Hardware Trojans Detection Methods Julien FRANCQ



Similar documents
Hardware Trojans: A Threat for CyberSecurity

Microsemi Security Center of Excellence

CHASE Survey on 6 Most Important Topics in Hardware Security

Side Channel Analysis and Embedded Systems Impact and Countermeasures

PFP Technology White Paper

Horst Görtz Institute for IT-Security

KEEP IT SYNPLE STUPID

Understanding Integrated Circuit Security Threats. Asif Iqbal Senior Program Manager, Apple Inc. SDM 11

Implementing Program Protection and Cybersecurity

Testing Low Power Designs with Power-Aware Test Manage Manufacturing Test Power Issues with DFTMAX and TetraMAX

Computer Security DD2395

What is a Smart Card?

Problems of Security in Ad Hoc Sensor Network

Introduction to Digital System Design

Hardware Security Modules for Protecting Embedded Systems

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

PUF Physical Unclonable Functions

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Section 12 MUST BE COMPLETED BY: 4/22

Security IC Platform Protection Profile

Attachment A. Identification of Risks/Cybersecurity Governance

Secure application programming in the presence of side channel attacks. Marc Witteman & Harko Robroch Riscure 04/09/08 Session Code: RR-203

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity

Agenda. Michele Taliercio, Il circuito Integrato, Novembre 2001

Software Hardware Binding with Quiddikey

PUBLIC REPORT. Red Team Testing of the ES&S Unity Voting System. Freeman Craft McGregor Group (FCMG) Red Team

Cisco Trust Anchor Technologies

CryptoFirewall Technology Introduction

Developing Secure Software in the Age of Advanced Persistent Threats

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

What is a System on a Chip?

Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

Testing of Digital System-on- Chip (SoC)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Advancing Cyber Security Using System Dynamics Simulation Modeling for System Resilience, Patching, and Software Development

Smart Card Security How Can We Be So Sure?

OCIE CYBERSECURITY INITIATIVE

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

The Reduced Address Space (RAS) for Application Memory Authentication

Implementation Details

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Covert Operations: Kill Chain Actions using Security Analytics

A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

An On-chip Security Monitoring Solution For System Clock For Low Cost Devices

Joint Interpretation Library

Reviving smart card analysis

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Persistence Mechanisms as Indicators of Compromise

On Security Evaluation Testing

Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu

Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Cryptographic Rights Management of FPGA Intellectual Property Cores

Seven Strategies to Defend ICSs

Enterprise Cybersecurity: Building an Effective Defense

Transaction Anomaly Protection Stopping Malware At The Door. White Paper

Power Reduction Techniques in the SoC Clock Network. Clock Power

How To Protect A Web Application From Attack From A Trusted Environment

Database and Data Mining Security

SENSE Security overview 2014

Security testing of hardware product

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

10 Gbps Line Speed Programmable Hardware for Open Source Network Applications*

Extended Boundary Scan Test breaching the analog ban. Marcel Swinnen, teamleader test engineering

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Physical Security: Status and Outlook

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

UNCLASSIFIED Version 1.0 May 2012

Security in ST : From Company to Products

Defending Against Data Beaches: Internal Controls for Cybersecurity

Rapid System Prototyping with FPGAs

WEB ATTACKS AND COUNTERMEASURES

The Web AppSec How-to: The Defenders Toolbox

Enterprise Application Security Workshop Series

Secure Hardware PV018 Masaryk University Faculty of Informatics

IC-EMC Simulation of Electromagnetic Compatibility of Integrated Circuits

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

An Innovative Two Factor Authentication Method: The QRLogin System

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Security Threats on National Defense ICT based on IoT

Fighting Off an Advanced Persistent Threat & Defending Infrastructure and Data. Dave Shackleford February, 2012

Transcription:

DEFENDING WORLD SECURITY Hardware Trojans Detection Methods Julien FRANCQ 2013, December the 12th

Outline c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 2 / 40

Section Presentation Presentation c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 3 / 40

HINT Project Profile Presentation HINT = Holistic Approaches for Integrity of ICT-Systems Project Number: 317930 Project website: www.hint-project.eu Project start: October 1, 2012 Project duration: 3 years Total Costs: e5.103.893 EC-Contribution: e3.350.000 Project is co-financed by the European Commission under Seventh Framework Programme c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 4 / 40

Missions Presentation Development of a common framework for system integrity checking Use developed technologies on real-time applications Prepare adoption by future security evaluation schemes c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 5 / 40

Motivation Presentation Authenticity and integrity of hardware components in modern ICT systems Security challenged by improving attacks Recent trends: Counterfeiting of hardware components Hardware Trojans : Hidden functions in Integrated Circuits HINT proposal: Novel technologies to support assurance of genuineness and integrity c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 6 / 40

Technical Approach Presentation Holistic Integrity Checking for Components in ICT-Systems c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 7 / 40

Objectives Presentation Main objective: Improve security of architectures and platforms based on tamper-resistant integrated circuits Development of methods to: Perform at-time-of-use integrated checking of the global integrity of a system for hardware and embedded software Check the genuineness of the secure integrated circuits by detecting functional clones or counterfeited circuits Detect the presence of Hardware Trojans Main technologies used: Physically Unclonable Functions, enabling to authenticate a hardware component using a physical, intrinsic and unique property of the device Side Channel based analysis to monitor the behaviour of hardware components and to detect changes from their original specifications and implementations c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 8 / 40

Section Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 9 / 40

Hardware Trojan (HT) Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects Malicious modifications of an Integrated Circuit (IC) during its design flow c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 10 / 40

Context Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects Outsourcing of the fabrication of the ICs Difficult to ensure the trust in all the steps of the design flow Trusted Intentional mistakes Idea Specification Malicious IP-Cores Malicous Design Tampering Files Design (HDL) Synthesis IP Cores Manipulated Tools Mapping FPGA Place & Route ASIC Tampering Files Manipulation While Loading Config File Loader Tampering Files Hardware Layout Production Manipulate Design Process Backdoors FPGA ASIC Attack IC Malicious External Components Board IC c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 11 / 40

HTs in Practice Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects 2005: US Department of Defense 2007: DARPA Trust in IC Program 2009: Hot Topic of CHES conference After 2009: other conferences (DATE, HOST, CARDIS, ReConFig, etc.) [Skorobogatov et al.: Breaktrough Silicon Scanning Discovers Backdoor in Military Chip, CHES 2012] [Becker et al.: Stealthy Dopant-Level Hardware Trojans, CHES 2013] 2 research projects: HINT (European funded) and HOMERE (French funded) HTs: real and emerging threat c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 12 / 40

Possible Payloads Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects Kill switch Fighters Dysfonctional circuit Satellite which works only 6 months Secret information leakage Ciphered communications Help a malware by providing a backdoor Privilege escalation, automatic login, password theft Prevent from going to sleep mode Autonomy etc. c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 13 / 40

Section c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 14 / 40

Taxonomy: tree where each branch defines a different property In the ideal case, a specific HT must be on only one leaf of the tree Benefits of the taxonomy Systematic study of their characteristics Specific detection methods for each HT class Benchmark circuits for each class Best existing taxonomy: Trust-Hub c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 15 / 40

Trust-Hub Taxonomy c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 16 / 40

Factoring the Taxonomy 4 (effects) 5 (locations) 5 (insertion phases) 6 (abstraction levels) 5 (activation mechanisms) = 3000 different HTs! Very rich taxonomy! Impossible to implement them all, and then detect them Factoring this taxonomy Total: 100 HTs c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 17 / 40

Section c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 18 / 40

Presentation Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 19 / 40

HT Protection Post Production Detection Prevention Destructive Non-Destructive Supportive Design Secure Design Trusted Production Optical Run-Time Test-Time Side Channel Analysis Logic Testing No method is 100% successfull! c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 20 / 40

Detect HTs? Not so easy... 1 Systems on Chip are more and more complex, and detecting a small malicious modification is difficult 2 Reverse-engineering inspection is costly and difficult No guarantee that the remaining ICs are HT-free 3 By nature, HTs are designed to be stealthy Not easily detectable with conventional logic testing 4 By nature, HTs are small to be not easily detected by optical analysis Difficult to detect them with side-channel (power consumption, electromagnetic radiations, etc.) analysis c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 21 / 40

Presentation Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 22 / 40

Test Generation (1/2) Conventional logic testing cannot be used to reliably detect HT Manufacturing defects (stuck-at-faults) HT effects Difficult to trigger a HT Time-bombs Some HTs have no impact on functional outputs (Trojan Side-Channels) Vast spectrum of possible HTs c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 23 / 40

Test Generation (2/2) HTs are on low controllability and observability nodes for a rare triggering Extremely challenging to exhaustively generate test vectors for triggering a HT c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 24 / 40

Deterministic vs. Probabilistic Approach Deterministic approach difficult Many possible HTs Function of some IC nodes Exhaustive enumeration impossible Statistic approach : 1 Find rare events in the circuit 2 Get a list of HTs which can be inserted 3 Generate test vectors and estimate their coverage 4 Set of high quality test vectors 85% reduction in testset length compared to a random approach, but less efficient with big triggers and takes a long time c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 25 / 40

Presentation Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 26 / 40

Side-Channel Analysis Any HT in the IC should modify its leakage current (IDDQ), dynamic power trace (IDDT), path-delay characteristic, ElectroMagnetic (EM) radiation. Don t need to trigger a HT for measuring its effects Test vectors generation easier than for logic testing Needs HT-free circuits Get side-channel measurements and then reverse-engineering to check if the IC is HT-free If so, the measurements become a reference, and we can then compare the side-channels of the other circuits c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 27 / 40

Global Side-Channel Analysis Green: RSA signal Red: Process noise (offset) Black: HT signal (offset) c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 28 / 40

Local Side-Channel Analysis Local Side-Channel Analysis more efficient than global ones Needs again HT-free circuits Maximize/Minimize the activity of some IC areas c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 29 / 40

Noise and Sensitivity c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 30 / 40

Presentation Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 31 / 40

Added circuitry for the HT detection must not be infected itself At best, the added circuitry is disabled (e.g., fault countermeasure) At worst, it can be turned into a backdoor (e.g., scan chain) A HT triggering logic can exploit the Test/Scan Enable control line to disable itself Parametric HTs very difficult to detect c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 32 / 40

Presentation Definition Where introducing HTs? Initiatives (Possibly) Desastrous Effects c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 33 / 40

Complementary methods Combine test-time and run-time methods Modify the IC for assistive and preventive methods c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 34 / 40

Section c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 35 / 40

Introduction To improve HT detection rate, modify the IC Prevent from the insertion of HT Ease side-channel analysis and logic testing 4 main methods: Delay-Based Methods Rare Event Removal Design for Trojan Test Proof-Carrying Hardware Run-Time Detection Methods c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 36 / 40

Run-Time Methods Last line of defense On-line monitoring of the IC in real-time, for checks: Critical operations, Idle mode, Security policies, Performance or availability of some units, etc. Costly c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 37 / 40

Run-Time Methods Disable one suspect block or force one operation SPN : Signal Probe Network SM : Security Monitor ( FSM) SECOPRO : Security and Control Processor Configurations ciphered and stored in secured Flash memory Overhead? c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 38 / 40

Hardware Trojans are real threats for integrated circuits HT taxonomy is very rich No HT detection method of the state-of-the-art is 100% successful 3 lines of defense: Test-Time Methods Run-Time Methods A European initiative: HINT project Let s talk in front of HINT Poster! A French initiative: HOMERE project Let s attend to the Franck Courbon presentation! Very encouraging first results: Infected benchmark circuits will be available soon A common platform for side-channel analysis A low-cost way to extract internal delays of ICs by clock glitching c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 39 / 40

Thanks! Questions? c 2013 CASSIDIAN CYBERSECURITY - All rights reserved TRUDEVICE 2013, December the 12th Page 40 / 40