hardware security
play

Hardware Security Chester Rebeiro IIT Madras 1 Physically - PowerPoint PPT Presentation

Hardware Security Chester Rebeiro IIT Madras 1 Physically Unclonable Functions Physical Unclonable Func1ons and Applica1ons: A Tutorial h8p://ieeexplore.ieee.org/document/6823677/ Edge Devices 1000s of them expected to be deployed Low power


  1. Hardware Security Chester Rebeiro IIT Madras 1

  2. Physically Unclonable Functions Physical Unclonable Func1ons and Applica1ons: A Tutorial h8p://ieeexplore.ieee.org/document/6823677/

  3. Edge Devices 1000s of them expected to be deployed Low power (solar or ba8ery powered) Small footprint Connected to sensors and actuators Expected to operate 24 x 7 almost unmanned 24x7 these devices will be con1nuously pumping data into the system, which may influence the way ci1es operate Will affect us in mulRple ways, and we may not even know that they exist. 3

  4. AuthenRcaRng Edge Devices Stored keys • Private keys – EEPROM manufacture is an overhead – Public key cryptography is heavy – Can be easily copied / cloned Public keys stored in server EncrypRon done in edge device 4

  5. Physically Unclonable FuncRons No stored keys • Digital Fingerprints No public key cryptography • Cannot be cloned / copied • Uses nano-scale variaRons in manufacture. No two devices are exactly idenRcal • challenge / response Public keys stored in server EncrypRon done in edge device 5

  6. PUFs A funcRon whose output depends on the input as well as the device execuRng it. 6

  7. What is Expected of a PUF? (Inter and Intra Differences) Response response challenge challenge Response response (Reliable) (Unique) Same Challenge to Same PUF Same Challenge to different PUF Difference between responses must Difference between responses must be small on expectaRon be large on expectaRon IrrespecRve of temperature, noise, aging, etc. Significant variaRon due to manufacture 7

  8. What is Expected of a PUF? (Unpredictability) Difficult to predict the output of a PUF to a randomly chosen challenge response when one does not have access to the device challenge response 8

  9. Intrinsic PUFs • Completely within the chip – PUF – Measurement circuit – Post-processing • No fancy processing steps! – eg. Most Silicon based PUFs 9

  10. Silicon PUFs eg. Ring Oscillator PUF Ring Oscillator with odd number of gates f = 1 f Frequency of ring oscillator 2 nt n Number of stages t Delay of each stage Frequency affected by process variaRon. 10

  11. Why variaRon occurs? MOS Transistor CMOS Inverter Delay depends on capacitance When gate voltage is less than threshold no current flows Process Varia1ons When gate voltate is greater than threshold • Oxide thickness current flows from source to drain • Doping concentraRon • Capacitance Threshold voltage is a function of doping concentration, oxide thickness 11

  12. Silicon PUFs ⎧ f A > f B ⎪ N bit challenge 1 response = ⎨ eg. Ring Oscillator PUF 0 f A ≤ f B ⎪ ⎩ 1 R A 2 counter 3 1 bit response > enable N-2 R B counter N-1 N 12

  13. Results of a RO PUF 15 Xilinx, Virtex 4 FPGAs; Inter Chip Varia1ons 1024 ROs in each FPGA; (Uniqueness measurement) Each RO had 5 inverter stages and 1 AND gate response challenge response When 128 bits are produced, Avg 59.1 bits out of 128 bits different Physical Unclonable Functions for Device Authentication and Secret Key Generation https://people.csail.mit.edu/devadas/pubs/puf-dac07.pdf 13

  14. Results of a RO PUF 15 Xilinx, Virtex 4 FPGAs; Intra Chip Varia1ons (Reproducability measurement) 1024 ROs in each FPGA; Each RO had 5 inverter stages and 1 AND gate 20 o C; 1.2V response challenge response 0.61 bits on average out of 128 bits differ 120 o C 1.08V Physical Unclonable Functions for Device Authentication and Secret Key Generation https://people.csail.mit.edu/devadas/pubs/puf-dac07.pdf 14

  15. Arbiter PUF 0 Switch 1 0 0 1 1 0 0 1 1 Ideally delay difference between Red and Blue lines should be 0 if they are symmetrically laid out. In pracRce variaRon in manufacturing process will introduce random delays between the two paths 15

  16. Arbiter D FF D FF ? D Q clk If the signal at D reaches first then Q will be set to 1 If the signal at clk reaches first then Q will be set to 0 16

  17. Arbiter PUF 0 1 0 0 1 1 challenge 1 0 1 1 1 D Q 1 if top 0 0 0 … path is faster, rising 
 0 0 0 else 0 G Edge 1 1 1 13.56MHz Chip For ISO 14443 A spec. 17

  18. Results for RO PUF Design and Implementa1on of PUF-Based “Unclonable” RFID ICs for An1-Counterfei1ng and Security Applica1ons IEEE Int.Conf. on RFID, 2008, S. Devdas et. Al. 18

  19. Comparing RO and Arbiter PUF Number of Challenge : ⎛ ⎞ Number of Challenge : 2 N N Response Pairs : Response Pairs : ⎜ ⎟ 2 ⎝ ⎠ #CRPs linearly related to the number #CRPs exponenRally related to the number of components of components WEAK PUF STRONG PUF 19

  20. Weak PUF vs Strong PUF Weak PUF Strong PUF Very Good Inter and Intra differences • • Huge number of Challenge Response Pairs (CRPs) ComparaRvely few number of Challenge • Response Pairs (CRPs) • It is assumed that an a8acker cannot Enumerate all CRPs within a fixed Rme interval. Therefore CRPs can be made public CRPs must be kept secret, because an a8acker • may be able to enumerate all possible CRPs • Formally, an adversary given a poly-sized sample of adapRvely chosen CRPs cannot predict the Response to a new randomly chosen challenge. Weak PUFs useful for creaRng cryptographic • keys Does not require any cryptographic scheme, since • CRPs can be public. Typically used along with a cryptographic scheme • (like encrypRon / HMAC etc) to hide the CRP (since the CRPs must be kept secret) 20

  21. PUF Based AuthenRcaRon (with Strong PUF) CRPs Bootstrapping: At manufacture, server builds a database of CRPs for each device. At deployment, server picks a random challenge from the database, queries the device and validates the response response challenge 21

  22. PUF Based AuthenRcaRon Man in the Middle CRPs Man in the middle may be able to build a database of CRPs To prevent this, CRPs are not used more than once challenge response 22

  23. PUF Based AuthenRcaRon CRP Tables CRPs Each device would require its own CRP table and securely stored in a trusted server Tables must be large enough to cater to the enRre life Rme of the device or need to be recharged periodically (scalability issues) challenge response CRPs 23

  24. PUF based AuthenRcaRon (AlleviaRng CRP Problem) Secret Model of PUF Gate Delays of PUF components Bootstrapping: At manufacture, server builds a database of gate delays of each component in the PUF. At deployment, server picks a random challenge constructs its expected response from secret model, queries the device and validates the response SRll Requires Secure Bootstrapping and Secure Storage 24

  25. PUF based AuthenRcaRon (AlleviaRng CRP Problem) • PPUF : Public Model PUF Bootstrapping: Download the public model of PUF from the trusted server. Trusted server (PKI) Gate Delays At deployment, server picks a random of PUF challenge constructs expected response from Components (Public) public model, queries the device and validates the response. If Rme for response is less than a threshold accept response else rejects. AssumpRon: A device takes much less Rme to compute a PUF response than an a8acker who models the PUF. T < T 0 ? 25

  26. PUF based AuthenRcaRon (AlleviaRng CRP Problem) Homomorphic Encryp1on Encrypted CRPs Untrusted Cloud R e s p o n s e 26

  27. Conclusions Different types of PUFs being explored • – Analog PUFs, Sensor PUFs etc. • CRP issue sRll a big problem Several a8acks feasible on PUFs. • – Model building a8acks (SVMs) – Tampering with PUF computaRon (eg. Forcing a sine-wave on the ground plane, can alter the results of the PUF) PUFs are a very promising way for lightweight authenRcaRon of edge • devices. 27

  28. Hardware Trojans Hardware Security: Design, Threats, and Safeguards; D. Mukhopadhyay and R.S. Chakraborty

  29. h8ps://www.theguardian.com/technology/2012/may/29/cyber-a8ack-concerns-boeing-chip h8ps://techcrunch.com/2013/09/05/nsa-subverts-most-encrypRon-works-with-tech-companies-for-back-door-access-report-says/ h8ps://www.theregister.co.uk/2013/07/29/lenovo_accused_backdoors_intel_ban/ h8ps://www.technologyreview.com/s/519661/nsas-own-hardware-backdoors-may-sRll-be-a-problem-from-hell/ 29

  30. IC Life Cycle (Vulnerable Steps) Third-party Std. IP Tools Models Cells Offshore Mask Fab Design Fab Interface Specifications Wafer Trusted Deploy Package Dice and Wafer and Either Test Package Probe Monitor Untrusted *hbp://www.darpa.mil/MTO/solicita1ons/baa07-24/index.html 30

  31. Malware in Third Party IPs • Third party IPs – Can they be trusted? – Will they contain malicious backdoors • Developers don’t / can’t search 1000s of lines of code looking out for trojans. 31

  32. FANCI : IdenRficaRon of Stealthy Malicious Logic • FANCI: evaluate hardware designs automaRcally to determine if there is any possible backdoors hidden • The goal is to point out to testers of possible trojan locaRons in a huge piece of code h8p://www.cs.columbia.edu/~simha/preprint_ccs13.pdf (some of the following slides are borrowed from Waksman’s CCS talk) 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend