Smart Secure Devices & Embedded Operating Systems



Similar documents
Relations entre XLIM Université de Limoges et ISG-SCC Royal Holloway, University of London

Security testing of hardware product

Security testing for hardware product : the security evaluations practice

What is a Smart Card?

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Curriculum Vitae. Claude Barral Baccalaureat (E-level) : Mathematics and Technologies Lycée polyvalent Antonin Artaud, Marseille, France

PUF Physical Unclonable Functions

Java Card. Smartcards. Demos. . p.1/30

Mobile Cloud Computing

Embedded Java & Secure Element for high security in IoT systems

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

JCAT. Java Card TM. An environment for attack and test on. Serge Chaumette, Iban Hatchondo, Damien Sauveron CCCT 03 & ISAS 03

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

Oberthur Technologies. A Technology Leader

Chapter 1: Introduction

A Secure Autonomous Document Architecture for Enterprise Digital Right Management

Study of Java Card and its Application 1 Nainesh Rawani, 2 Akhil Patel

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Smart cards integration in Distributed Information Systems : the Interactive execution model

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

EIT ICT Labs MASTER SCHOOL DSS Programme Specialisations

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Sun Management Center Change Manager Release Notes

Vincent Cheval. Curriculum Vitae. Research

Secure Hardware PV018 Masaryk University Faculty of Informatics

Chytré karty opět o rok dál...

Horst Görtz Institute for IT-Security

Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11

CryptoFirewall Technology Introduction

Laboratoryof Electronics, Antennas and Telecommunications (UMR 7248)

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

Payment and Identification Secure solutions

Proposition d intervention

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Cryptography & Network-Security: Implementations in Hardware

Security in ST : From Company to Products

EIT ICT Labs Information & Communication Technology Labs

Smart Card Technology Capabilities

Designing and Coding Secure Systems

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

e-code Academy Information Security Diploma Training Discerption

Linux A multi-purpose executive support for civil avionics applications?

PRIME IDENTITY MANAGEMENT CORE

Grid Computing Perspectives for IBM

A web-based multilingual help desk

Spécication et analyse formelle des politiques de sécurité dans le cloud computing

Stochastic control for underwater optimal trajectories CQFD & DCNS. Inria Bordeaux Sud Ouest & University of Bordeaux France

Center of Academic Excellence Cyber Operations Program 2013 Application

Banking. Extending Value to Customers. KONA Banking product matrix. is leading the next generation of payment solutions.

Welcome to cryptovision. cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com

CMP. A dynamic link between research and industry. Center of Microelectronics in Provence - Georges Charpak Campus.

GIS - AllianSTIC. Director : Prof. Dan Istrate (dan.istrate@esigetel.fr) Katarzyna Węgrzyn-Wolska, AllianSTIC. Page 1

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

System Requirements Orion

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Protection of Components based on a Smart Card Enhanced Security Module

A Generic Framework to Enhance Two- Factor Authentication in Cryptographic Smart-card Applications

Significance of Tokenization in Promoting Cloud Based Secure Elements

Threat Model for Software Reconfigurable Communications Systems

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Malicious Code on Java Card Smartcards: Attacks and Countermeasures

User Authentication Platform using Provisioning in Cloud Computing Environment

White Paper. Options for Two Factor Authentication. Authors: Andrew Kemshall Phil Underwood. Date: July 2007

IoT Security Concerns and Renesas Synergy Solutions

Installation troubleshooting guide

On Security Evaluation Testing

SoCLib : Une plate-forme de prototypage virtuel pour systèmes multi-processeurs intégrés sur puce

Soitec. Eric Guiot, Manager R&D Soitec. 7 mars 2011 JSIam 2011

A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

Open Simulation Architecture : Ongoing Works and Perspectives

Laboratoire d Informatique de Paris Nord, Institut Galilée, Université. 99 avenue Jean-Baptiste Clément, Villetaneuse, France.

Entrust Smartcard & USB Authentication

RAPPORT FINANCIER ANNUEL PORTANT SUR LES COMPTES 2014

Trusted Platforms for Homeland Security

Advances in Smartcard Security

Introducing etoken. What is etoken?

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

Research Topics on Information-Centric Networking: Caching, Routing and Virtualization

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Evaluation of Digital Signature Process

Investor and Analyst Call

Transcription:

Smart Secure Devices & Embedded Operating Systems Contact: pierre.dusart@unilim.fr Team: XLIM/DMI/SSD Limoges/FRANCE

Technology involved ibutton USB token Contactless Prices of these objects: less than 20 $

Applying Domains Telecom Banking industry Health Pay TV Access control Electronic services (signature, electoral vote) Identity Card / Biometric Passport

Various themes Improve the security of small devices Attacks on smartcards Hardware/software countermeasures Audit or security evaluation methods Improve the global security External or internal use of secure parts (TPM) New cryptographic algorithms or secure implementation of approved ones

French Community (French Academic Teams) Modular Operating System INRIA team: Pops (Lille), new operating system for smart cards Sarde (Grenoble), dynamic reconfiguration capacity (Think kernel) ACES (Rennes) (ubiquitous computing OS) Oralement: trois équipes qui s'intéressent à des aspects isolés (reconfiguration, mobilité,...) sans prendre en compte l'aspect sécurité dans tous ses aspects. Security Everest (INRIA Sophia) security for dynamic upload of kernel components based on the Necula paradigm, (collaboration with Gemplus) Lande (IRISA Rennes) static analysis techniques for security properties (applied to Java Card application) LRI (Orsay) work on the security of pc based architecture and the relationship with TPM modules. Everest est membre du laboratoire Microsoft sur la sécurité du logiciel. Travail assez proche de Rustan Leino sur spec#. Lande a appliqué ses techniques d'analyse statique sur les applications carte avec de bons résultats. Attacks Prism team Crypto (St Quentin) several thesis on fault attaks on crypto algorithms in collaboration with OCS and Gemalto EMSE-CEA (Ecole des Mines de St Etienne) fault attacks, post doc in collaboration with gemalto. Labri (O. Ly): Automata, Automatic Integration of Counter-Measures Principalement le savoir faire est entre les mains des industriels qui se sont intéressés très tôt à cette problématique.

Our specificity Security of operating systems (through a security module like smartcard, Trusted Platform Module) Tools for Evaluation and Audit of Virtual Machine Embedded cryptography Works with Physicians/Electronics engineers (SeFSI Project) Hardware Design (Random Number Generator, Filtered LFSR) Antenna Design (for EMA)

Attacks on SmartCards Power analysis: measurement of the consumption current to look into a cryptographic process You can recover implementation parts or cryptographic keys

Embedded Cryptography Some attacks are specific: Best theoric attack on D.E.S Cryptographic algorithm: 2^43 ciphertexts needed Deep Crack: recover a DES-key in less than 1 day Concrete attack on hardware device: less than 3 hours (by DFA or DPA) Depend on hardware, implementation,

External attacks: Fault Injection on Hardware Device Glitches on power supply Frequency Change Radiations (Laser, X-Ray, Flash) Circuit cutting, probing Goal: false computations, differential methods to recover key

Hardware views of a SmartCard Many parts and levels

Acute Cutting with FIB

Probing and Antenna

Example: Fault on RSA-CRT We know the correct signature s of a message m computed by RSA-CRT. One fault is injected during the p-modular exponentiation. We obtain a erroneous signature s. We have s =a s p + b s q Hence s = s mod q but s s mod p Now gcd(s-s,n) = gcd(a(s p -s p ),n) = q We find q then p, the two prime factors of n.

Inside Attacks Multi-applicative systems (Java Card) We can dynamically upload applications on modern hardware (with virtual machine) Corrupted Application tries to access to private elements like a virus and passes through the firewall

Our competences Secure the load process of new applications Complete control of Access Rights of applications Automatic tests and static analysis of system security to security level evaluation Study new problems with hot swapping/plugin devices like memory atomicity Tamperproof execution: ensure the complete execution of a program to be without faults on sensitive data.

Projects In progress SARAH (Delay-Tolerant Distributed Services for Mobile Ad Hoc Networks) funded by the french ANR (National Agency for the Research) LaBRI, LITIS, VALORIA and XLIM Mobile Java Card Grid selected by gemalto in the SIMagine contest LaBRI, Royal Holloway, University of London and XLIM Future/Pending MECANOS (Methodology for the applications of the future secure object) Trusted Labs, Trusted Logic, Gemalto, Oberthur Card Systems, Soliatis, IdConcept, Eurécom, XLIM

Main Academic Partnerships LaBRI, UMR Université Bordeaux 1/CNRS 5800 one of the largest academic group of research in computer science in France. Information Security Group of the Royal Holloway, University of London one of the largest academic security groups in the world. It brings together in a single institution expertise in education, research and practice in the field of information security. TEI of Athens Existing student exchanges, licensing of our Master and research collaboration (PhD co-supervisions, papers coauthoring, etc.)

Main Industrial Partnerships Gemalto a world leader in digital security hey range from the development of software applications through the design and production of secure personal devices such as smart cards, SIMs, e-passports and tokens to the deployment of managed services for our customers. More than one billion people worldwide use our products and services for telecommunications, financial services, e-government, identity management, multimedia content, digital rights management, IT security, mass transit and many other applications. Trusted Labs & Trusted Logic Security of embedded systems (identification, banking and mobile telephony), Common Criteria, Evaluation of embedded systems Thales Security In security markets, Thales leverages advanced technologies and risk management methodologies very similar to those required on defence programmes. The company integrates security solutions for critical applications and supplies a range of security products, including cryptographic devices and payment terminals.

Involvement in events Past events Organization of WISTP'2007 (Heraklion, Greece) IFIP, IEEE, ACM CrispTelecom, Eurosmart, GlobalPlatform, Nokia, Vodafone 70 attendees 68 submissions and 21 acceptances PC of SECRYPT2007, IAS2007,... Future events Organization of WISTP'2008 (13-16 May 2008, Sevilla, Spain) PC of Cardis 2008 (September 2008, London, UK)

Our inquiries / expectations More relationships between universities and/or collegues Students exchanges Security feeling: are the security objectives the same than in France?