Security testing of hardware product



Similar documents
Security testing for hardware product : the security evaluations practice

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Supporting Document Mandatory Technical Document. Application of Attack Potential to Smartcards. March Version 2.7 Revision 1 CCDB

On Security Evaluation Testing

PUF Physical Unclonable Functions

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

Microsemi Security Center of Excellence

Supporting Document Guidance. ETR template for composite evaluation of Smart Cards and similar devices. September Version 1.

Introduction Page 4. Inspector SCA Page 6. Inspector FI Page 10. Service & Product support Page 13. Inspector Hardware Matrix Page 14

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

Joint Interpretation Library

What is a Smart Card?

Joint Interpretation Library. Guidance for smartcard evaluation

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Hardware PV018 Masaryk University Faculty of Informatics

Certification Report. NXP Secure Smart Card Controller P40C012/040/072 VD

Embedded Java & Secure Element for high security in IoT systems

Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203

Hardware Trojans Detection Methods Julien FRANCQ

Security IC Platform Protection Profile

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Java Card. Smartcards. Demos. . p.1/30

Advances in Smartcard Security

Smart Secure Devices & Embedded Operating Systems

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Reviving smart card analysis

Developing a new Protection Profile for (U)SIM UICC platforms. ICCC 2008, Korea, Jiju Septembre 2008 JP.Wary/M.Eznack/C.Loiseaux/R.

MAKING SENSE OF SMART CARD SECURITY CERTIFICATIONS

Horst Görtz Institute for IT-Security

Soitec. Eric Guiot, Manager R&D Soitec. 7 mars 2011 JSIam 2011

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Joint Interpretation Library

AES1. Ultra-Compact Advanced Encryption Standard Core. General Description. Base Core Features. Symbol. Applications

Smartcard IC Platform Protection Profile

CIS 551 / TCOM 401 Computer and Network Security

How To Perform Differential Frequency Analysis (Dfa) On A Powerline (Aes) On An Iphone Or Ipad (Ase) On Microsoft Powerline 2 (Aces) On Pc Or Ipa (Aas)

Using BroadSAFE TM Technology 07/18/05

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

CryptoFirewall Technology Introduction

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

Security in ST : From Company to Products

Broadcasting encryption or systematic #FAIL? Phil

FIME SECURITY OFFER. PCI PTS POI security evaluation process

Operating Systems 4 th Class

Client Server Registration Protocol

Authentication requirement Authentication function MAC Hash function Security of

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

EPASSPORT WITH BASIC ACCESS CONTROL AND ACTIVE AUTHENTICATION

PFP Technology White Paper

A Model Program for Computer Engineering Master of Science Degree Embedded Systems

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

SENSE Security overview 2014

Chapter 1: Introduction

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Sony FeliCa Contactless Smart Card RC-S860

Smart Cards a(s) Safety Critical Systems

Secure egovernment Where convenience meets security.

NATIONAL SUN YAT-SEN UNIVERSITY

Booting from NAND Flash Memory

Coursework for MS leading to PhD in Electrical Engineering. 1 Courses for Digital Systems and Signal Processing

Hardware Security Modules for Protecting Embedded Systems

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CMP. A dynamic link between research and industry. Center of Microelectronics in Provence - Georges Charpak Campus.

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

Application of Physical Attacks

Supporting Document Guidance. Smartcard Evaluation. February Version 2.0 CCDB

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Low- Cost Chip Microprobing

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Security in Near Field Communication (NFC)

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

APPLIED AND INTEGRATED SECURITY

Smart Card Security How Can We Be So Sure?

CHAPTER 7: The CPU and Memory

Introduction to Embedded Systems. Software Update Problem

Entrust Smartcard & USB Authentication

Courtesy Translation

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

- Table of Contents -

Quantum Computing for Beginners: Building Qubits

Data remanence in Flash Memory Devices

Relay attacks on card payment: vulnerabilities and defences

Leti Introduction and Overview

Common Criteria for Information Technology Security Evaluation. Part 1: Introduction and general model. August Version 2.

Glitch Free Frequency Shifting Simplifies Timing Design in Consumer Applications

Center of Academic Excellence Cyber Operations Program 2013 Application

Applied and Integrated Security. C. Eckert

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Data Security 2. Implement Network Controls

Computer Network Engineering

Transcription:

Alain MERLE CESTI LETI CEA Grenoble Alain.merle@cea.fr Security testing of hardware product DCIS/SASTI/CESTI 1

Abstract «What are you doing in ITSEFs?» Testing, Security testing, Attacks, Evaluations, Common Criteria, Certification, Security evaluations: The French Certification Scheme The Common Criteria Smartcards evaluations Smartcard security testing Strategy Attacks DCIS/SASTI/CESTI 2

Common Criteria The basic ideas Describe what is the security of a product Verifythat the developer has done what it was supposed to do (and only that) Test (functional and attacks) the product Verify environmental constraints DCIS/SASTI/CESTI 3

A standardized, objective and efficient Security Analysis Method (ISO IS 15408) An International Recognition through Mutual Recognition Arrangements. In Europe, mostly used for smartcards Integrated Circuits IC with embedded software DCIS/SASTI/CESTI 4

CESTI LETI Information Technology Security Evaluation Facilities ITSEF of the French Certification Scheme Area : hardware and embedded software Organisme d accréditation COFRAC Accréditation Organisme de Certification : D.C.S.S.I. Agrément Certification Smartcards Security equipments Level: Up to EAL7 Located in Grenoble Part of the biggest French Research center in Microelectronics CESTI Centre d Evaluation de la Sécurité des Technologies de l Information Certificat Le Schéma Français de Certification DCIS/SASTI/CESTI 5

Smartcard evaluation Common Criteria, EAL4+ level High Security level (banking applications) White box evaluation Design information Source code A table defining the «attack potential» Time, expertise, equipment, knowledge, The card must resist to the «maximum» (ie all realistic attacks) DCIS/SASTI/CESTI 6

What kind of testing? Functional testing but security oriented Are the Security Functions working as specified? Attacks Independent vulnerability analysis Higher levels (VLA.4): adaptation of the classical attack methods to the specificities of the product DCIS/SASTI/CESTI 7

Test strategy (Attacks) State of the art R&D Potential vulnerabilities Add Remove Customize Attacks and Potential Vulnerabilities Add Remove Customize Evaluation tasks Attacks and Potential Vulnerabilities Add Remove Customize Attacks and Strategies Tests DCIS/SASTI/CESTI 8

Attacks on smartcards Physical (Silicon related) Memories Access to internal signals (probing) Observation: Side Channel Analysis SPA, EMA, DPA, DEMA Perturbations: inducing errors Cryptography (DFA) Generating errors IO errors (reading, writing) Program disruption (jump, skip, change instruction) Dynamic rewriting of the code Specifications/implementation related attacks Protocol, overflows, errors in programming, DCIS/SASTI/CESTI 9

Optical reading of ROM Reverse Engineering Probing : MEB Probing : laser preparation DCIS/SASTI/CESTI 10

Modification : FIB Modification : Laser cut DCIS/SASTI/CESTI 11

Basic attack strategy Observation (SPA, EMA, Cartography) Find an «interesting» location (time and space) Synchronization Data acquisition or Perturbation For perturbation Not a 100% predictable effect Repetition required DCIS/SASTI/CESTI 12

EM signal analysis DCIS/SASTI/CESTI 13

SPA/EMA Analysis DES DCIS/SASTI/CESTI 14

SPA/DPA analysis DCIS/SASTI/CESTI 15

Cartography Electro-magnetic signal during DES execution. Hardware DES Differential signal DCIS/SASTI/CESTI 16

Cartography DCIS/SASTI/CESTI 17

Perturbations examples Branch on error Initializations valid = TRUE; If got ^= expected then valid = FALSE ; If valid Then critical processing; Non critical processing; If not authorized then goto xxx; Critical processing; Re-reading after integrity checking Memory integrity checking; Non critical processing; Data 1 reading; Critical processing; Data 2 reading; Critical processing; DCIS/SASTI/CESTI 18

The race... Challenge between Attacks Counter measures Today an attacks Is based on an attacks method ex DPA, DFA But is mainly attacking the counter measures Signal processing, synchronization, anti suicide, safe errors, DCIS/SASTI/CESTI 19

Examples (1) DPA DPA theory De synchronization (internal clocks, random IT, fake code, ) Then signal processing Then masking techniques Then high order DPA Then smoothing the consumption signal Then EM based attacks. to be continued DCIS/SASTI/CESTI 20

Example (2) Perturbations Glitches based Then detectors and filters Then laser based Then integrity checking Then multiple perturbations. To be continued DCIS/SASTI/CESTI 21

Example (3) When counter measures induce vulnerabilities Counter measure: Performing the processing twice If results are different then security reaction Attack Generate a controlled error (setting a bit to 1) If no reaction, then the value was 1 DCIS/SASTI/CESTI 22

What is requested from a lab? Good knowledge of the state of the art Not always published Internal R&D on attacks Equipment Competences Multi-competences Cryptography, microelectronics, signal processing, lasers, etc Competence areas defined in the French Scheme Hardware (IC, IC with embedded software) Software (Networks, OS, ) DCIS/SASTI/CESTI 23

Test benches DCIS/SASTI/CESTI 24

Competences Microelectronic Testbenches Software DCIS/SASTI/CESTI 25

Some rules Security is the whole product: IC + software The IC must hide itself If you can see it, you can attack it! Critical processing,sensitive data handling,consistency checking, Memory access, The IC must control itself Am I doing what I was supposed to do? Consistency checking,audits, log, But attacks are now dedicated to counter-measures DCIS/SASTI/CESTI 26

CONCLUSION (1) Evaluation is Rigorous & normalized process But attacks require specific «human» skills Attack is Gaining access to secret/forbidden operations Free to «play» with abnormal conditions An error is not an attack But an error can often be used in attacks An attack requires an attack strategy DCIS/SASTI/CESTI 27

CONCLUSION (2) The evaluation guarantees that The product is working as specified It has a good resistance level At a specific time Perfection as absolute security does not exist DCIS/SASTI/CESTI 28