Key Extraction Using Thermal Laser Stimulation: A Case Study on - - PowerPoint PPT Presentation

key extraction using thermal laser stimulation a case
SMART_READER_LITE
LIVE PREVIEW

Key Extraction Using Thermal Laser Stimulation: A Case Study on - - PowerPoint PPT Presentation

Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs Heiko Lohrke 1 , Shahin Tajik 1,2 , Thilo Krachenfels 1 , Christian Boit 1 , and Jean-Pierre Seifert 1 1 Technische Universitt Berlin, 2 University of Florida


slide-1
SLIDE 1

CHES 2018

Key Extraction Using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs

1

Heiko Lohrke1, Shahin Tajik1,2, Thilo Krachenfels1, Christian Boit1, and Jean-Pierre Seifert1

1Technische Universität Berlin, 2University of Florida

September 10th, 2018 CHES 2018

slide-2
SLIDE 2

CHES 2018

Background

2

slide-3
SLIDE 3

CHES 2018

Bitstream Encryption

3

JTAG

BBRAM / eFuse

FPGA AES Decryptor

slide-4
SLIDE 4

CHES 2018

Bitstream Encryption

3

JTAG

BBRAM / eFuse

FPGA AES Decryptor

slide-5
SLIDE 5

CHES 2018

Bitstream Encryption

3

BBRAM / eFuse

FPGA AES Decryptor

NVM

AES Encryptor

Design

slide-6
SLIDE 6

CHES 2018

Bitstream Encryption

3

BBRAM / eFuse

FPGA AES Decryptor

NVM

Encrypted bitstream 10111001010

Bitstream

010101…

slide-7
SLIDE 7

CHES 2018

Case Study: Key Extraction from BBRAM

4

BBRAM / eFuse

FPGA AES Decryptor

NVM

Encrypted bitstream 10111001010

Bitstream

010101… TLS

slide-8
SLIDE 8

CHES 2018

Thermal Laser Stimulation (TLS)

5

VDD (+) GND (-) Chip Laser Current Amplifier

PC

+

  • Power Supply

๏ The chip is scanned with a 1.3 !m

laser beam from the backside

๏ The current changes in response to

the local thermal stimulations

๏ Measured current is monitored by a

current amplifier >> a proportional analog voltage is generated

๏ Analog voltage is fed into image

acquisition hardware while scanning the laser

slide-9
SLIDE 9

CHES 2018

SRAM readout using TLS

6

Laser beam IC backside Seebeck Generator

๏ Thermal stimulation leads to thermal

gradient at the source/drain of the transistors

๏ Different materials lead to Seebeck

voltage generation

๏ Seebeck voltage alters gate voltage of

non-conducting transistor -> increased leakage current

๏ Which parts of the cell are sensitive

depends on cell logical state

slide-10
SLIDE 10

CHES 2018

SRAM readout using TLS

6

๏ Thermal stimulation leads to thermal

gradient at the source/drain of the transistors

๏ Different materials lead to Seebeck

voltage generation

๏ Seebeck voltage alters gate voltage of

non-conducting transistor -> increased leakage current

๏ Which parts of the cell are sensitive

depends on cell logical state

slide-11
SLIDE 11

CHES 2018

SRAM readout using TLS

6

๏ Thermal stimulation leads to thermal

gradient at the source/drain of the transistors

๏ Different materials lead to Seebeck

voltage generation

๏ Seebeck voltage alters gate voltage of

non-conducting transistor -> increased leakage current

๏ Which parts of the cell are sensitive

depends on cell logical state

slide-12
SLIDE 12

CHES 2018

Experimental Setup

7

slide-13
SLIDE 13

CHES 2018

Experimental Setup

8

slide-14
SLIDE 14

CHES 2018

Experimental Setup

8

๏ Device under Test (DUT): Avnet Kintex

UltraScale Development Board

  • Chip’s technology: 20 nm
  • No chip preparation (e.g., depackaging,

silicon polishing, etc.) required

slide-15
SLIDE 15

CHES 2018

Experimental Setup

8

๏ Device under Test (DUT): Avnet Kintex

UltraScale Development Board

  • Chip’s technology: 20 nm
  • No chip preparation (e.g., depackaging,

silicon polishing, etc.) required

๏ Optical Setup: Hamamatsu

PHEMOS-1000

  • Laser wavelength: 1.3 !m
  • Laser spot size: approximately 1 !m
slide-16
SLIDE 16

CHES 2018

Results

9

slide-17
SLIDE 17

CHES 2018

Localizing the Configuration Logic

10

Xilinx Kintex UltraScale in flip chip package

slide-18
SLIDE 18

CHES 2018

Localizing the Configuration Logic

10

Xilinx Kintex UltraScale in flip chip package Image acquisition with a laser scanning microscope

slide-19
SLIDE 19

CHES 2018

Localizing the Configuration Logic

10

Configuration Logic

slide-20
SLIDE 20

CHES 2018

Localizing BBRAM using Laser Stimulation

11

slide-21
SLIDE 21

CHES 2018

Localizing BBRAM using Laser Stimulation

11

Laser Stimulation of configuration area and measuring the current on VBATT when BBRAM key is set

FPGA is powered off in all experiments!

slide-22
SLIDE 22

CHES 2018

Localizing BBRAM using Laser Stimulation

11

Laser Stimulation of configuration area and measuring the current on VBATT when BBRAM key is not set

FPGA is powered off in all experiments!

slide-23
SLIDE 23

CHES 2018

Localizing the key bits in BBRAM by TLS (1)

12

Set 255 bits to “0” and one bit to “1”. Shifting the bit “1” eight times by one bit

1 bit

slide-24
SLIDE 24

CHES 2018

Localizing the key bits in BBRAM by TLS (2)

13

Set all 256 bits to “1” and reset all bits to “0” again.

slide-25
SLIDE 25

CHES 2018

Automatic Key Recovery

14

Target image containing the key Reference image of the cleared BBRAM

slide-26
SLIDE 26

CHES 2018

Automatic Key Recovery

14

0xd781b86f274630b561f39c9736f512eb0adf714f0d5c836c7a76ff627aca4923

slide-27
SLIDE 27

CHES 2018

Conclusion

15

๏ The required effort to develop the attack is shown to be less than 7 hours. ๏ The lower cost and higher availability of TLS in comparison to other optical attacks

makes this technique even more threatening.

๏ The stored key in the BBRAM of the FPGA can be extracted when the FPGA is

disconnected from power >> conventional side-channel countermeasures are incapable of preventing such an attack.

slide-28
SLIDE 28

CHES 2018

Thank you

16

slide-29
SLIDE 29

CHES 2018

Countermeasure: Adding Noise

17

๏Countermeasure Requirements:

  • Preventing the attack, even when the FPGA is turned off
  • Not draining the backup battery excessively, so that the device can be in its powered-off

state for a long time.

  • Realizable by standard processes
slide-30
SLIDE 30

CHES 2018

Countermeasure: Adding Noise

17

๏Countermeasure Requirements:

  • Preventing the attack, even when the FPGA is turned off
  • Not draining the backup battery excessively, so that the device can be in its powered-off

state for a long time.

  • Realizable by standard processes
slide-31
SLIDE 31

CHES 2018

Countermeasure Results

18