Hardware Trojans: A Threat for CyberSecurity Julien Francq - - PowerPoint PPT Presentation

hardware trojans a threat for cybersecurity
SMART_READER_LITE
LIVE PREVIEW

Hardware Trojans: A Threat for CyberSecurity Julien Francq - - PowerPoint PPT Presentation

Hardware Trojans: A Threat for CyberSecurity Julien Francq julien.francq@cassidian.com Cassidian CyberSecurity 2013, July the 8th Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust


slide-1
SLIDE 1

Hardware Trojans: A Threat for CyberSecurity

Julien Francq julien.francq@cassidian.com Cassidian CyberSecurity

2013, July the 8th

slide-2
SLIDE 2

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Outline

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods

4

Design for Hardware Trust

5

HOMERE Project : First Results

2

slide-3
SLIDE 3

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

3

slide-4
SLIDE 4

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Hardware Trojan (HT)

Malicious modifications of an Integrated Circuit (IC) during its design flow

4

slide-5
SLIDE 5

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Context

Outsourcing of the fabrication of the ICs Difficult to ensure the trust in all the steps of the design flow

Idea Specification Design (HDL) Synthesis Place & Route Mapping IP Cores Config File Hardware Layout Board IC FPGA ASIC Loader Production Process FPGA ASIC Trusted Intentional mistakes Malicous Design Tampering Files Malicious IP-Cores Tampering Files Tampering Files Manipulated Manipulate Design Attack IC Manipulation While Loading Backdoors Tools Malicious External Components

5

slide-6
SLIDE 6

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Hardware Trojans in Practice

2005 : US Department of Defense 2007 : DARPA “Trust in IC Program” 2007 : Isra¨ el vs. Syria 2009 : “Hot Topic” of CHES conference After 2009 : other conferences (DATE, HOST, CARDIS, ReConFig, etc.) [Skorobogatov et al. : “Breaktrough Silicon Scanning Discovers Backdoor in Military Chip”, CHES 2012] ⇒ HTs : real and emerging threat

6

slide-7
SLIDE 7

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Quantification of Risks

Overproduction Software HTs cloning Attackers Fab Competitors Terrorists Goal Feed the Grey IP Theft Denial of Service, Market Data Theft, Sabotage Impact Economical Economical Risks on Security, Economy, Infrastructures (Society) Risks +++ ++ + Impact × Risks too important to be neglicted

7

slide-8
SLIDE 8

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Possible Payloads

Kill switch

Fighters

Dysfonctional circuit

Satellite which works only 6 months

Secret information leakage

Ciphered communications

Help a malware by providing a backdoor

Privilege escalation, automatic login, password theft

Prevent from going to sleep mode

Autonomy

etc.

8

slide-9
SLIDE 9

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

9

slide-10
SLIDE 10

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Hardware Trojan Taxonomy

Taxonomy : tree where each branch defines a different property In the ideal case, a specific HT must be on only one leaf of the tree Benefits of the taxonomy Systematic study of their characteristics Specific detection methods for each HT class Benchmark circuits for each class Best existing taxonomy : Trust-Hub

10

slide-11
SLIDE 11

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Trust-Hub Taxonomy

11

slide-12
SLIDE 12

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Factoring the Taxonomy

4 (effects) × 5 (locations) × 5 (insertion phases) × 6 (abstraction levels) × 5 (activation mechanisms) = 3000 different HTs ! Very rich taxonomy ! Impossible to implement them all, and then detect them ⇒ Factoring this taxonomy Total : ∼ 100 HTs

12

slide-13
SLIDE 13

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

13

slide-14
SLIDE 14

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

14

slide-15
SLIDE 15

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

HT Detection Methods Overview

Post Production Detection Prevention Trusted Production Secure Design Destructive Non-Destructive Supportive Design Run-Time Test-Time Side Channel Analysis Logic Testing HT Protection Optical

No method is 100% successfull !

15

slide-16
SLIDE 16

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Detect HTs ? Not so easy...

1

Systems on Chip are more and more complex, and detecting a small malicious modification is difficult

2

Reverse-engineering inspection is costly and difficult

No guarantee that the remaining ICs are HT-free

3

By nature, HTs are designed to be stealthy

Not easily detectable with conventional logic testing

4

By nature, HTs are small to be not easily detected by optical analysis

Difficult to detect them with side-channel (power consumption, electromagnetic radiations, etc.) analysis

16

slide-17
SLIDE 17

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

17

slide-18
SLIDE 18

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Test Generation (1/2)

Conventional logic testing cannot be used to reliably detect HT Manufacturing defects (stuck-at-faults) = HT effects Difficult to trigger a HT

Time-bombs

Some HTs have no impact on functional outputs (Trojan Side-Channels) Vast spectrum of possible HTs

18

slide-19
SLIDE 19

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Test Generation (2/2)

HTs are on low controllability and observability nodes for a rare triggering Extremely challenging to exhaustively generate test vectors for triggering a HT

19

slide-20
SLIDE 20

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Deterministic vs. Probabilistic Approach

Deterministic approach difficult

Many possible HTs Function of some IC nodes ⇒ Exhaustive enumeration impossible

Statistic approach :

1

Find rare events in the circuit

2

Get a list of HTs which can be inserted

3

Generate test vectors and estimate their coverage

4

⇒ Set of high quality test vectors

85% reduction in testset length compared to a random approach, but less efficient with big triggers and takes a long time

20

slide-21
SLIDE 21

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

21

slide-22
SLIDE 22

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Side-Channel Analysis

Any HT in the IC should modify its leakage current (IDDQ), dynamic power trace (IDDT), path-delay characteristic, ElectroMagnetic (EM) radiation. Don’t need to trigger a HT for measuring its effects Test vectors generation easier than for logic testing Needs HT-free circuits

Get side-channel measurements and then reverse-engineering to check if the IC is HT-free

If so, the measurements become a reference, and we can then compare the side-channels of the other circuits

22

slide-23
SLIDE 23

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Global Side-Channel Analysis

Green : RSA signal Red : Process noise (offset) Black : HT signal (offset)

23

slide-24
SLIDE 24

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Local Side-Channel Analysis

Local Side-Channel Analysis more efficient than global ones Needs again HT-free circuits Maximize/Minimize the activity of some IC areas

24

slide-25
SLIDE 25

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Noise and Sensitivity

25

slide-26
SLIDE 26

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

26

slide-27
SLIDE 27

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Some Subtleties

Added circuitry for the HT detection must not be infected itself

At best, the added circuitry is disabled (e.g., fault countermeasure) At worst, it can be turned into a backdoor (e.g., scan chain)

A HT triggering logic can exploit the “Test/Scan Enable” control line to disable itself Parametric HTs very difficult to detect

27

slide-28
SLIDE 28

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

28

slide-29
SLIDE 29

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

Summary

Complementary methods Combine test-time and run-time methods Modify the IC for assistive and preventive methods

⇒ Design for Hardware Trust

29

slide-30
SLIDE 30

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

30

slide-31
SLIDE 31

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Introduction

To improve HT detection rate, modify the IC ⇒ Design for Hardware Trust

Prevent from the insertion of HT Ease side-channel analysis and logic testing

4 main methods :

Delay-Based Methods Rare Event Removal Design for Trojan Test Proof-Carrying Hardware

Run-Time Detection Methods

31

slide-32
SLIDE 32

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Run-Time Methods

Last line of defense On-line monitoring of the IC in real-time, for checks :

Critical operations, Idle mode, Security policies, Performance or availability of some units, etc.

Costly

32

slide-33
SLIDE 33

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Run-Time Methods

Disable one suspect block or force one operation SPN : Signal Probe Network SM : Security Monitor (∼ FSM) SECOPRO : Security and Control Processor Configurations ciphered and stored in secured Flash memory Overhead ?

33

slide-34
SLIDE 34

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

1

Introduction to Hardware Trojans

2

Hardware Trojan Taxonomy

3

HT Detection Methods Overview Logic Testing : Challenges & Solutions Side-Channels : Challenges & Solutions Some Subtleties Summary

4

Design for Hardware Trust

5

HOMERE Project : First Results

34

slide-35
SLIDE 35

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

A French Project : HOMERE

FUI14 (2012-2015) : HOMERE project Large companies

Cassidian CyberSecurity, Gemalto

Small company

Secure-IC

Academic partners

ARMINES, CEA-LETI, LIRMM, T´ el´ ecom ParisTech

Governmental help and support

ANSSI, (DGA)

35

slide-36
SLIDE 36

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HOMERE : First Results

Infection of Benchmark Circuits General Side-Channel Test-Bench HT Detection via Visual Inspection Internal Delays Extraction by Fault Analysis

36

slide-37
SLIDE 37

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HOMERE : First Results

Infection of Benchmark Circuits General Side-Channel Test-Bench HT Detection via Visual Inspection Internal Delays Extraction by Fault Analysis

37

slide-38
SLIDE 38

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Infection of Benchmark Circuits

Can be done at RTL level (VHDL)

But it will greatly change the final layout Trust-Hub website suggest to implement the HT in VHDL level, place and route the circuit, and then delete the HT Quicker than adding HT manually, but we will get a pair of (HT-free/Infected circuit) for each HT

Will be done at netlist level

We have a common reference for each HT

Manipulation of .ngc files for Xilinx We can then modify :

LUT content Routing Configurations (FFs or LATCH, IBUF delays in IOB, etc.)

38

slide-39
SLIDE 39

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HT Inserted in RTL Mode

lock state key unlock lock lock state lock state key unlock lock lock state I0 I1 k k

39

slide-40
SLIDE 40

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Slice of a Virtex-5 50T

A6 A5 A4 A3 A2 A1 LUT D Q6 D DQ Q6 = A1..... LUT C Q6 C CQ Q6 = A1..... LUT B B BQ Q6 = A1..... LUT A A AQ Q6 = A1..... Q6 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1

40

slide-41
SLIDE 41

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

The same on “FPGA Editor”

41

slide-42
SLIDE 42

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Non-Infected Circuit

A6 A5 A4 A3 A2 A1 LUT D Q6 D DQ LUT C Q6 C CQ LUT B B BQ Q6 = A1..... LUT A A AQ Q6 = A1..... Q6 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1 key(1) key(3) key(6) key(4) key(2) key(0) N2 unlock key(7) key(0) lock state lock Q6 = ( A5*( A2*( A3*( A4*( A1* A6))))) Q6 = (( A2*((A5*(A3*(A1*A6)))+A4))+ lock state lock state N2 (A2*(A5*(A3*(A1*( A4*A6))))))

42

slide-43
SLIDE 43

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Non-Infected Circuit

43

slide-44
SLIDE 44

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Infected Circuit

A6 A5 A4 A3 A2 A1 LUT D Q6 D DQ LUT C Q6 C CQ LUT B B BQ LUT A A AQ Q6 = A1..... Q6 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1 A6 A5 A4 A3 A2 A1 key(1) key(3) key(6) key(4) key(2) key(0) N2 unlock key(7) key(0) lock state lock Q6 = ( A5*( A2*( A3*( A4*( A1* A6))))) Q6 = (( A2*((A5*(A3*(A1*A6)))+A4))+ N2 (A2*(A5*(A3*(A1*( A4*A6)))))) lock state lock state Q6 = (A6+(A5*A4)) I0 NET 0 I1 NET 0

44

slide-45
SLIDE 45

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Infected Circuit

45

slide-46
SLIDE 46

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Original Circuit

46

slide-47
SLIDE 47

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Infected Circuit at Netlist Level

47

slide-48
SLIDE 48

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Infected Circuit at RTL Level

Trojan Trigger : 32-bit counter in the I/O of an AES. Incremented at each clock cycle. HT activated when counter = FFFFFFFF. After activation, no more ciphertext will be sent to the output.

48

slide-49
SLIDE 49

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HOMERE : First Results

Infection of Benchmark Circuits General Side-Channel Test-Bench HT Detection via Visual Inspection Internal Delays Extraction by Fault Analysis

49

slide-50
SLIDE 50

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Our Goals

We want :

to understand the development process of an HT, a list of candidates HTs, to implement these HTs, to check that inserted HTs can be triggered.

We want a side-channel test-bench which :

is generic, allows to test different circuits... ...infected by different HTs.

Side-chAnnel Standard Evaluation BOard (SASEBO)

50

slide-51
SLIDE 51

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Overview of SASEBO

Ethernet USB CUT FPGA CTRL FPGA SASEBO Board Trigger Signal

2 FPGAs :

1 for the Circuit Under Test (CUT), 1 for the control (can be used for different CUTs).

USB connection between PC and SASEBO

51

slide-52
SLIDE 52

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Side-Channel Analysis

Attack (for retrieving keys) = Analysis (for detecting HTs)

Side Channel Attack Side Channel Analysis key data result start running res key1 data1 Input 1 Input 2 Output start running Input 3 clock Input Vector Phase Phase Phase Run Read Output Set Input start t 52

slide-53
SLIDE 53

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Lessons for our Test-Bench

In general :

we must generate complex sequences of input vectors, we have to get intermediate outputs, we want real-time I/O processing.

To trigger an HT, and for detect it, we need :

to wait for a long time, to react according to the behavior of the tested circuit.

For side-channel analysis :

Dynamic triggering of the measurements.

53

slide-54
SLIDE 54

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Workflow

Test Scenario Definition Simulation Parameter Setup Scenario Download Commands Outputvectors Read Back SASEBO Board Parameter Setup Wait on Trigger Data Acquisition Data Read Back M e a s u r e m e n t E q u i p m e n t Refine Scenario Different Outputs Compare Outputs (Simulation vs Actual) Perform SCA Obvious Anomalies Nothing Suspicious Potential Anomalies Design OK HT found SASEBO Board 54

slide-55
SLIDE 55

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Test Scenario Description

USB communication of the test scenario file Stored in the memory (BRAM) of control FPGA

CUT Controller USB Controller

and Output Scenario

Memory

  • Ext. Trigger

38

Inter FPGA Bus Vectors Commands and Parameters

CTRL FPGA

3 options for sending the next input vector

Immediate Time condition Output condition

External triggering flag Data format ?

55

slide-56
SLIDE 56

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Data Format

37 IV 37 OC 37 OM TC ET 15 D reserved 37 38 39 40 55 56 93 94 131 132 143

IV : Input Vector, TC : Transition Condition, time or output conditions to send the next IV, ET : External Trigger, sent to the oscilloscope for starting measurements, D : Delay : number of clock cycles to delay the next IV, OM : Output Mask : which bits we are looking at ? OC : Output Condition : values of these bits to send the next IV.

56

slide-57
SLIDE 57

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Test Scenario Format

IV OC OM TC ET D reserved IV OC OM TC ET D reserved IV OC OM TC ET D reserved IV OC OM TC ET D reserved Input Profile 1 2 n 3 ... ... ... ... ... ... Commands Command 1 Command 2 Parameters Parameter 1 Parameter 2 ... ... ... ... ... ... Value 1 Value 2 Scenario Description Attributes Name Version Scenario Name Definition Version

Parameters : tristate mask Controller supporting this format validated

57

slide-58
SLIDE 58

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HOMERE : First Results

Infection of Benchmark Circuits General Side-Channel Test-Bench HT Detection via Visual Inspection Internal Delays Extraction by Fault Analysis

58

slide-59
SLIDE 59

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Principle

[Bhasin et al., FDTC 2013] Study the effect of HT insertion at the layout level (GDSII) Is it possible to detect HTs via visual inspection ? CUT : AES-128 HT : key leakage with fault injection (Piret/Quisquater attack) triggered on a specific plaintext Placement density of the circuit : 50% → 99% HT trigger size : 1 → 128 AND gates Cadence SOC Encounter

59

slide-60
SLIDE 60

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

AES Layout (Metal6)

AES Layouts for the 6th Metal Layer (1200 µm × 1200 µm) with placement density = 50% : (left) HT-Free AES, (middle) AES with 1 AND gate HT, (right) AES with 128 AND gates HT (Credits : T´ el´ ecom ParisTech)

60

slide-61
SLIDE 61

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Results

Preventive method : it is impossible to insert a HT in ECO mode if placement density > 90% (Post-mortem) detection : visual correlation decreases when HT size and placement density of the circuit increase “Low Cost” way to detect HTs by the correlation between GDSII and circuit images More difficult to detect the very small HTs

61

slide-62
SLIDE 62

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

HOMERE : First Results

Infection of Benchmark Circuits General Side-Channel Test-Bench HT Detection via Visual Inspection Internal Delays Extraction by Fault Analysis

62

slide-63
SLIDE 63

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Principle

[Exurville et al., ReCoSoC 2013] An inserted HT will modify internal delays Idea : compare the fault sensitivity analysis of a genuine circuit and an infected one Glitches on external clock

The clock glitch is a local change of a period The choice of the injection cycle is possible

⇒ Setup time violations ⇒ Metastability (non-deterministic behavior)

63

slide-64
SLIDE 64

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Fault Sensitivity Analysis in HT-Free IC

(Credits : CEA-LETI)

64

slide-65
SLIDE 65

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Fault Sensitivity Analysis in Infected IC

(Credits : CEA-LETI)

65

slide-66
SLIDE 66

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

First Results

AES characterization thanks to the fault sensitivity analysis of each AES bit An inserted HT can influence the critical paths Challenges :

Process variations HTs inserted in non-critical paths Fault countermeasures

66

slide-67
SLIDE 67

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Conclusion

Hardware Trojans are real threats for integrated circuits HT taxonomy is very rich No HT detection method of the state-of-the-art is 100% successful 3 lines of defense :

Design for Hardware Trust Test-Time Methods Run-Time Methods

A French initiative : HOMERE project Very encouraging first results :

Infected benchmark circuits will be available soon A common platform for side-channel analysis A “low-cost” way to detect some HTs by visual inspection A “low-cost” way to extract internal delays of ICs by clock glitching

Other on-going works :

Logic test Run-time HT detection

67

slide-68
SLIDE 68

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Thanks ! Questions ?

68

slide-69
SLIDE 69

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Shadow Registers

Measurement of delays between registers Shadow Clock has a negative skew with respect to System Clock for characterizing the path delay Millions of paths ⇒ Big overhead

69

slide-70
SLIDE 70

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Ring Oscillators (1/2)

Alternative to shadow registers Build new paths and measure the delays of these paths Small area Easy insertion Under normal operation, all the inserted ring oscillators will be muted to avoid power consumption

70

slide-71
SLIDE 71

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Ring Oscillators (2/2)

Any malicious modifications to the original design woud also change parameters of pre-inserted ROs

Frequency change for the ROs

How many ROs are needed where they should be located inside the chip ? Construct ROs from gates of the original design by inserting multiplexors, NAND gates and inverters “On-chip” frequency measurement modules Drawbacks Difficult automation of RO insertion Easy to evade

71

slide-72
SLIDE 72

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Rare Event Removal (1/2)

72

slide-73
SLIDE 73

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Rare Event Removal (2/2)

Not adapted

73

slide-74
SLIDE 74

Introduction to Hardware Trojans Hardware Trojan Taxonomy HT Detection Methods Design for Hardware Trust HOMERE Project : First Results Conclusion

Partenaires HOMERE

74