Data remanence in Flash Memory Devices



Similar documents
Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Christian Schindelhauer

Physical Attacks on Tamper Resistance: Progress and Lessons

PUF Physical Unclonable Functions

With respect to the way of data access we can classify memories as:

Tamper resistance and hardware security. Dr Sergei Skorobogatov

RAM & ROM Based Digital Design. ECE 152A Winter 2012

Chapter 9 Semiconductor Memories. Jin-Fu Li Department of Electrical Engineering National Central University Jungli, Taiwan

Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1

Handout 17. by Dr Sheikh Sharif Iqbal. Memory Unit and Read Only Memories

Atmel s Self-Programming Flash Microcontrollers

Semiconductor Memories

AN1837. Non-Volatile Memory Technology Overview By Stephen Ledford Non-Volatile Memory Technology Center Austin, Texas.

Memory. The memory types currently in common usage are:

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

Read-only memory Implementing logic with ROM Programmable logic devices Implementing logic with PLDs Static hazards

On a New Way to Read Data from Memory

Computer Systems Structure Main Memory Organization

1 / 25. CS 137: File Systems. Persistent Solid-State Storage

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

Side Channel Analysis and Embedded Systems Impact and Countermeasures

A N. O N Output/Input-output connection

Secure Hardware PV018 Masaryk University Faculty of Informatics

Homework # 2. Solutions. 4.1 What are the differences among sequential access, direct access, and random access?

8-bit Microcontroller. Application Note. AVR105: Power Efficient High Endurance Parameter Storage in Flash Memory

FLASH TECHNOLOGY DRAM/EPROM. Flash Year Source: Intel/ICE, "Memory 1996"

Memory Basics. SRAM/DRAM Basics

90nm e-page Flash for Machine to Machine Applications

Flash Memories. João Pela (52270), João Santos (55295) December 22, 2008 IST

Hardware Security of Semiconductor Chips: Progress and Lessons. Dr Sergei Skorobogatov

Chapter 5 :: Memory and Logic Arrays

SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper

SLC vs MLC NAND and The Impact of Technology Scaling. White paper CTWP010

ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory

SLC vs MLC: Which is best for high-reliability apps?

NVM memory: A Critical Design Consideration for IoT Applications

Security & Chip Card ICs SLE 44R35S / Mifare

Solid State Technology What s New?

1. Memory technology & Hierarchy

Memory Testing. Memory testing.1

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Low- Cost Chip Microprobing

Chapter 8 Memory Units

Chapter 7 Memory and Programmable Logic

Data Distribution Algorithms for Reliable. Reliable Parallel Storage on Flash Memories

NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY MANUAL Issue Date: 15 December 2014 Revised:

Yaffs NAND Flash Failure Mitigation

File Management Backing up files

W.A.R.N. Passive Biometric ID Card Solution

Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer

Embedded Systems Design Course Applying the mbed microcontroller

Low Power and Reliable SRAM Memory Cell and Array Design

Two Flash Technologies Compared: NOR vs NAND

Unexpected Power Loss Protection

Implementation Of High-k/Metal Gates In High-Volume Manufacturing

Trabajo Memorias flash

2.0 Command and Data Handling Subsystem

SLC vs. MLC: An Analysis of Flash Memory

IEEE Milestone Proposal: Creating the Foundation of the Data Storage Flash Memory Industry

Endurance Models for Cactus Technologies Industrial-Grade Flash Storage Products. White Paper CTWP006

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Allows the user to protect against inadvertent write operations. Device select and address bytes are Acknowledged Data Bytes are not Acknowledged

Tamper resistant devices

Chip Card & Security ICs Mifare NRG SLE 66R35

Main Memory & Backing Store. Main memory backing storage devices

Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

MirrorBit Technology: The Foundation for Value-Added Flash Memory Solutions FLASH FORWARD

Data Retention in MLC NAND Flash Memory: Characterization, Optimization, and Recovery

Nanotechnologies for the Integrated Circuits

Programming Matters. MLC NAND Reliability and Best Practices for Data Retention. Data I/O Corporation. Anthony Ambrose President & CEO

8-Bit Flash Microcontroller for Smart Cards. AT89SCXXXXA Summary. Features. Description. Complete datasheet available under NDA

AN886 APPLICATION NOTE

Smart Automated Conference Room System

Here are my slides from lecture, along with my notes about each slide.

Understanding Memory TYPES OF MEMORY

Chapter 1 Lesson 3 Hardware Elements in the Embedded Systems Chapter-1L03: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

ConnectKey 2.0 WorkCentre 6655i 6655

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

A Flash Storage Technical. and. Economic Primer. and. By Mark May Storage Consultant, By James Green, vexpert Virtualization Consultant

CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices

Features. Instruction. Decoder Control Logic, And Clock Generators. Address Compare amd Write Enable. Protect Register V PP.

Sequential Circuit Design

Evo Laser Firmware Developer s Manual

Flash Memory Jan Genoe KHLim Universitaire Campus, Gebouw B 3590 Diepenbeek Belgium

EXERCISE 3: String Variables and ASCII Code

The modular concept of the MPA-3 system is designed to enable easy accommodation to a huge variety of experimental requirements.

TECHNOLOGY BRIEF. Compaq RAID on a Chip Technology EXECUTIVE SUMMARY CONTENTS

Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way. Åke Ljungqvist, Country Manager Sweden

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Emulated EEPROM Implementation in Dual Flash Architecture on MC9S08LG32 With Demo Description

Technical Note. NOR Flash Cycling Endurance and Data Retention. Introduction. TN-12-30: NOR Flash Cycling Endurance and Data Retention.

Chapter 1 Introduction to The Semiconductor Industry 2005 VLSI TECH. 1

SAN Conceptual and Design Basics

How To Program A Microcontroller With Memory On A Microchip Microcontroller

Features INSTRUCTION DECODER CONTROL LOGIC AND CLOCK GENERATORS COMPARATOR AND WRITE ENABLE EEPROM ARRAY READ/WRITE AMPS 16

Non-Volatile Memory. Non-Volatile Memory & its use in Enterprise Applications. Contents

Transcription:

Data remanence in Flash Memory Devices Sergei Skorobogatov 1

Data remanence Residual representation of data after erasure Magnetic media SRAM and DRAM Low-temperature data remanence Long-term retention effects EEPROM and Flash Should be possible No information available Independent testing was performed 2

Non-volatile memories EEPROM and Flash Widely used in microcontrollers and smartcards Advantages Electrically programmable and erasable Internal charge pumps (no external high voltages necessary) High endurance (>100,000 E/W cycles) Long data retention (>40 years) Disadvantages Larger cell size than Mask ROM Flash erased in blocks Longer write/erase time than SRAM 3

Structure of non-volatile memories UV EPROM EEPROM Flash EEPROM 4

Data remanence in non-volatile memories EPROM, EEPROM and Flash Floating-gate transistors, 10 3 10 5 e -, V TH = 3 4 V Levels of remanence threat File system (erasing a file undelete) File backup (software features) Smart memory (hardware buffers) Memory cell Possible outcomes Circumvention of microcontroller or smartcard security Information leakage through shared EEPROM areas between different applications in smartcards 5

Attacks on EPROM/EEPROM devices Erase with UV light followed by power glitching Memory and password/fuse are erased simultaneously V DD variation or power glitching Read sense circuit: V TH = K V DD, K ~ 0.5 Not suitable for 0.35 m and smaller technologies UV Eras e of PIC12C509 (old revision) 7 6 5 VDD, V 4 3 2 1 0 0 2 4 6 8 10 12 14 Tim e, m in EPROM OK EPROM erased Fuse erased 6

Attacks on EEPROM/Flash devices Electrical erase Memory and password are erased simultaneously Fast process (difficult to control erasure) V TH drops too low (power glitching does not work) Cell charge alteration does not work Voltage monitors and internally stabilized power supply Internal charge pumps and timing control Difficult to terminate the erase/programming cycle Electrical Erase of MSP430F112 4.5 4 3.5 3 VDD, V 2.5 2 1.5 1 0.5 0 0 200 400 600 800 1000 1200 1400 1600 Time, us FLASH OK FLASH erased 7

Experimental part Is it possible to measure a V TH close to 0 V? Is any significant residual charge left after a normal erase operation? Is it possible to distinguish between neverprogrammed and programmed cells? Countermeasures? 8

Experimental part Data remanence evaluation in PIC16F84A 100 V precision power supply 1 s timing control 9

Measuring V TH close to 0 V in PIC16F84A Power glitch to reduce V ref to 0.5 V Exploiting after-erase discharging delay Accidentally discovered 5 years ago Shifts V TH up by 0.6 0.9 V Apply both techniques simultaneously: V TH = K V DD V W V TH = 0.4 2.0 V 10

Test residual charge after erase V TH = V ref = K V DD V W, K = 0.5, V W = 0.7 V Memory bulk erase cycles (5 V, 10 ms) Flash memory, 100 cycles: V TH = 100 mv EEPROM memory, 10 cycles: V TH = 1 mv Threshold Voltage Change During Erase Cycles 0.6 0.5 0.4 V TH, V 0.3 0.2 0.1 0 0 100 200 300 400 500 600 Number of Erase Cycles Programmed Fully erased 11

Recovering data from erased PIC16F84A Large difference in V TH between cells in the array Measure the cell s V TH before and after an extra erase cycle Threshold Voltage Distribution 0.6 0.55 V TH, V 0.5 0.45 0.4 0.35 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Memory Address First erase Second erase 12

Never-programmed and programmed cells PIC16F84A comes programmed to all 0 s 10,000 erase cycles to fully discharge cells. Measure V TH Program to all 0 s, then another 10,000 erase cycles. Measure V TH Still noticeable change of V TH = 40 mv Threshold Voltage Distribution 0.15 0.1 V TH, V 0.05 0-0.05 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27-0.1 Memory Address Programmed and erased Never programmed 13

Programming cells before erasure Cannot successfully recover information from PIC16F84A if it was programmed to all 0 s before the erase operation This is a standard procedure in some Flash and EEPROM devices: Intel ETOX Flash memory (P28F010) Microchip KeeLoq HCS200 Not used in modern EEPROM/Flash memory devices 14

Other ways of data remanence testing Semi-invasive approach (access to passivation layer) Measure changes inside memory transistors Influence on cell characteristics (V TH ) Influence on read-sense circuit (V ref ) Invasive approach (access through passivation layer) Modify the read-sense circuit of the memory Direct connection to internal memory lines 15

Semi-invasive testing Test setup Focusing the laser (100x objective) 16

Semi-invasive testing Images of the PIC16F84A EEPROM (0.9 m, 2M) Change V ref = f(p L ) to measure V TH Optical Laser scanned (OBIC) 17

Semi-invasive testing Images of the ATmega8 EEPROM (0.35 m, 3M) Optical Optical after deprocessing Laser scanned (OBIC) 18

Semi-invasive testing Focus a laser on the ATmega8 die using a 100x objective in order to change V ref Less successful (<10% after one erase cycle) due to multiple metal layers and polished insulation layers 19

Countermeasures Cycle EEPROM/Flash 10 100 times with new random data before writing sensitive information to them Program (charge) all EEPROM/Flash cells before erasing them Remember about intelligent memories, backup and temporary files in file systems Remember that memory devices are identical within the same family: everything which is valid for PIC16F84A will work for PIC16F627/628, PIC16F870/871/872 and PIC16F873/874/876/877 Use latest high-density devices, as smaller scales make semiinvasive attacks less feasible Cryptography can help to make data recovery more difficult. E.g. store longer pre-key R instead of key: K=h(R) 20

Conclusions Floating-gate memories (EPROM, EEPROM and Flash) have data-remanence problems Information from some samples can be recovered even after 100 erase cycles Even where the residual charge cannot yet be detected with existing methods, future technologies may permit this Secure devices should be tested for dataremanence effects 21