Reviving smart card analysis



Similar documents
Low- Cost Chip Microprobing

ADVANCED IC REVERSE ENGINEERING TECHNIQUES: IN DEPTH ANALYSIS OF A MODERN SMART CARD. Olivier THOMAS Blackhat USA 2015

PUF Physical Unclonable Functions

Side Channel Analysis and Embedded Systems Impact and Countermeasures

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Secure Storage. Lost Laptops

Defending mobile phones. Karsten Nohl, Luca Melette,

Karsten Nohl University of Virginia. Henryk Plötz HU Berlin

Reverse engineering hardware for software reversers: studying an encrypted external HDD

Example-driven Interconnect Synthesis for Heterogeneous Coarse-Grain Reconfigurable Logic

Today. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base

Software Hardware Binding with Quiddikey

Mobile network security report: Poland

SecureDoc Disk Encryption Cryptographic Engine

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

CryptoFirewall Technology Introduction

7a. System-on-chip design and prototyping platforms

Security in ST : From Company to Products

Key & Data Storage on Mobile Devices

What is a System on a Chip?

Mobile network security report: Netherlands

Mobile network security report: Poland

Cryptographic Rights Management of FPGA Intellectual Property Cores

Mobile network security report: Germany

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Microsemi Security Center of Excellence

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Secure Hardware PV018 Masaryk University Faculty of Informatics

GSM security country report: Germany

Mobile network security report: Belgium

GSM security country report: USA

90% of data breaches are caused by software vulnerabilities.

SAS Data Set Encryption Options

Secure Containers. Jan Imagination Technologies HGI Dec, 2014 p1

Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06

Secure Cloud Storage and Computing Using Reconfigurable Hardware

Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security

EXERCISES OF FUNDAMENTALS OF COMPUTER TECHNOLOGY UNIT 5. MEMORY SYSTEM

Applying Cryptography as a Service to Mobile Applications

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

KEEP IT SYNPLE STUPID

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Penetration Testing Windows Vista TM BitLocker TM

Pulse Secure, LLC. January 9, 2015

GSM Risks and Countermeasures

CHASE Survey on 6 Most Important Topics in Hardware Security

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Mobile network security report: Greece

Mobile network security report: Norway

Hardware Security Modules for Protecting Embedded Systems

Secure USB Flash Drive. Biometric & Professional Drives

Embedded Java & Secure Element for high security in IoT systems

Horst Görtz Institute for IT-Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

What is a Smart Card?

Verification of Triple Modular Redundancy (TMR) Insertion for Reliable and Trusted Systems

Security Principles. Related to. Handset Theft

NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ

Encrypted File Systems. Don Porter CSE 506

Local Heating Attacks on Flash Memory Devices. Dr Sergei Skorobogatov

Parts of a Computer. Preparation. Objectives. Standards. Materials Micron Technology Foundation, Inc. All Rights Reserved

SecureCom Mobile s mission is to help people keep their private communication private.

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Chapter 1: Introduction

Self-Encrypting Drives

Fondamenti su strumenti di sviluppo per microcontrollori PIC

SHE Secure Hardware Extension

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Bootloader with AES Encryption

Peeling Away Layers of an RFID Security System

Pervasive Computing und. Informationssicherheit

Establishing Security Best Practices in Access Control

Hardware Trojans Detection Methods Julien FRANCQ

SENSE Security overview 2014

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Introduction to Programmable Logic Devices. John Coughlan RAL Technology Department Detector & Electronics Division

SecureD Technical Overview

On a New Way to Read Data from Memory

Authentication in WLAN

SECURE USB FLASH DRIVE. Non-Proprietary Security Policy

CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

Secure Network Communications FIPS Non Proprietary Security Policy

M2M For industrial and automotive

Enhancing Organizational Security Through the Use of Virtual Smart Cards

CRYPTOGRAPHY AS A SERVICE

Network Security Technology Network Management

Implementation Details

On Security Evaluation Testing

A common weakness in RSA signatures: extracting public keys from communications and embedded devices

Trusted Platforms for Homeland Security

How to Secure Infrastructure Clouds with Trusted Computing Technologies

Ky Vu DeVry University, Atlanta Georgia College of Arts & Science

Security for Ubiquitous and Adhoc Networks

Transcription:

Reviving smart card analysis Christopher Tarnovsky Karsten Nohl chris@flylogic.net nohl@srlabs.de

Executive summary Modern smart cards should be analyzed 1. Smart card chips provide the trust base for various applications from banking to ID cards to hardware encryption 2. The secured chips not only protect secret keys but also shield software and protocols from independent analysis. Vulnerability analysis by manufacturers and contracted labs has overlooked bugs numerous times, so independent analysis is needed for software protected by smart cards 3. This talk describes a method for extracting smart card software for analysis through semi-automated reverse-engineering of circuits and optical memory read-out 4. The potential for code read-out affects most modern smart cards. Mitigating it requires stronger memory encryption combined with smarter key storage 2

Agenda Smart card basics Reverse-engineering memory encryption Mitigation measures 3

A few smart cards chips cover numerous security domains Smart card applications Payment cards, electronic IO cards, access badges Trusted Platform Modules (TPM) Device and accessory identification SIM cards, NFC secure elements Bulk risk Only a handful of manufacturers provide smart cards Therefore, every card compromise affects numerous applications Content protection 4

Smart card chip 5

Unencrypted ROM memory can be read optically Metal-masked ROM Ion-implanted ROM (after staining) 6

Smart cards protect code and data with memory encryption Memories Memory decryption CPU Newer smart cards hide the decryption in the CPU 7

Recent design iterations moved cryptography deeper into chips Memory MED CPU Attack 1 2 3 Optically read code and data from memories Probe wires after MED that carry unencrypted data Reverse-engineer (part of) CPU to find unencrypted wires Mitigation Encrypt memories on the fly in MED Move encryption into CPU Fully encrypted CPU (possible?) 8

Smart card with memory encryption in CPU core 9

Protection meshes create additional complexity for invasive attacks Meshes increase effort of invasive data extraction This talk introduces method for extracting ROM code not hindered by meshes 10

Agenda Smart card basics Reverse-engineering memory encryption Mitigation measures 11

Researchers need better tools for finding algorithms in hardware Software Domain Algorithm / Source Code Compiler Disassembler Assembly Instructions Bits Hardware Domain Algorithm / HDL code Route & Place Tool Reverse-Eng. Logic Gates Transistors Focus of this talk (using the Degate software) 12

Algorithms can be extracted from chips in a 3-step process Silicon disassembling process Image chips Polishing Microscoping Stitching Recognize structures Pattern recog. Wire tracing Silicon Chip Chip images Netlist Interpret structures Gate simulation Algorithm Annotated netlist 13

Demo: Reverse-engineering with Degate 14

Degate outputs synthesizable code that can be visualized with standard tools 15

Memory is ciphered with 64 bit key 8 bit address + encrypted data bus Key storage Mixing ROM Selector 16 bit 16 bit 16 bit 16 bit 8 bit clear data bus 16

Memory encryption includes non-deterministic and obfuscated cells 4 bit ROM key 4 bit Flash key 4 bit RAM key randomly generated at boot 2 bit random number generator MUX designs: 17

Agenda Smart card basics Reverse-engineering memory encryption Mitigation measures 18

Hardening smart card systems requires actions from manufacturers and system designers Mitigation step Responsible A B Increase complexity of reverse-engineering Harden cipher against cryptanalysis Smart card manufacturer C Keep smart card attack value low System designer 19

A Best defense against reverse-engineering Increase complexity, decrease feature size Use more random logic, separated in fewer blocks Make it harder to image chip (feature size <180 nm) 20

B ROM code could be protected through better cryptography Outlined attack 1 2 Optical ROM read out (including decryption key!) Reverse-engineering of proprietary decryption function Possible mitigation Store ROM key in hard-to-read memory (Flash, PUF) Effort: Easy to implement on modern chips that have Flash Use well-designed cryptography to prevent key cracking Effort: High, research into lightweight crypto needed! + 21

C Technology risks vary widely with use case Example: Nationwide micro-payment scheme Payment card Payment terminal chip chip Extracting secret keys allows cloning one card Extracting secret keys allows cloning all cards Same chip, same protection, but different security level 22

C Key distribution should follow need-to-know principle to limit attack surface Function Card creation Writing Reading Each card holds unique keys Reading terminals only hold the keys of the functions they perform 23

Smart card can provide large but not infinite level of protection All smart cards can be reverse-engineered or broken with intrusive attacks at some cost Software stored in ROM should be extractable for analysis from most modern smart cards Smart cards are the most secure hardware, but system designers must limit attack incentives and not expect miracles from chips Degate software, degate.org Silicon gate examples, siliconzoo.org Questions? Karsten Nohl, nohl@srlabs.de Chris Tarnovsky, chris@flylogic.net 24