Automatized Fault Attack Emulation for Penetration Testing



Similar documents
Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001

ON SUITABILITY OF FPGA BASED EVOLVABLE HARDWARE SYSTEMS TO INTEGRATE RECONFIGURABLE CIRCUITS WITH HOST PROCESSING UNIT

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Smartcard IC Platform Protection Profile

Eli Levi Eli Levi holds B.Sc.EE from the Technion.Working as field application engineer for Systematics, Specializing in HDL design with MATLAB and

On Security Evaluation Testing

International Workshop on Field Programmable Logic and Applications, FPL '99

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography

Design of Remote Laboratory dedicated to E2LP board for e-learning courses.

2. TEACHING ENVIRONMENT AND MOTIVATION

Offline HW/SW Authentication for Reconfigurable Platforms

7a. System-on-chip design and prototyping platforms

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Paolo Maistri. September 8, Personal Information 2. Education and Studies 2. Academic Activities and Affiliations 3

Algorithmic Skeletons for the Design of Partially Reconfigurable Systems

Solutions for Increasing the Number of PC Parallel Port Control and Selecting Lines

High-Level Synthesis for FPGA Designs

How To Design An Image Processing System On A Chip

Security IC Platform Protection Profile

BSc in Computer Engineering, University of Cyprus

Hardware Task Scheduling and Placement in Operating Systems for Dynamically Reconfigurable SoC

NIST Cybersecurity Framework Manufacturing Implementation

PUF Physical Unclonable Functions

Reconfig'09 Cancun, Mexico

Hardware in the Loop (HIL) Testing VU 2.0, , WS 2008/09

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

FPGA area allocation for parallel C applications

Joint Interpretation Library

MsC in Advanced Electronics Systems Engineering

How To Fix A 3 Bit Error In Data From A Data Point To A Bit Code (Data Point) With A Power Source (Data Source) And A Power Cell (Power Source)

Pulse Secure, LLC. January 9, 2015

Extending the Power of FPGAs. Salil Raje, Xilinx

An On-chip Security Monitoring Solution For System Clock For Low Cost Devices

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Embedded Java & Secure Element for high security in IoT systems

Seeking Opportunities for Hardware Acceleration in Big Data Analytics

Networking Virtualization Using FPGAs

Horst Görtz Institute for IT-Security

Open Flow Controller and Switch Datasheet

ReCoSoC'11 Montpellier, France. Implementation Scenario for Teaching Partial Reconfiguration of FPGA

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Introduction to Embedded Systems. Software Update Problem

ARM Webinar series. ARM Based SoC. Abey Thomas

Extended Boundary Scan Test breaching the analog ban. Marcel Swinnen, teamleader test engineering

Virtual Platforms Addressing challenges in telecom product development

FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING

An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths

FSMD and Gezel. Jan Madsen

Testing of Digital System-on- Chip (SoC)

Implementation of emulated digital CNN-UM architecture on programmable logic devices and its applications

Cryptography & Network-Security: Implementations in Hardware

OF 1.3 Testing and Challenges

International Journal of Advancements in Research & Technology, Volume 2, Issue3, March ISSN

Networking Remote-Controlled Moving Image Monitoring System

Performance Oriented Management System for Reconfigurable Network Appliances

How To Write An Fpa Programmable Gate Array

Testing & Verification of Digital Circuits ECE/CS 5745/6745. Hardware Verification using Symbolic Computation

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

Secure Portable Data Server. 25/06/2012 Alexei Troussov SMIS team INRIA Rocquencourt

Developing reliable Multi-Core Embedded-Systems with NI Linux Real-Time

Design of a High Speed Communications Link Using Field Programmable Gate Arrays

Network Attack Platform

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

Secured Embedded Many-Core Accelerator for Big Data Processing

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

OpenSPARC Program. David Weaver Principal Engineer, UltraSPARC Architecture Principal OpenSPARC Evangelist Sun Microsystems, Inc.

Industrial Control Systems Security Guide

Hardware Security Modules for Protecting Embedded Systems

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Product Development Flow Including Model- Based Design and System-Level Functional Verification

Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic

FPGA Music Project. Matthew R. Guthaus. Department of Computer Engineering, University of California Santa Cruz

Introducing etoken. What is etoken?

An Architecture for Secure Software Defined Radio

Fondamenti su strumenti di sviluppo per microcontrollori PIC

Digital Systems Design! Lecture 1 - Introduction!!

Aims and Objectives. E 3.05 Digital System Design. Course Syllabus. Course Syllabus (1) Programmable Logic

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

Reviving smart card analysis

A First Course in Digital Design Using VHDL and Programmable Logic

Hardware Trojans Detection Methods Julien FRANCQ

Echtzeittesten mit MathWorks leicht gemacht Simulink Real-Time Tobias Kuschmider Applikationsingenieur

The Design of Hardware for Remote Control System of the Manipulator

Introduction to Digital System Design

Embedded Trusted Computing on ARM-based systems

Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition

A Reconfigurable RTOS with HW/SW Co-scheduling for SOPC

Transcription:

Automatized Fault Attack Emulation for Penetration Testing Johannes Grinschgl 1, Thomas Aichinger 3, Armin Krieg 1, Christian Steger 1, Reinhold Weiss 1, Holger Bock 2, Josef Haid 2 1, Graz University of Technology, Austria 2 Infineon Technologies Austria AG, Design Center Graz, Austria 3 Austria Card GmbH, Austria 12th International Common Criteria Conference Kuala Lumpur, Malaysia, September 29, 2011 1

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 2

Motivation (1/3) Increasing complexity of SoC More-than-Moore [Arden2010] Increasing test duration Increasing security and dependability requirements High costs Loss of trust Loss of life SOC Consumer Portable Design Complexity Trends (Source: ITRS - 2010 Update, "System Drivers ) Increasing number of known fault attacks Increasing knowledge of attackers Better attack tools Cheaper analysis equipment 3

Motivation (2/3) Common criteria certification Time consuming Expensive Penetration tests very late in development phase Fault detection during certification Longer time to market Reevaluation Test coverage of penetration tests? Efficiency evaluation of new security features 4

Motivation (3/3) How to solve this problem? Target: Reduction of deficits during design phase Early evaluation of security features Support of very large test pattern sets Open sample evaluation support SW test without HW security features (HW test without SW security features) Solution: Automatized Fault Attack Emulation 5

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 6

Introduction (1/2) Emulation Mapping of smart card functionality to FPGA Emulation resembles very accurately the behavior of the final device Extendibility in respect to fault emulation Real-time emulation performance On-line debugging On-line register and memory examination Standard SW development tool Easy-to-use Rapid FPGA Prototyping Platform, Tanto2-FPGA system, http://www.hitex.com 7

Introduction (2/2) POWER-MODES 1 vision: Flexible and Fast Fault Emulator Whole system evaluation for fault attack vulnerability Software Hardware Operating system Saboteur-based attack method Automatized VHDL code base adaptation Automatized result evaluation Austria Card ACOS operating system 1 POWer EmulatoR and MOdel based DEpendability and Security evaluation platform, funded by the Austrian Federal Ministry for Transport, Innovation, and Technology under the FIT-IT contract FFG 825749. Project Partners: Infineon Technologies Austria AG and Austria Card 8

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 9

Related Work (1/2) Fault injection mechanisms Simulation [Jenn1994, Velanzco2001, Rothbart2004] Slow Flexible Physical test [Karlsson1995] Late in design phase Expensive Emulation [Bayar2008, Kenterlis2006, Kafka2008, Sterpone2007, Sonza2006, Baraza2005, Leveugle2000] Fast Low-cost compared to physical tests Compromise between cost and flexibility Early in design phase 10

Related Work (2/2) Fault emulation methods Partial reconfiguration [Bayar2008, Kenterlis2006, Kafka2008, Sterpone2007, Sonza2006] Runtime adaptation of LUTs Requires specialized FPGA devices Mutants VHDL modification to modules [Baraza2005, Leveugle2000] Requires pre-modified modules for every fault scenario Saboteur VHDL modification into signal lines [Baraza2005, Leveugle2000] Very flexible if supported by automatized placement Common Criteria Certification Process [JIL2009], [CCEVS2005] 11

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 12

Autom. Fault Attack Emulation (1/5) Host PC Fault injection flow control Attack Database Storage of different attack scenarios Fault injection controller Saboteur Management Saboteurs Single-bit type Bus type Port type Saboteur interface Saboteur <-> FI controller connection 13

Autom. Fault Attack Emulation (2/5) What are saboteurs? Modules which can disturb signals Placed between signal source and sink Advantages Definable detailed attack Full control over the signal Flexibility Applicable to Security and Dependability Evaluations Attack patterns Specification of fault location Mapping of physical to logical location 14

Autom. Fault Attack Emulation (3/5) Fault emulation initialization Attack time Attack type Memory address Attack scenario Result evaluation Output Memory Report generation Repeat until all addresses and points in time are tested 15

Autom. Fault Attack Emulation (4/5) Attack on security relevant regions Memory regions Time Calculation example Some 100 Addresses 20-50ms for one command ~1ms is interesting ~1M Attack Scenarios 1sec per attack 11,6 Days Long time tests Attack granularity refinement Information gain for real-chip testing 16

Autom. Fault Attack Emulation (5/5) Power emulation [Bachmann2010] Automatized control signal extraction Control signal weighting Accumulation Characterization using gate level simulations and physical tests Information extraction from the power profile Emulate power information available to attacker Average error below 10% Power [normalized] 1 Equipment 0.8 0.6 0.4 0.2 P estimated = c * x[ t] 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Time [normalized] [Genser2009] i i Reference Estimated 17

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 18

Impact on Certification Flow (1/3) Impact on smart card embedded SW development SW evaluation without activated HW security features Evaluation of SW security implementation Automated verification of SW countermeasure implementation and test replication using HW with enabled security features Testing of security relevant code is difficult (practical experience) Coding guideline verification E.g. SW handling of memory manipulations E.g. Detection of program counter manipulations Replicable penetration test 19

Impact on Certification Flow (2/3) Impact on certification (penetration tests) Advantages for the lab Gain information for physical attacks Attack time Attack region (RAM, Core, ) No blocking of expensive laboratory equipment Enabling of parallel test scenarios Certain HW security features can be deactivated 20

Impact on Certification Flow (3/3) Use the emulator as open sample/ sample with known secrets Freely configurable hardware Internal values can be read out and manipulated Registers Memory Program counter Hardware security features can be deactivated Memory encryption Fault detection mechanisms Manipulation of critical signals Fault detection mechanisms Crypto calculation Freely definable software load Debugging is possible Get memory location of critical code 21

Agenda Motivation Introduction Related work Automatized Fault Attack Emulation Impact on Certification Flow Conclusion 22

Conclusion (1/3) SW development view Test security features Verification of coding guideline Allow to debug SW Open sample approach Specific deactivation of HW security features Allow to test SW on the HW Allow to manipulate HW features Run-time power estimation Extract interesting time slots E.g. Cryptographic calculations 23

Conclusion (2/3) Provide information for real chip certification Attack time Attack region RAM, Core, Crypto, Speed-up of security evaluation Simple tests can already be performed during SW development Provide information for the real tests Test counter measures Detailed attack result evaluation by memory analysis Enabling of complex fault attack scenarios 24

Conclusion (3/3) Future Work More detailed result evaluation Multiple FPGA configurations for parallel emulation Automatic increase of test granularity at critical regions 25

Q&A Thanks for your attention! Questions? 26

References [Arden2010] [Jenn1994] [Velanzco2001] [Rothbart2004] [Karlsson1995] [Bayar2008] [Kenterlis2006] [Kafka2008] [Sterpone2007] [Sonza2006] [Baraza2005] [Leveugle2000] [Grinschgl2011] [Pohl2010] [Pellegrini2010] [Bachmann2010] [Genser2009] [JIL2009] [CCEVS2005] W. Arden, M. Brillouët, P. Cogez, M. Graef, B. Huizing, R. Mahnkopf: More-than-Moore, ITRS 2010. E. Jenn, J. Arlat, M. Rimen, J. Ohlsson, and J. Karlsson, Fault injection into vhdl models: the mefisto tool, in Proc. Twenty-Fourth Int Fault-Tolerant Computing FTCS-24. Digest of Papers. Symp, 1994, pp. 66 75. R. Velazco, R. Leveugle, and O. Calvo, Upset-like fault injection in vhdl descriptions: A method and preliminary results, in Proc. IEEE Int Defect and Fault Tolerance in VLSI Systems Symp, 2001, pp. 259 267. K. Rothbart, U. Neffe, C. Steger, R. Weiss, E. Rieger, and A. Muehlberger, High level fault injection for attack simulation in smart cards, in Proc. 13th Asian Test Symp, 2004, pp. 118 121. J. Karlsson and P. Folkesson, Application of three physical fault injection techniques to the experimental assessment of the mars architecture. IEEE Computer Society Press, 1995, pp. 267 287. S. Bayar and A. Yurdakul, Self-reconfiguration on spartan-iii fpgas with compressed partial bitstreams via a parallel configuration access port (cpcap) core, in Proc. Ph.D. Research in Microelectronics and Electronics PRIME 2008, 2008, pp. 137 140. P. Kenterlis, N. Kranitis, A. Paschalis, D. Gizopoulos, and M. Psarakis, A low-cost seu fault emulation platform for sram-based fpgas, in Proc. 12th IEEE Int. On-Line Testing Symp. IOLTS 2006, 2006. L. Kafka, Analysis of applicability of partial runtime reconfiguration in fault emulator in xilinx fpgas, in DDECS 08: Proceedings of the 2008 11th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems. Washington, DC, USA: IEEE Computer Society, 2008, pp. 1 4. L. Sterpone and M. Violante, A new partial reconfiguration-based fault-injection system to evaluate seu effects in sram-based fpgas, Nuclear Science, IEEE Transactions on, vol. 54, no. 4, pp. 965 970, 2007. M. Sonza Reorda, L. Sterpone, M. Violante, M. Portela-Garcia, C. Lopez-Ongil, and L. Entrena, Fault injection-based reliability evaluation of sopcs, in Proc. Eleventh IEEE European Test Symp. ETS 06, 2006, pp. 75 82. J. C. Baraza, J. Gracia, D. Gil, and P. J. Gil, Improvement of fault injection techniques based on vhdl code modification, in Proc. Tenth IEEE Int. High-Level Design Validation and Test Workshop, 2005, pp. 19 26. R. Leveugle, Fault injection in vhdl descriptions and emulation, in Proc. IEEE Int Defect and Fault Tolerance in VLSI Systems Symp, 2000, pp. 414 419. J. Grinschgl, A. Krieg, C. Steger, R. Weiss, H. Bock, and J. Haid, Modular fault injector for multiple fault dependability and security evaluations, in DSD 2011, In Press. C. Pohl, R. Fuest, and M. Porrmann, vmagic automatic code generation for vhdl, newsletter edacentrum, vol. 2, pp. 7 10, Jul. 2010. A. Pellegrini, V. Bertacco, and T. Austin, Fault-based attack of rsa authentication, in Proc. Design, Automation & Test in Europe Conf. & Exhibition (DATE), 2010, pp. 855 860. C. Bachmann, A. Genser, C. Steger, R. Weiss, and J. Haid, Automated Power Characterization for Run-Time Power Emulation of SoC Designs, in DSD 2010, 2010, pp. 587 594. A. Genser, C. Bachmann, J. Haid, C. Steger, and R. Weiss, An emulation-based real-time power profiling unit for embedded software, in SAMOS 2009, 2009, pp. 67 73. Joint Interpretation Library, Application of Attack Potential to Smartcards,, 2009,online available on https://www.bsi.bund.de National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme, Common Criteria Evaluation and Validation Scheme Validation Report, 2005, online available onhttp://www.commoncriteriaportal.org/files/epfiles/st_vid10023-vr.pdf 27