physical security attacks and defenses for computing
play

Physical Security Attacks and Defenses for Computing Systems - PDF document

Physical Security Attacks and Defenses for Computing Systems Steve Weingart Senior Engineer c1shw@us.ibm.com (561) 392 6100 Secure Systems and Smart Cards IBM T.J. Watson Research Center Hawthorne, NY Physical Security Attacks &


  1. Physical Security Attacks and Defenses for Computing Systems Steve Weingart Senior Engineer c1shw@us.ibm.com (561) 392 6100 Secure Systems and Smart Cards IBM T.J. Watson Research Center Hawthorne, NY

  2. Physical Security Attacks & Defenses Outline • Definition • Attacks • Defenses • Standards Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 2 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  3. Physical Security Attacks & Defenses Definition: Physical Security, A barrier placed around a computing system to deter unauthorized physical access to that computing system. In the event of an attack, there should be a low probability of success; and a high probability of the attack being detected either during the attack, or subsequent to penetration. Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 3 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  4. Physical Security Attacks & Defenses Attacks • Low Tech • Theft • Mis-use • High Tech • Machining • Mechanical • Water • Laser • Chemical • Shaped Charge • Probes • Passive/Active • Mechanical • Energy • E-beam/Ion Beam • X-Ray • IR Laser • Energy • Imprinting • Temperature • Voltage • Radiation • Disruption • Tempest • EM Emanations • Power/Current Profile Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 4 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  5. Physical Security Attacks & Defenses Defenses (High & Low Tech) • Tamper Resistance • Guards • Weight, Size, Material • Complexity • Inaccessibility • Chip Coatings • Substrates • Tamper Evidence • Holographic Seals • ‘Bleeding’ Paint • Crazed Materials • Tamper Detection • Membranes • Metallic • Organic • Other • Sensors • Temperature • Radiation • Voltage • Tamper Response • Zeroization Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 5 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  6. Physical Security Attacks & Defenses The Operating Envelope The range of all conditions that are required for correct operation of all components. Note: For Tamper Responding systems that use erasure as a means of protecting secret data, correct operation includes the ability to guarantee the removal of memory contents when desired. • Voltage • Temperature • Radiation Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 6 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  7. Physical Security Attacks & Defenses Standards • Not Many! • In commercial sector • FIPS 140-1 • Seems to be the emerging commercial standard • Reasonable, but needs updating now • ANSI 9.66 • Had been different than FIPS 140-1 • Probably will not be in the future • TNO (Delft Holland) • Not really a standard, an Authority • ITSEC • Not Really Focused on Hardware • Common Criteria • Not Really Focused on Hardware Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 7 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

  8. Physical Security Attacks & Defenses An Example of a Physically Secure Coprocessor Metal Shield Tamper Detecting Membrane Crypto Card Inner Cover Potting Shielded Base Card Flexible Data/Power Cable Steve H. Weingart IBM T. J. Watson Research Center, Hawthorne, NY Page 8 (561) 392-6100 Secure Systems and Smart Cards c1shw@us.ibm.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend