Flop. To implement counter using 74LS193 IC.
8.1 Objectives To design digital counter circuits using JK-Flip-Flop. To implement counter using 74LS193 IC. 8.2 Introduction Circuits for counting events are frequently used in computers and other digital
Introduction to Digital System Design
Introduction to Digital System Design Chapter 1 1 Outline 1. Why Digital? 2. Device Technologies 3. System Representation 4. Abstraction 5. Development Tasks 6. Development Flow Chapter 1 2 1. Why Digital
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
CHAPTER 11: Flip Flops
CHAPTER 11: Flip Flops In this chapter, you will be building the part of the circuit that controls the command sequencing. The required circuit must operate the counter and the memory chip. When the teach
Modeling Sequential Elements with Verilog. Prof. Chien-Nan Liu TEL: 03-4227151 ext:34534 Email: [email protected]. Sequential Circuit
Modeling Sequential Elements with Verilog Prof. Chien-Nan Liu TEL: 03-4227151 ext:34534 Email: [email protected] 4-1 Sequential Circuit Outputs are functions of inputs and present states of storage elements
UNIVERSITY OF CALIFORNIA, DAVIS Department of Electrical and Computer Engineering. EEC180B Lab 7: MISP Processor Design Spring 1995
UNIVERSITY OF CALIFORNIA, DAVIS Department of Electrical and Computer Engineering EEC180B Lab 7: MISP Processor Design Spring 1995 Objective: In this lab, you will complete the design of the MISP processor,
Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
Sample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
Design Principles for Tamper-Resistant Smartcard Processors
Design Principles for Tamper-Resistant Smartcard Processors Oliver Kömmerling ADSR Markus G. Kuhn Computer Laboratory λ http://www.cl.cam.ac.uk/~mgk25/sc99-tamper[-slides].pdf Microprobing Classes of Attacks
The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC
The SA601: The First System-On-Chip for Guitar Effects By Thomas Irrgang, Analog Devices, Inc. & Roger K. Smith, Source Audio LLC Introduction The SA601 is a mixed signal device fabricated in 0.18u CMOS.
ETEC 2301 Programmable Logic Devices. Chapter 10 Counters. Shawnee State University Department of Industrial and Engineering Technologies
ETEC 2301 Programmable Logic Devices Chapter 10 Counters Shawnee State University Department of Industrial and Engineering Technologies Copyright 2007 by Janna B. Gallaher Asynchronous Counter Operation
Desktop Publishing 5N0785 Learning Outcome 2 Monaghan Institute Level 5 Module
Desktop Publishing 5N0785 Learning Outcome 2 Monaghan Institute Level 5 Module Contents Learners will be able to describe the characteristics of key components of DTP systems including those used for input,
COMBINATIONAL and SEQUENTIAL LOGIC CIRCUITS Hardware implementation and software design
PH-315 COMINATIONAL and SEUENTIAL LOGIC CIRCUITS Hardware implementation and software design A La Rosa I PURPOSE: To familiarize with combinational and sequential logic circuits Combinational circuits
Chapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
Horst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
Homework # 2. Solutions. 4.1 What are the differences among sequential access, direct access, and random access?
ECE337 / CS341, Fall 2005 Introduction to Computer Architecture and Organization Instructor: Victor Manuel Murray Herrera Date assigned: 09/19/05, 05:00 PM Due back: 09/30/05, 8:00 AM Homework # 2 Solutions
Chapter 4 Register Transfer and Microoperations. Section 4.1 Register Transfer Language
Chapter 4 Register Transfer and Microoperations Section 4.1 Register Transfer Language Digital systems are composed of modules that are constructed from digital components, such as registers, decoders,
DVCrypt Conditional Access System
DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Digital Video Broadcasting Conditional Access Architecture
Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs
Security in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
Programming Logic controllers
Programming Logic controllers Programmable Logic Controller (PLC) is a microprocessor based system that uses programmable memory to store instructions and implement functions such as logic, sequencing,
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
On Security Evaluation Testing
On Security Evaluation Testing Kerstin Lemke-Rust Hochschule Bonn-Rhein-Sieg Workshop: Provable Security against Physical Attacks Lorentz Center, 19 Feb 2010 Kerstin Lemke-Rust (H BRS) On Security Evaluation
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory 1 1. Memory Organisation 2 Random access model A memory-, a data byte, or a word, or a double
Design of a High Speed Communications Link Using Field Programmable Gate Arrays
Customer-Authored Application Note AC103 Design of a High Speed Communications Link Using Field Programmable Gate Arrays Amy Lovelace, Technical Staff Engineer Alcatel Network Systems Introduction A communication
ES_LPC4357/53/37/33. Errata sheet LPC4357/53/37/33. Document information
Rev. 1.1 8 August 2012 Errata sheet Document information Info Keywords Abstract Content LPC4357FET256; LPC4357FET180; LPC4357FBD208; LPC4353FET256; LPC4353FET180; LPC4353FBD208; LPC4337FET256; LPC4337FET180;
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
System Security Solutions for the connected world. www.infineon.com/ccs
System Security Solutions for the connected world www.infineon.com/ccs Solutions for rising security demands The right balance between hardware-based and software-based security mechanisms allows you to
Gage Applied Technologies
Copyright 2004 As seen in Evaluation Engineering/September 2004 1 Use of a PC-Based Digitizer in an Ultrasonic Flaw-Detection System Written by: Andrew Dawson, Ph.D. ABSTRACT: Use of modern high-speed
Physical Attacks on Tamper Resistance: Progress and Lessons
Physical Attacks on Tamper Resistance: Progress and Lessons Dr Sergei Skorobogatov http://www.cl.cam.ac.uk/~sps32 email: [email protected] Why do we need tamper resistance? Theft of service: unauthorised
Chapter 2 Basic Structure of Computers. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan
Chapter 2 Basic Structure of Computers Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan Outline Functional Units Basic Operational Concepts Bus Structures Software
Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March 2009. Version 2.7 Revision 1 CCDB-2009-03-001
Supporting Document Mandatory Technical Document Application of Attack Potential to Smartcards March 2009 Version 2.7 Revision 1 CCDB-2009-03-001 Foreword This is a supporting document, intended to complement
NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z
NIST Mobile Forensics Workshop and Webcast Mobile Device Forensics: A Z June 2014 Disclaimer: Certain commercial entities, equipment, or materials may be identified in this presentation. Such identification
Lab Experiment 1: The LPC 2148 Education Board
Lab Experiment 1: The LPC 2148 Education Board 1 Introduction The aim of this course ECE 425L is to help you understand and utilize the functionalities of ARM7TDMI LPC2148 microcontroller. To do that,
Experiment # 9. Clock generator circuits & Counters. Eng. Waleed Y. Mousa
Experiment # 9 Clock generator circuits & Counters Eng. Waleed Y. Mousa 1. Objectives: 1. Understanding the principles and construction of Clock generator. 2. To be familiar with clock pulse generation
Advances in Smartcard Security
Advances in Smartcard Security Marc Witteman Introduction Over the last decade smartcards have entered our global community. Although initially they were only used as simple phone cards they now support
What is a System on a Chip?
What is a System on a Chip? Integration of a complete system, that until recently consisted of multiple ICs, onto a single IC. CPU PCI DSP SRAM ROM MPEG SoC DRAM System Chips Why? Characteristics: Complex
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories
Handout 17 by Dr Sheikh Sharif Iqbal Memory Unit and Read Only Memories Objective: - To discuss different types of memories used in 80x86 systems for storing digital information. - To learn the electronic
Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if you have questions! Lab #2 Today. Quiz #1 Tomorrow (Lectures 1-7)
Overview of Computer Science CSC 101 Summer 2011 Main Memory vs. Auxiliary Storage Lecture 7 July 14, 2011 Announcements Writing Assignment #2 due Today (5:00pm) - Post on your CSC101 webpage - Ask if
Attacks on Pay-TV Access Control Systems. Markus G. Kuhn Computer Laboratory
Attacks on Pay-TV Access Control Systems Markus G. Kuhn Computer Laboratory Generations of Pay-TV Access Control Systems Analog Systems remove sync information, try to confuse gain-control in receiver,
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
W a d i a D i g i t a l
Wadia Decoding Computer Overview A Definition What is a Decoding Computer? The Wadia Decoding Computer is a small form factor digital-to-analog converter with digital pre-amplifier capabilities. It is
On a New Way to Read Data from Memory
On a New Way to Read Data from Memory David Samyde 1, Sergei Skorobogatov 2, Ross Anderson 2 and Jean-Jacques Quisquater 1 1: Université catholique de Louvain, UCL Crypto Group Place du Levant, 3, B-1348
Test Driven Development of Embedded Systems Using Existing Software Test Infrastructure
Test Driven Development of Embedded Systems Using Existing Software Test Infrastructure Micah Dowty University of Colorado at Boulder [email protected] March 26, 2004 Abstract Traditional software development
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
ontroller LSI with Built-in High- Performance Graphic Functions for Automotive Applications
C ontroller LSI with Built-in High- Performance Graphic Functions for Automotive Applications 1-chip solution for color display, video input and meter control with built-in highperformance CPU core FR81S
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Electronics Merit Badge Class 3. 1/30/2014 Electronics Merit Badge Class 3 1
Electronics Merit Badge Class 3 1/30/2014 Electronics Merit Badge Class 3 1 Decimal Base 10 In base 10, there are 10 unique digits (0-9). When writing large numbers (more that 1 digit), each column represents
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah
(DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de [email protected] NIOS II 1 1 What is Nios II? Altera s Second Generation
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices
An On-chip Security Monitoring Solution For System Clock For Low Cost Devices Frank Vater Innovations for High Performance Microelectronics Im Technologiepark 25 15236 Frankfurt (Oder), Germany [email protected]
M68EVB908QL4 Development Board for Motorola MC68HC908QL4
M68EVB908QL4 Development Board for Motorola MC68HC908QL4! Axiom Manufacturing 2813 Industrial Lane Garland, TX 75041 Email: [email protected] Web: http://www.axman.com! CONTENTS CAUTIONARY NOTES...3 TERMINOLOGY...3
Monitoring Conditional Access Systems
Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures
Ingar Fredriksen AVR Applications Manager. Tromsø August 12, 2005
Ingar Fredriksen AVR Applications Manager Tromsø August 12, 2005 Atmel Norway 2005 Atmel Norway 2005 The history of computers Foundation for modern computing 3 An automatic computing machine must have:
Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
EE 42/100 Lecture 24: Latches and Flip Flops. Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad
A. M. Niknejad University of California, Berkeley EE 100 / 42 Lecture 24 p. 1/20 EE 42/100 Lecture 24: Latches and Flip Flops ELECTRONICS Rev B 4/21/2010 (2:04 PM) Prof. Ali M. Niknejad University of California,
Decimal Number (base 10) Binary Number (base 2)
LECTURE 5. BINARY COUNTER Before starting with counters there is some vital information that needs to be understood. The most important is the fact that since the outputs of a digital chip can only be
Nanoscale Resolution Options for Optical Localization Techniques. C. Boit TU Berlin Chair of Semiconductor Devices
berlin Nanoscale Resolution Options for Optical Localization Techniques C. Boit TU Berlin Chair of Semiconductor Devices EUFANET Workshop on Optical Localization Techniques Toulouse, Jan 26, 2009 Jan 26,
LLRF. Digital RF Stabilization System
LLRF Digital RF Stabilization System Many instruments. Many people. Working together. Stability means knowing your machine has innovative solutions. For users, stability means a machine achieving its full
Lecture 1. Introduction to Embedded Computer Systems
CENG 314 Lecture 1 Introduction to Embedded Computer Systems Asst. Prof. Tolga Ayav, Ph.D. Department of Computer Engineering System A system has a set of one or more inputs entering a black box and a
Chapter 7 Information System Security and Control
Chapter 7 Information System Security and Control Essay Questions: 1. Hackers and their companion viruses are an increasing problem, especially on the Internet. What can a digital company do to protect
Lecture-3 MEMORY: Development of Memory:
Lecture-3 MEMORY: It is a storage device. It stores program data and the results. There are two kind of memories; semiconductor memories & magnetic memories. Semiconductor memories are faster, smaller,
The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy
The Changing Threat Surface in Embedded Computing Riley Repko Vice President, Global Cyber Security Strategy Embedded Computing History First embedded system was the Apollo Guidance Computer First integrated
EXERCISES OF FUNDAMENTALS OF COMPUTER TECHNOLOGY UNIT 5. MEMORY SYSTEM
EXERCISES OF FUNDAMENTALS OF COMPUTER TECHNOLOGY UNIT 5. MEMORY SYSTEM Unit 5. Memory System 2 / 6 Most of the exercises in this units deal with installing memory chips in a computer to increase its capacity,
MICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
Design Verification & Testing Design for Testability and Scan
Overview esign for testability (FT) makes it possible to: Assure the detection of all faults in a circuit Reduce the cost and time associated with test development Reduce the execution time of performing
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
Multiple Choice Questions(Computer)
Multiple Choice Questions(Computer) 1. Which of the following is the product of data processing a. information b. data c. software program d. system 2. The process of putting data into a location is called
