em analysis in the iot context lessons learned from an
play

EM Analysis in the IoT Context: Lessons Learned from an Attack on - PowerPoint PPT Presentation

EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Daniel Dinu 1 , Ilya Kizhvatov 2 1 Virginia Tech 2 Radboud University Nijmegen CHES 2018 Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible


  1. EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread Daniel Dinu 1 , Ilya Kizhvatov 2 1 Virginia Tech 2 Radboud University Nijmegen CHES 2018

  2. Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible Attack 4 Countermeasures 5 Lessons Learned 1 / 14

  3. EM Analysis leakage commands/traces Oscilloscope data Target Device PC 2 / 14

  4. Thread Networking protocol for the IoT Simple for consumer Built-in security Power efficient IPv6 connectivity Robust mesh network Runs on IEEE 802.15.4 radio silicon More than 100 members 3 / 14

  5. Motivation Numerous low-cost hardware and software tools for side-channel attacks Evaluate the effort required to apply an EM attack in the IoT context Do cryptographic implementations in the network layer need protection against side-channel attacks? 4 / 14

  6. Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible Attack 4 Countermeasures 5 Lessons Learned 4 / 14

  7. Communication Security Security is enforced at two layers: Medium Access Control (MAC) — AES–CCM using key K MAC Mesh Link Establishment (MLE) — AES–CCM using key K MLE A node gets the master key K when it is commissioned to a Thread network Fresh keys are generated from the 16-byte K and 4-byte Sequence number: K MAC || K MLE = HMAC – SHA –256( K , Sequence || “ Thread ”) The default key rotation period is set to 28 days 5 / 14

  8. Processing a MLE Parent Request Message NO Received Sequence � = Current Sequence ? YES MLE Parent Request Generate temporary key HMAC–SHA–256 Parent (Router) Child Tag verification AES–CCM 6 / 14

  9. AES–CCM Combines CBC–MAC mode and CTR mode The execution of both modes of operation can be attacked The attacker can control up to 12 input bytes of the first block: Source MAC Address – 8 bytes Frame Counter – 4 bytes Known attack: Jaffe [CHES’07], O’Flynn and Chen [COSADE’16] AES-CBC 49 Source MAC Address Frame Counter 05 00 15 AES-CTR 01 Source MAC Address Frame Counter 05 00 01 7 / 14

  10. Relationship between K and K MLE Master key to MLE key ( K − → K MLE ) Key derivation using HMAC 8 / 14

  11. Relationship between K and K MLE Master key to MLE key ( K − → K MLE ) Key derivation using HMAC MLE key to master key ( K MLE − → K ) Send MLE Child ID Request to ask for the master key The MLE Child ID Response includes the master key 8 / 14

  12. Relationship between K and K MLE Master key to MLE key ( K − → K MLE ) Key derivation using HMAC MLE key to master key ( K MLE − → K ) Send MLE Child ID Request to ask for the master key The MLE Child ID Response includes the master key Master key and MLE key are equivalent! K ← → K MLE 8 / 14

  13. Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible Attack 4 Countermeasures 5 Lessons Learned 8 / 14

  14. The Most Feasible Attack Target Router Attacker 9 / 14

  15. The Most Feasible Attack MLE Advertisement MLE Advertisement MLE Advertisement Target Router Attacker Step 1: Observe an MLE Advertisement message Record the Sequence number 9 / 14

  16. The Most Feasible Attack MLE Parent Request Target Router Attacker Step 2: Inject MLE Parent Request messages Recorded Sequence number Random Source MAC Address and Frame Number 9 / 14

  17. The Most Feasible Attack MLE Parent Request Target Router Attacker Step 3: Observe the EM leakage Save the injected inputs and corresponding EM traces 9 / 14

  18. The Most Feasible Attack Target Router Attacker Step 4: Recover the MLE key K MLE Mount a DEMA attack 9 / 14

  19. The Most Feasible Attack MLE Child ID Request MLE Child ID Response Target Router Attacker Step 5: Get the master key K Send a MLE Child ID Request message The MLE Child ID Response message contains K 9 / 14

  20. The Most Feasible Attack Thread communication Target Router Attacker Full network access! 9 / 14

  21. Experimental Setup Target: TI CC2538 (Cortex-M3, 32 MHz) Thread stack: OpenThread Oscilloscope: LeCroy waveRunner 625Zi Langer EM probes No trigger signal from target! 10 / 14

  22. Results Sampling rate set to 1 GS/s 10,000 EM traces acquired in about 3 hours Full recovery of the MLE key K MLE Two key bytes were much more difficult to recover than the rest Message fragmentation prevented recovery of the master key The attack may succeed on other implementations of the stack 11 / 14

  23. Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible Attack 4 Countermeasures 5 Lessons Learned 11 / 14

  24. Countermeasures Shielding & tamper resistance Protected cryptographic implementations Protocol level mitigations Security certification scheme 12 / 14

  25. Countermeasures Shielding & tamper resistance Protected cryptographic implementations Protocol level mitigations Security certification scheme A combination of the above countermeasures is recommended for high security! 12 / 14

  26. Outline 1 Introduction 2 Side-Channel Vulnerability Analysis 3 The Most Feasible Attack 4 Countermeasures 5 Lessons Learned 12 / 14

  27. Lessons Learned Lessons learned from our evaluation can be applied to other IoT systems and protocols. 13 / 14

  28. Lessons Learned Lessons learned from our evaluation can be applied to other IoT systems and protocols. Prevent electromagnetic leakage 13 / 14

  29. Lessons Learned Lessons learned from our evaluation can be applied to other IoT systems and protocols. Prevent electromagnetic leakage Do not allow access to the master key from temporary key(s) 13 / 14

  30. Lessons Learned Lessons learned from our evaluation can be applied to other IoT systems and protocols. Prevent electromagnetic leakage Do not allow access to the master key from temporary key(s) A network-wide master key is a double-edged sword 13 / 14

  31. Lessons Learned Lessons learned from our evaluation can be applied to other IoT systems and protocols. Prevent electromagnetic leakage Do not allow access to the master key from temporary key(s) A network-wide master key is a double-edged sword Side-channel attacks are a real threat for the IoT! 13 / 14

  32. SECURE 14 / 14

  33. SECURE Thank you! 14 / 14

  34. Appendix

  35. References Joshua Jaffe. A first-order DPA attack against AES in counter mode with unknown initial counter . In Cryptographic Hardware and Embedded Systems - CHES 2007. Colin O’Flynn and Zhizhang Chen. Power analysis attacks against IEEE 802.15.4 nodes . In Constructive Side-Channel Analysis and Secure Design - COSADE 2016. 1 / 8

  36. Thread Stack Source: https://www.threadgroup.org/ 2 / 8

  37. Mesh Link Establishment (MLE) Facilitates the secure configuration of radio links Allows exchange of network parameters MLE messages are sent inside UDP datagrams Routers periodically multicast MLE Advertisement messages Link configuration is initiated by a MLE Parent Request message 3 / 8

  38. Establishing a Communication Link MLE Parent Request MLE Parent Response Attach. MLE Child ID Request MLE Child ID Response MLE Child Update Request Child MLE Child Update Response Sync. MLE Link Request Link MLE Link Accept & Request Sync. MLE Link Accept Child ( N 1 ) Parent ( N 2 ) 4 / 8

  39. HMAC–SHA–256 m = Sequence � “ Thread ” � 0x80 0x00 . . . 0x00 � len The attacker targets k 1 and k 2 k 1 , k 2 , and Sequence give K MAC and K MLE Not enough control of the input! K ⊕ ipad m k 1 IV F F K ⊕ opad k 2 K MAC � K MLE IV F F 5 / 8

  40. Attack Feasibility Attack Effort Adaptation of the rating for smart cards from the Joint Interpretation Library Last step of the attack is feasible ⇒ enhanced-basic no rating high basic enhanced-basic moderate Equipment Cost Cost Oscilloscope Attack Success HIGH LeCroy WaveRunner 6Zi ✓ MEDIUM PicoScope, ChipWhisperer-Pro ✓ LOW ChipWhisperer-Lite ✗ 6 / 8

  41. Guessing Entropy Figure: Evolution of the guessing entropy for the second key byte. 7 / 8

  42. Correlation Matrix Figure: Correlation of all key candidates for the second key byte when using 3,000 traces. 8 / 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend