Side Channels: Hardware or Software threat?



Similar documents
Side Channel Analysis and Embedded Systems Impact and Countermeasures

Are Cache Attacks on Public Clouds Practical?

Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203

Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

Introduction Page 4. Inspector SCA Page 6. Inspector FI Page 10. Service & Product support Page 13. Inspector Hardware Matrix Page 14

Microsemi Security Center of Excellence

Horst Görtz Institute for IT-Security

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

CS Computer Security Third topic: Crypto Support Sys

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

PrivyLink Cryptographic Key Server *

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Reverse engineering hardware for software reversers: studying an encrypted external HDD

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Evaluation of Digital Signature Process

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Risk Management in the Development Process A Progress Report

Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 7

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

Reviving smart card analysis

Secure Storage. Lost Laptops

Presentation on Black Hat Europe 2003 Conference. Security Analysis of Microsoft Encrypting File System (EFS)

WHITE PAPER. Securing Process Control Networks

CENTRALLY MANAGED. Access Control

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

Living Requirements Document: Sniffit

Pentests more than just using the proper tools

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 6

Secure Data Exchange Solution

Cross Processor Cache Attacks

Device-Centric Authentication and WebCrypto

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK,

Second year review WP2 overview SW-based Method. Trento - October 17th, 2008

Data Integrity by Aes Algorithm ISSN

CompTIA Network+ (Exam N10-005)

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Security in Near Field Communication (NFC)

Network Security Technology Network Management

Topics in Network Security

Raccoon: Closing Side-Channels through Obfuscated Execution

Secure your Privacy. jrsys, Inc. All rights reserved.

AMI security considerations

FORBIDDEN - Ethical Hacking Workshop Duration

CompuMobile. Technical whitepaper Mobile Encryption. English

Harden SSL/TLS v1.01. Windows hardening tool. Thierry ZOLLER.

The increasing popularity of mobile devices is rapidly changing how and where we

Thierry ZOLLER Principal Security Consultant

Evripidis Paraskevas (ECE Dept. UMD) 04/09/2014

Computer Security. Draft Exam with Answers

SSL Server Rating Guide

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CRYPTAS it-security GmbH

White Paper: Librestream Security Overview

CS Final Exam

Countering the Threat to the Digital Lifestyle

Analyzing the Security Schemes of Various Cloud Storage Services

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

Understand Electronic-Meter Design to Better Craft Intelligent and Secure Systems

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Load Balancing Web Applications

Modeling and verification of security protocols

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Pentests more than just using the proper tools

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

LDA, the new family of Lortu Data Appliances

Document Digital Signature

How To Understand And Understand The Security Of A Key Infrastructure

SCB Access Single Sign-On PC Secure Logon

Applied and Integrated Security. C. Eckert

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security and Privacy in Cloud Computing

Securing Data in the Cloud

Cisco Configuring Secure Shell (SSH) on Cisco IOS Router

IronKey Data Encryption Methods

Digital Signatures on iqmis User Access Request Form

Only 8% of corporate laptop data is actually backed up to corporate servers. Pixius Advantage Outsourcing Managed Services

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Disk Encryption. Aaron Howard IT Security Office

Snow Agent System Pilot Deployment version

High Security Online Backup. A Cyphertite White Paper February, Cloud-Based Backup Storage Threat Models

SNC-VL10P Video Network Camera

Computer System Management: Hosting Servers, Miscellaneous

OBM (Out of Band Management) Overview

SAS Data Set Encryption Options

Secure Way of Storing Data in Cloud Using Third Party Auditor

Lab 7. Answer. Figure 1

Credit Card Fraud The Contactless Generation Kristin Paget

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Loophole+ with Ethical Hacking and Penetration Testing

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

Transcription:

Side Channels: Hardware or Software threat? Job de Haas Riscure

Who am I Job de Haas Principal Security Analyst at Riscure Testing security on: Set-top-boxes, mobile phones, smart cards, payment terminals, ADSL routers, VoIP modems, smart meters, airbag controllers, USB tokens, Before: Pentesting network security (since 1991) Riscure Services: Security Test Lab Product: Side Channel Testing Tools Full range testing: detailed hardware to white-box crypto and obfuscation

Overview Side Channel Attacks, what are they? State of attacks and hardware testing Developments in software testing

Side channel attacks Slice of Life: Pizza Orders Soar in D.C. January 16, 1991 Associated Press SPRINGFIELD, Va. a quick read on the state of world affairs, one need only look at pizza deliveries to the Pentagon, White House and CIA. "The news media doesn't always know when something big is going to happen because they're in bed, but our deliverers are out there at 2 in the morning," said Frank Meeks, owner of the 43 Domino's outlets in the Washington area. Since Jan. 7, late-night deliveries to the Pentagon have increased steadily, from three to 101 Tuesday night, he said. At the White House, 55 pizzas were delivered from 10 p.m. Tuesday to 2 a.m. today. Wikipedia: The initial conflict to expel Iraqi troops from Kuwait began with an aerial bombardment on 17 January 1991

What are side channels? (Physical) phenomena related to a process of interest Time Power consumption Light emission Temperature Sound Electro-Magnetic radiation

Principle of timing analysis Start Decision Process 1 t = 10ms t = 20ms Process 2 End

Power consumption PIN entry Signal leakage from busses, registers, ALUs, etc PIN verification attempts

But is it for real?

Every payment & HDTV decoder chip is tested Configure / Retrieve Commands / data Signal + Trigger

ChipWhisperer Open source project Kickstarter project (331 backers) restricted

What is under attack? Retrieve secrets Reverse engineer Key PIN Unlock code Program flow Crypto protocol Algorithm

What to test? Different industries use certification schemes mandating tests Testing for different channels: Timing variations Power consumption EM emanations Photon emissions But what about software products?

Overview Side Channel Attacks, what are they? History of attacks and hardware testing Developments in software testing

Software side channels Most dominant: Timing Sometimes: Error responses, counting events, etc. 3 example cases Remote web database attack Remote AES key attack RSA attack in the cloud

Case 1: Web Database Attacks Black Hat 2007: Timing Attacks for Recovering Private Entries From Database Engines, Core Security Explores a timing effect on database inserts Is able to determine existing keys in a database Tested under lab conditions

Database index B-tree

Timing effect inserting

Alternative web attacks 2013: Pixel Perfect Timing Attacks with HTML5, Paul Stone On leaking client side information such as cached content 2014: Time Trial Racing Towards Practical Remote Timing Attacks, Daniel A. Mayer, Joel Sandin A tool to investigate remote timing leakages 2015: Web Timing Attacks Made Practical, Timothy D. Morgan, Jason W. Morgan Improving statistical testing of timing differences

Time Trial results

Case 2: AES Cache Timing Attacks 2005: Cache-timing attacks on AES, Daniel J. Bernstein Timing execution of a known implementation with a known key Comparing to timing of the same with an unknown key The key can be broken http://developer.amd.com/

AES http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html

AES SBOX http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html

CPU & Cache Process 1 Process 2 AES key Process 3 Type 1 Type 2 Measure Timing reveals information on table index & key!

Case 3: Cloud attack 2015: Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud Mehmet Sinan Inci, Berk Gulmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar Determine co-location on a cloud server Prime and Probe attack use Last Level Cache (LLC) Recover a 2048 bit RSA key in the Amazon Cloud

Running in the cloud http://blog.trailofbits.com/2015/07/

RSA key break Sliding window Precomputed coefficients Value leaks information on key bits Cache timing reveals coefficients Which entry is cached 4000 encryptions with same data breaks key

Future of software attacks Software security is gaining over hardware security More tools to explore side channels will appear No awareness with developers at the moment 2015 BlackHat Europe Unboxing the White-Box, Practical attacks against Obfuscated Ciphers, Riscure

Conclusion Side channel attacks are often advanced attacks Known to be practical for valuable hardware assets But, many software solutions are vulnerable too Consider if your solutions might be sensitive to these attacks

Contact: Job de Haas dehaas@riscure.com Principal Security Analyst Riscure B.V. Frontier Building, Delftechpark 49 2628 XJ Delft The Netherlands Phone: +31 15 251 40 90 Riscure North America 550 Kearny St. Suite 330 San Francisco, CA 94108 +1 (650) 646 9979 www.riscure.com inforequest@riscure.com