Security Challenges in the era of Internet-of-Things and Deep Learning
Elena Dubrova School of Electrical Engineering and Computer Science Royal Institute of Technology (KTH)
1
Internet-of-Things and Deep Learning Elena Dubrova School of - - PowerPoint PPT Presentation
Security Challenges in the era of Internet-of-Things and Deep Learning Elena Dubrova School of Electrical Engineering and Computer Science Royal Institute of Technology (KTH) 1 What concerns you about a world of connected IoT devices?
Security Challenges in the era of Internet-of-Things and Deep Learning
Elena Dubrova School of Electrical Engineering and Computer Science Royal Institute of Technology (KTH)
1What concerns you about a world of connected IoT devices?
2
Results of a a global customer survey (2016) [1]
3
Increased privacy concerns Evolved threat landscape New trust models
source: https://thenounproject.com/term/handshake/6020 source: http://www.dlink.com/se/sv/products/ source: http://gizmodo.com/What defines IoT securtiy?
Limited resources
source: https://learn.sparkfun.com/tutorials source [2]New trust models
Access and interconnect networks may not be trustworthy
shopping mall, a coffee shop, etc.
network, e.g., for analysis
Intermediaries on which IoT systems rely may not be trustworthy
proxies to cache requests and responses
intermediary
4
source: http://sdxcentral.com source: http://www.littleindia.seIncreased privacy concerns
process and resource optimization
breaches
5
source: http://www.asahi.comEvolved threat landscape
6
source: http://www.dqindia.com/cognizant-is-betting-big-on- connected-cars/ source: https://blog.econocom.com/en/blog/smartbuilding- and-bms-a-little-glossary/Limited resources
resources may not be able to afford standard cryptographic algorithms and protocols
prolong their lifetime
crucial, but challenging when:
7
How to assure IoT devices?
Tamper Resistance Energy- Efficient Crypto
source: https://www.emnify.com/2016/08/17/iot-security-sms/
Supply Chain Security
8
Assuring Tamper Resistance
source: www.tek.com
Why tampering?
– pay-TV, parking cards, electricity meters, …
for marketplace advantage
source: www.clearwater-fl.com
10
How to tamper?
power consumption, EM emissions, timing
and exploit the effect
source: sec.ei.tum.de source: hackaday.com
11
Traditional key storage methods
– data remanence
12
Data remanence in volatile memories
Volatile memories (SRAM, DRAM) do not entirely lose their contents when power is turned off
– for SRAM, at room temperature the data retention time varies from 0.1 to 10 sec – cooling SRAM to -20ºC increases the retention time to 1 sec to 17 min – at -50ºC the retention time is 10 sec to 10 hours
source: revision3.com“Physical Attacks on Tamper Resistance: Progress and Lessons”,
13
Novel key storage method: Physical Unclonable Functions (PUFs)
slightly different
“fingerprint” for each chip
14
Arbiter PUF
Creates a race between two identical paths
– process variations cause small differences in delays
Switch Block operation Arbiter operation Switch Block design
15
Advantages of PUF-based key storage
16
External Key Injection PUF TRNG + Memory
Key Generated on-chip No Secure Storage Needed Key Invisible at Power Off
PUF research at KTH
We design PUFs which are among the best in the state-of-the- art in terms of energy efficiency and reliability
“Temperature Aware Phase/Frequency Detector-Based RO-PUFs Exploiting Bulk- Controlled Oscillators”, S. Tao, E. Dubrova, DATE'2017, March 27-31
17
Side-channel attacks
a new type of side-channel attacks
18
source: hackaday.com
Side-channel attacks before and after DL
19
SIGNAL PROCESSING LEAKAGE MODELING
After DL
source: riscure.com
Before DL
DL-based side-channel attack - Profiling stage
20
random plaintext & keys
labeled data sets
network
source: riscure.com
DL-based side-channel attack – Attack stage
21
source: riscure.com
random plaintext
power trace
0.07
Side-channel attack research at KTH
using power consumption combined with bitstream modification
22
USIM attack
The secret key can be extracted from USIM using 4 power traces on average (20 in the worst case) [3]
Stora Elektronikdagen med Summit 2020-09-10 23
photo credit: Martin Brisfors
Bluetooth device attack
The AES encryption key can be extracted from a Bluetooth device (Nordic Semiconductor nRF52 DK) from 10K EM traces captured at 15 m distance [4]
Stora Elektronikdagen med Summit 2020-09-10 24
photo credit: Katerina Gurova photo credit: Katerina Gurova
Stora Elektronikdagen med Summit 2020-09-10 25
PUF attack
Responses of a protected arbiter PUF can be extracted from its FPGA implementation (Xilinx 28 nm Artix 7) using power traces [5]
Stora Elektronikdagen med Summit 2020-09-10 26
photo credit: Yang Yu
Summary and future work
physical attacks making use of DL and develop defenses
Stora Elektronikdagen med Summit 2020-09-10 27
References
[1] Mobile Ecosystem Forum, The Impact of Trust on IoT, http:// mobileecosystemforum.com/initiatives/analytics/iot-report-2016 [2] IoT Security, Ericsson White paper, 2017 [3] How deep learning helps compromising USIM, M. Brisfors, S. Forsmark, E. Dubrova, IACR Cryptology ePrint Archive, 2020 [4] Far filed side-channel attack on AES using deep learning, R. Wang, H. Wang, E. Dubrova, ACM Workshop on Attacks and Solutions in Hardware Security, ASHES’2020, Nov 9-13, 2020, Orlando, USA [5] Profiled deep learning side-channel attack on a protected arbiter PUF combined with bitstream modification, Y. Yu, M. Moraitis, E. Dubrova, IACR Cryptology ePrint Archive, 2020/1031
28